Securing the Internet of Things

In the Spotlight

Keynote: Michael Aisenberg, Principal Cyber Policy Analyst/Counsel, MITRE Corp

Thursday July 28, 11:00 AM ET
More Info
x

Securing the Internet of Things

The Internet of Things is becoming the Wild West: A vast market segment of unknown risks. These include network and resource utilization, performance expectations and resource needs, interoperability with current systems and tools and, above all else, security risks and challenges. This SC Virtual Conference will look at how the IoT can be normalized by existing security software without killing network performance or leaving large portions of the network unable to be secured though known, standardized tools.

Sponsored by: SC Magazine

Upcoming Online Events

  • Show:
  • Show All
Mon July 25, 2:00 PM ET

Vendor Webcast

Access Denied: Reducing the Risk of Data Breach

How to ensure your organization is protected from privileged user compromises

x

Access Denied: Reducing the Risk of Data Breach

$40 billion is spent annually on information security products. The vast majority of that sum is spent on legacy security technologies like firewalls, anti-virus and intrusion prevention.  Albeit a valuable component to defending networks from being breached, networks are being accessed in frequency with increased severity.  The cyber threat involves a different set of solutions than those which have traditionally been deployed.
 
The majority of these breaches are categorized as inside threats. The most notable breach concern is the insider threat, in particular the privileged user.  Malicious or negligent these roles create a high risk scenario for critical government data to be exfiltrated.  Such breaches cause significant concerns to critical infrastructure, mission success, and personal information being compromised.
 
In this webinar you will learn from industry experts:
 
•         Key threat vectors and how to mitigate risks
•         How a layered approach to cyber security creates a more compelling defense against threats
•         Role based access controls that extend from the data center to the cloud
•         How to ensure your organization is protected from privileged user compromises

More Info

Sponsored by: Vormetric

Tue July 26, 2:00 PM ET

Vendor Webcast

Guccifer 2.0, the DNC Hack and Fancy Bears, oh my!

Join us for a webinar on July 28 to see how the ThreatConnect research team was able to build off the work of others to add its own observations gleaned from analyzing...

x

Guccifer 2.0, the DNC Hack and Fancy Bears, oh my!

On June 15, 2016, Crowdstrike, published a blog article detailing the breach of the Democratic National Committee (DNC) by two Russia-based threat groups. ThreatConnect, using the Crowdstrike blog article as a basis, conducted further research into the DNC breach and discovered additional findings and also challenged Guccifer 2.0’s claimed attribution for the DNC breach. 

Join us for a webinar on July 28 to see how the ThreatConnect research team was able to build off the work of others to add its own observations gleaned from analyzing the metadata on Guccifer 2.0’s released files and other discoveries. 

We’ll talk about: 
• The methodology and tools that the ThreatConnect research team used: 1) to find additional intelligence for future protection and 2) come up with competing hypotheses concerning Guccifer 2.0 
• The findings: what we uncovered - Fancy Bear, Guccifer 2.0, and the timeline
• Why other agencies and organizations should care about this information and what they should do with it - i.e. it’s not just a DNC problem.



 

More Info

Sponsored by: ThreatConnect

Wed July 27, 2:00 PM ET

Vendor Webcast

Securing Office 365 is Easier than Herding Sheep

The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable...

x

Securing Office 365 is Easier than Herding Sheep

The pervasiveness of shadow IT is a result of the tremendous value these SaaS applications are providing to end users. Because of data exposure and threat insertion risks, users can’t run unchecked. A sledgehammer approach of simply blocking applications is not the right approach. Disrupting business critical applications while blocking risky applications will have significant business impact since users have become accustomed to using these applications to do their daily jobs. This has never been truer than with Office 365. This puts a spotlight on the existing challenge of securing SaaS applications that can no longer be ignored. 

Enable safe usage of SaaS applications, including Office 365, with complete visibly and granular enforcement across user, folder and file activity within the applications to prevent data risk and compliance violations.

This webinar will show you how to:

● Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.
● Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
● Protect against new insertion and distribution points for malware.
● Gain visibility and granular, context-based control of SaaS applications.

The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
More Info

Sponsored by: Palo Alto Networks

Thu July 28, 11:00 AM ET

Virtual Conference

Securing the Internet of Things

Keynote: Michael Aisenberg, Principal Cyber Policy Analyst/Counsel, MITRE Corp

x

Securing the Internet of Things

The Internet of Things is becoming the Wild West: A vast market segment of unknown risks. These include network and resource utilization, performance expectations and resource needs, interoperability with current systems and tools and, above all else, security risks and challenges. This SC Virtual Conference will look at how the IoT can be normalized by existing security software without killing network performance or leaving large portions of the network unable to be secured though known, standardized tools.
More Info

Sponsored by: SC Magazine

Fri July 29, 2:00 PM ET

Vendor Webcast

The modern way of hunting - How three CTOs tackle incident response

Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope along with for a complete review of what it takes to accelerate investigations, decrease...

x

The modern way of hunting - How three CTOs tackle incident response

Your corporate network is open terrain.  And it's hunting season.  Malware, ransomware, and phishing scams are lurking.  It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here. 

Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild. 

Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future. 

Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope along with for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched. 

Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on July 29th at 10am PT. You’ll learn:

● Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
● Three unique approaches for digging deeper into what happened before, during, and after an attack
● How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

Register now and let the hunting begin.
More Info

Sponsored by: OpenDNS

Tue August 02, 2:00 PM ET

Vendor Webcast

Top Cybersecurity Experts Reveal How to Protect Your Business Against Cyber Attacks

Live solution demonstration: See how Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to...

x

Top Cybersecurity Experts Reveal How to Protect Your Business Against Cyber Attacks

Cyber attacks on businesses of all sizes are at an all-time high. A recent study by Keeper Security and the Ponemon Institute found over 50% of small to medium-sized businesses (SMBs) have been breached in the past 12 months.

Studies show that IT security budgets and access to experienced security personnel is lacking within SMBs.  The challenge for these organizations is to get a clear understanding on where the greatest vulnerabilities exist and then leverage proven best practices and technologies that provide high risk mitigation potential, are cost effective and easy to implement.

On this webcast, three cybersecurity and privacy experts will provide you with the following:

• Exclusive research: SMB cybersecurity trends, emerging threats and best practices

• Case study: How one CIO defends his organization against cyber theft

• Live solution demonstration: See how Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft



 

More Info

Sponsored by: Keeper Security

On-Demand Online Events

  • Show:
  • Show All

Vendor Webcast

API vs. Proxy: Understanding How to Get the Best Protection from Your CASB

Attendees of this webinar will learn the pros and cons of API and proxy-based CASBs and be able to answer these critical questions about them

x

API vs. Proxy: Understanding How to Get the Best Protection from Your CASB

More than a quarter of 3rd party apps connected to corporate environments are considered "high-risk.” This explains why you might be feeling pressure to secure your company’s IP when there is no longer an identifiable network perimeter.

That’s where Cloud Access Security Brokers (CASBs) come in. A CASB can help you secure your full cloud security footprint. But not all CASBs are created equally -- some use API-mode, and others use proxy-mode. Does it really make a difference? Which implementation method should you choose?

Attendees of this webinar will learn the pros and cons of API and proxy-based CASBs and be able to answer these critical questions about them:


• Which one will enable you to protect SaaS, IaaS, and PaaS?
• Which one will enable you to secure unmanaged traffic?
• Which one will enable you to maintain network performance?
More Info

Sponsored by: Palerra

Vendor Webcast

A CISO’s guide to navigating cyberinsurance

Join us for an informative webinar where we will discuss what security professional need to know to ensure they are protected.

x

A CISO’s guide to navigating cyberinsurance

Cyberinsurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyberinsurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. Join us for an informative webinar where we will discuss what security professional need to know to ensure they are protected, including:

• The current state of cyberinsurance from a business operations perspective – what is covered and what isn’t
• What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack
• How financial reimbursement does not address the real impact of a data breach
• How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game

More Info

Sponsored by: SecureAuth

Virtual Conference

Securing the cloud

Platinum Sponsor: Blue Coat, Rapid7

x

Securing the cloud

The debate rages between which is more secure -- the datacenter or the cloud. In part this depends on what policies and procedures companies use to product data in transit to the cloud and how they store their data at rest in the cloud. This eConference looks at best practices to ensure data is secure in cloud and SaaS environments.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Cloud Agility and Security: Misperceptions Dispelled

Real World Strategies for Migrating to the Cloud Securely

x

Cloud Agility and Security: Misperceptions Dispelled

When companies move their IT assets to the cloud, they have an opportunity to realize cost savings, accelerate innovation and improve IT performance. Unfortunately, the utility of the cloud is constrained by perceptions and misperceptions about security and control. And even without appropriate controls in place, organizations are moving to the cloud at a very fast pace.
 
For those of us responsible for security, this is a terrifying proposition--our most precious assets are seemingly moving outside of our control.  However, perhaps, the cloud is more secure than you realize.  Perhaps the cloud is a chance for a restart for how your organization looks at security of its data and applications.  In this webcast, we’ll dispel some of the misperceptions that exist and jump right into both “lift and shift” and cloud native strategies for migrating to the cloud securely.  Knowledge is power and this is an opportunity to advance your team’s understanding of the cloud and how to accelerate the transition.  
 
You will learn how to:
 
•         Develop an organization-wide cloud strategy
•         Assess your risk as you adopt cloud solutions
•         Identify common practices and frameworks for cloud migrations
•         Determine which cloud migration architecture meets your business objectives
More Info

Sponsored by: Dell SecureWorks

20/20 Webcast

It's all about risk

Today's 20/20 broadcast will look at how risk analytics works, how it fits into an overall cyber security strategy, and what kind of actionable intelligence you...

x

It's all about risk

It's all about risk. Virtually everything we do in information security balances the value of the data with the potential risk having that data compromised. But what is risk analytics anyway and how is it different from risk management? Today's 20/20 broadcast will look at how risk analytics works, how it fits into an overall cyber security strategy, and what kind of actionable intelligence you can expect to glean from your network.
More Info

Sponsored by: Anamoli

Vendor Webcast

Keeping Your Workloads Secure on AWS

Are you moving applications from your data center to AWS?

x

Keeping Your Workloads Secure on AWS

Are you moving applications from your data center to AWS? If so, you have a new set of challenges around securing those workloads. While AWS provides strong security for their underlying compute and networking infrastructure, you are responsible for security of your workloads, data and apps. Doing that in an environment that is dynamic and elastic — like AWS — calls for a modern approach to security. 

Join this informative webinar to learn about:
• Key points of AWS’ shared responsibility model for security
• When it’s necessary to supplement AWS Security Groups with more granular network security
• How to ensure data security compliance to meet the requirements of auditors
• Ways to ditch manual processes through security automation

More Info

Sponsored by: CloudPassage

Vendor Webcast

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

This webinar will dive into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps.

x

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

DevOps - one of the most disruptive trends to hit software development – is a major organizational and cultural driver of development and IT operations. DevOps practices such as continuous integration and continuous deployment are core concepts, but automation alone does not encompass why DevOps is rapidly changing application development.  DevOps has more to do with changing the organization’s mindset, fostering teamwork and a commitment to quality — as opposed to the quantity — of code being delivered. These practices provide the opportunity to improve the security of applications by enabling developers to weave security testing, validation, and monitoring into application development, deployment and production. Yes, DevOps enables teams to work together to identify and address the obstacles which slows the delivery software, but it’s that they work together — instead of in silos — while turning priorities upside down that’s getting results. This shared job of getting things right instead of just getting things done, when you include security as a basic assumption, is resulting in secure, quality software, and a sense of empathy that allows teams to work more effectively.
 
This webinar will dive into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discuss the challenging process and technical requirements for integrating security into DevOps. Join Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode as they discuss these challenges and trends related to security and DevOps including:
 
•         A broad based look at DevOps and DevOps principles beyond code production
•         The DevOps cultural impact both inside and outside the development pipeline
•         Getting Started with Secure DevOps
•         The role of security champions
•         How to break down barriers from a cultural perspective
By embracing DevOps principles and looking beyond the pipeline to organizational and production capabilities, the chances of successfully integrating security with DevOps are substantially improved.
 

More Info

Sponsored by: Veracode

Vendor Webcast

Shell No! — Uncovering Adversary Web Shell Trends and Mitigations

Web shells are preferred by specific threat actor groups for their small size and ability to maintain unauthorized access.

x

Shell No! — Uncovering Adversary Web Shell Trends and Mitigations

Phishing is effective, but predictable. A drive-by (watering hole) campaign paired with a zero-day exploit also accomplishes the objective, but identifying and compromising the correct website(s) for specific victim redirection is tricky and time consuming. 

Contrast those attack vectors with web shells. Identifying a target’s vulnerable web server and implanting a web shell is relatively straightforward and perhaps unexpected. Most organizations maintain a web presence full of application layer software which presents a wide attack surface. Web shells are preferred by specific threat actor groups for their small size and ability to maintain unauthorized access. 

In this threat intelligence webinar Levi Gundert, Vice President of Information Security Strategy, will show:

• Numerous web shell samples.
• Malicious web shell attack trends. 
• The current web shell taxonomy.
• Specific guidance for operational defenders on detecting web shell attacks.

More Info

Sponsored by: Recorded Future

20/20 Webcast

Incident response: One size fits none

This 20/20 looks at the steps you need to take to launch an incident response and how to develop your incident response plan.

x

Incident response: One size fits none

The FBI just called to tell you your data is plastered across the dark web. What do you do now? Whom do you call first? Do you hit the power switch on the servers or start a forensic investigation? This 20/20 looks at the steps you need to take to launch an incident response and how to develop your incident response plan. (Spoiler alert -- don't turn off that server!)

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Are you ready for behavioral firewalls? A proactive approach to preventing insider threats and breaches

The Preempt Behavioral Firewall is changing how security teams improve enterprise security in real time.

x

Are you ready for behavioral firewalls? A proactive approach to preventing insider threats and breaches

Despite Next Gen Firewalls and some of the latest User Behavior Analysis solutions, organizations still struggle with preventing breaches and identifying insider threats. One cannot respond to threats and the other does not understand user behavior. Enterprises need a more automated way of responding to emerging threats, by analyzing user behavior, without overwhelming the security organization.

 

The Preempt Behavioral Firewall is changing how security teams improve enterprise security in real time. Register now to learn how organizations are using Behavioral Firewalls to improve visibility, gain security insights, instantly verify user identity and automatically respond to threats. 

More Info

Sponsored by: Preempt

Vendor Webcast

Upgrading Your Firewalls?  Use the Opportunity to Deploy a More Resilient Inline Security Fabric.

Attend this webinar to learn how an Ixia Security Fabric™ works with next generation firewalls and other appliances to maximize security resilience and deliver...

x

Upgrading Your Firewalls? Use the Opportunity to Deploy a More Resilient Inline Security Fabric.

Any time you’re looking to strengthen and/or upgrade your inline security infrastructure, you have the perfect opportunity to also upgrade your security fabric.  Even new security tools can’t do their job if your network is compromised by device failures, packets are dropped, or tools are overwhelmed.  You need an inline security fabric designed to minimize downtime and maximize detection of cyber threats.
 
Attend this webinar to learn how an Ixia Security Fabric™ works with next generation firewalls and other appliances to maximize security resilience and deliver the best possible ROI for your security investments.
 
What You’ll Learn:
•         Current security tool deployment practices
•         What is a bypass switch?  What is a network packet broker (NPB)?
•         What is Ixia Security Fabric™?
•         How can I improve my inline security tool deployments?

More Info

Sponsored by: Ixia

Vendor Webcast

Are open source vulnerabilities hiding out in your repo?

Here’s what you need to know to stay secure while realizing the benefits of open source.

x

Are open source vulnerabilities hiding out in your repo?

Artifactory streamlines use of open source for your development teams giving a central location where they can select and access the latest versions of the open source components they rely on. But unless you are vigilant, open source vulnerabilities in your repository can quickly affect your apps.  Here’s what you need to know to stay secure while realizing the benefits of open source. In this session you will learn:

• How open source vulnerabilities can appear in your codebase
• Why traditional security testing approaches often miss open source vulnerabilities and what you can do about it
• Best practices in mitigating open source vulnerabilities throughout the development lifecycle

More Info

Sponsored by: Black Duck Software

Vendor Webcast

Follow that file – Tackling file sharing compliance risks

Join a distinguished panel of seasoned information security experts and practitioners to gain pragmatic file collaboration security and compliance insights.

x

Follow that file – Tackling file sharing compliance risks

File sharing demand has ushered in the age of Bring Your Own Collaboration (BYOC), as well as a complex array of data protection and privacy compliance challenges for IT to manage. From network files shares and e-mail to new cloud-based file sharing platforms, once a file containing sensitive, regulated or confidential data is obtained by an authorized employee or third-party, data leakage liabilities begin to mount.

 

What are the key operational and legal measures to consider to balance business needs with compliance mandates?

 

Join a distinguished panel of seasoned information security experts and practitioners to gain pragmatic file collaboration security and compliance insights as this roundtable tackles:

  • How to prioritize legal file data privacy and protection obligations?
  • How to avoid common file access and sharing control oversights?
  • When to involve which constituents when upgrading file security policies and controls?
  • What file security caveats exist in cloud-based file sharing platforms?
  • Where can file protection controls breakdown or are impractical?
  • How best to prepare for and respond to the imminent file data leakage incident?
More Info

Sponsored by: FinalCode

Virtual Conference

Leveraging Threat Intelligence

Keynote: Matthew Webster, Chief Information Security Officer, Healthix Platinum Sponsor: Intel Security

x

Leveraging Threat Intelligence

Threat intelligence is everywhere. It’s in your log files and those of other companies around the globe. Accessing treat intelligence, however, is not a simple task. This eSymposium will address how threat intelligence work and why collaboration of threat intelligence data is becoming more common across a variety of industries.
More Info

Sponsored by: SC Magazine

Vendor Webcast

PCI 3.2: From checkbox assessment to security control

PCI DSS version 3.2 focuses on security control accountability, a concept that introduces the notion of continuous monitoring and measurement of your entire security...

x

PCI 3.2: From checkbox assessment to security control

“Four out of five companies still fail at interim assessment,” according to the "Verizon 2015 PCI Compliance Report."  
 
PCI DSS version 3.2 focuses on security control accountability, a concept that introduces the notion of continuous monitoring and measurement of your entire security ecosystem.
 
Join Christopher Strand, security, risk and compliance officer at Carbon Black, as he provides an overview of the 3.2 changes and demonstrates how Carbon Black has been helping thousands of organizations under the scope of PCI prove these measures and remain in continuous compliance.
 
You’ll learn:
• Where to deploy and measure critical security controls and processes to ensure continuous compliance and achieve a strong security posture.
• The ways in which Cb File Integrity Control can reduce noise within your environment and narrow the scope of compliance efforts.
• Why making a paradigm shift from patch mitigation to threat mitigation will ensure your PCI security posture has no weak spots.
• How malware and ransomware breaches, like the ones making headlines, could have been prevented with the Carbon Black approach.
More Info

Sponsored by: Carbon Black

Vendor Webcast

Data Breach Risk Intelligence That Matters

In this session, we will discuss a straightforward approach to quantifying and reporting on the potential financial liability and impact of a data breach.

x

Data Breach Risk Intelligence That Matters

When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal penalties. In this session, we will discuss a straightforward approach to quantifying and reporting on the potential financial liability and impact of a data breach. We will use real world experiences to show how to create actionable intelligence encompassing sensitive data and detected threads as well as the importance of producing reports and analysis showing:

• Liability exposure for C-level executives and board members tied to financial reporting;
• Clear prioritization of where to invest IT resources to prevent breaches and maintain shareholder value;
• Metrics that substantiate and validate efforts to reduce and mitigate the impact of a breach;
• Calculations to help evaluate risk posture organization-wide.

More Info

Sponsored by: LogicNow

Virtual Conference

Auditing and Compliance

Keynote: Richard Moore,Managing Director with Alvarez & Marsal’s Financial Industry Advisory Services Platinum Sponsors: HP Enterprise, Ipswitch

x

Auditing and Compliance

It’s one thing to think you’re keeping your network secure and compliant. It’s quite another to be secure and compliant. This eConference will delve into the difference between security and compliance and how auditing both your own network and those of your service providers can ensure the security and compliance of your data.
More Info

Sponsored by: SC Magazine

20/20 Webcast

Deconstructing DDoS

This 20/20 webcast looks at the state of the DDoS market, some of the factors that are causing it to expand and some recommendations for companies to defend against...

x

Deconstructing DDoS

Distributed denial of service attacks are one of the most common types of attacks used by those who are not interested in stealth but rather simply causing a web site extreme grief. This 20/20 webcast looks at the state of the DDoS market, some of the factors that are causing it to expand and some recommendations for companies to defend against these attacks.

More Info

Sponsored by: Arbor Networks

Vendor Webcast

Big Data security unwrapped

Join this webcast for live and interactive access to an esteemed panel of security thought leaders who will answer your questions and discuss live polling results...

x

Big Data security unwrapped

Hadoop Environments are holding and analyzing an incredible and growing amount of data for most organizations.  This data represents intellectual property, monetized product, and is increasingly holding regulated data.  These facts are making big data environments prime cyber threat targets and a challenge for both security compliance offices. 

 

Join this webcast for live and interactive access to an esteemed panel of security thought leaders who will answer your questions and discuss live polling results on current best practices and the direction of Hadoop data protection. 

More Info

Sponsored by: Vormetric

Vendor Webcast

What Guns Are in Use By Cyber Attackers - NSS Labs Readout on Q116 Exploit Activity

Join our webinar to get a full review of exploits that were used so far in the first half of 2016 by cyber attackers.

x

What Guns Are in Use By Cyber Attackers - NSS Labs Readout on Q116 Exploit Activity

It’s common knowledge that there over 1 million new forms of malware being introduced per day. Security practitioners know that on a given day, an enterprise class network can have thousands of vulnerabilities.  And yet, security teams are MASH units at best.  But, there is a better way.  Cyber Advanced Warning SystemTM (CAWS) identifies active exploits, their application targets and whether or not specific security products can stop them.  

Join our webinar to get a full review of exploits that were used so far in the first half of 2016 by cyber attackers.  Details on what assets they have in the cross hairs and how security product categories have fared against them.  You might be surprised at where your security teams should be focused. 

More Info

Sponsored by: NSS Labs

Vendor Webcast

Managing Privileged Access Security In A Hybrid IT World

With many new identities to account for, decision-makers must properly designate privileged access while still taking advantage of the efficiencies of the cloud...

x

Managing Privileged Access Security In A Hybrid IT World

Business success today increasingly means leveraging digital technology to win, serve, and retain customers. Indeed, decision-makers are investing in cloud technologies, allowing remote access for employees, and employing more outsourced services in order to drive efficiency. Although these actions are increasingly necessary to increase competitive advantage, they also increase the size of a firm's attack surface. With many new identities to account for, decision-makers must properly designate privileged access while still taking advantage of the efficiencies of the cloud and outsourcing more than ever.

In November 2015, Centrify commissioned Forrester Consulting to examine how IT decision-makers both secure and grant privilege to identities in cloud-based environments. Centrify has invited Andras Cser, Principal Analyst and VP at Forrester, to comment on the results and discuss:

• How firms are employing cloud services to store sensitive data and drive vital workloads
• The extent to which firms are engaging in outsourcing and allowing remote access to employees
• How privileged identity management (PIM) is more important than ever in this environment
• The benefits gained by a selection of firms who have chosen PIM-as-a-service to manage identify

More Info

Sponsored by: Centrify

Vendor Webcast

Testing NGFW: Three Points of Value Critical to Your Enterprise

In this data-rich webcast, NSS Labs, the world’s leading security insight company, shares its methodology for testing NGFW capabilities, including key features...

x

Testing NGFW: Three Points of Value Critical to Your Enterprise

Three drivers that are key to the success of your NGFW solution deployment include: Integration with security workflow, low total cost of ownership, and security effectiveness in your increasingly complex threat landscape. How do you know which solution will work best for your distributed enterprise environment?

In this data-rich webcast, NSS Labs, the world’s leading security insight company, shares its methodology for testing NGFW capabilities, including key features to consider when selecting a network security solution. Forcepoint Stonesoft shares its insights on the NGFW testing process and how its products align with the needs of your enterprise.

More Info

Sponsored by: Forcepoint

Virtual Conference

ID Management

Keynote: Paul Munsen,Global Identity & Access Management Platform Lead, McDonald's Corporation

x

ID Management

Differentiating between the good guys and the bad guys on a network all comes down to ID management. It’s not enough to have valid credentials anymore — the bad guys have a lot of valid credentials. This eSymposium will address how impostors are identified and how legitimate users are able to access their data safely and securely, even when they are remote or using a variety of mobile devices.
More Info

Sponsored by: SC Magazine

20/20 Webcast

The SMB conundrum with information security

What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches?...

x

The SMB conundrum with information security

SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? (This question can be addressed either by security consultants that specialize in SMB markets or by Secure Web Gateway vendors)

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Are ransomware attacks holding your industry hostage?

Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks.

x

Are ransomware attacks holding your industry hostage?

Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more. 

Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.

But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.

Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:

  • Reduce ransomware infections across your organization
  • Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
  • Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps

Register now to learn how to start covering your healthcare security gaps.
More Info

Sponsored by: OpenDNS

Vendor Webcast

PKI: Essential Security and Enablement for Today’s Digital Business

The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.

x

PKI: Essential Security and Enablement for Today’s Digital Business

In Digital Business today, with traditional barriers falling away, trust in every entity on your network becomes crucial. Cyber threats are at an all-time high and all cyber threats are fundamentally an attack on identity, whether that be an individual, a device or an application. All need to be strongly identified and differentiated in in terms of privilege and permissions.  PKI is the ideal vehicle for this,  enabling strong identity across the enterprise. In this session, Todd Landry, PKI Senior Product Manager at Entrust Datacard, will look at the drivers and challenges of today’s digital business and discuss how PKI can build a profoundly secure architecture for the digital enterprise. The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.
More Info

Sponsored by: Entrust

Vendor Webcast

Staying relevant in a HybridIT world: Secure Access is now about IT saying “yes” to the next generation of workers, apps, networks and things

We are at a turning point where IT teams must say “yes” to remain relevant, and intelligently select security solutions that will still allow for compliance.

x

Staying relevant in a HybridIT world: Secure Access is now about IT saying “yes” to the next generation of workers, apps, networks and things

We are at a turning point where IT teams must say “yes” to remain relevant, and intelligently select security solutions that will still allow for compliance. For far too long, IT have been getting away with being inflexible to the requests of their workforce.  

 

The reason was simple – they set the rules and workers followed them with data security being the key justification, like it or not.  But to harness the productivity of the new breed of tech savvy workers along with cloud services, personal devices and internet enabled things, traditional IT has to transform into HybridIT, they must be flexible yet retain a level or risk comfort.

Can we switch the tone here to be more positive?  How does IT Security adapt to this new world, and bring the paradigms of strong auth and device compliance that the enterprise needs to manage risk to the new Hybrid IT architectures of Mobile and Cloud while making apps easy to use and respecting employee privacy?

More Info

Sponsored by: Pulse Secure

Vendor Webcast

“Where Is My Data?” And Other Terrifying Questions Facing IT/Security Professionals

Attend this webinar and see the latest international research of executive IT and security professionals, and what they actually know about their sensitive data...

x

“Where Is My Data?” And Other Terrifying Questions Facing IT/Security Professionals

While the sensitive information of an organization IS its value, most struggle knowing where it is and it’s risk of its misuse or breach.  And denial is common in many organizations, as they don’t know what they do not know.  

Attend this webinar and see the latest international research of executive IT and security professionals, and what they actually know about their sensitive data.  Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute and Bill Burns, CISO and Interim CIO of Informatica will join together to explore how you can tackle this daunting problem and gain support for data security intelligence across your enterprise.

Specifically, you will:

1.      Learn about the dangerous knowledge gap of sensitive data

2.      Hear what keeps your IT and security peers up at night

3.      Get in the trenches advice on how to tackle data security intelligencec

More Info

Sponsored by: Informatica

Virtual Conference

Privacy and Security

Keynote: Gregory Wilson, Head of Information Security, 1st Global Platinum Sponsor: Hewlett Packard Enterprise

x

Privacy and Security

Is privacy vs. security a zero-sum game? Can we continue to enjoy our corporate or individual privacy and still be secure? Today’s eSymposium addresses the balance between privacy and security, as well as the challenge enterprises face while ensuring the privacy of records while complying with security mandates.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Welcome to the next phase of endpoint management

Join us to explore the benefits of this new endpoint management and security solution—and learn how it can help improve your organization.

x

Welcome to the next phase of endpoint management

Automate your endpoint management and security
An influx in workstations, servers, laptops, smartphones and tablets has made it increasingly difficult for corporations and government agencies to effectively manage their computing endpoints. 

Tasks that used to be simple—such as determining how many laptops exist within an organization—can now take days to complete with conventional management methods, and there’s no guarantee those answers will be accurate. Fortunately, there are other options.

In IBM’s upcoming webinar, Welcome to the next phase of endpoint management,  John Beal, Endpoint Security and SaaS Leader, IBM Canada, will discuss IBM BigFix—a smarter, faster endpoint management and security solution. This new solution enables IT to see and manage physical and virtual endpoints—including point-of-sale devices, ATMs and self-service kiosks—and rapidly remediate threats, protect endpoints and submit security reports in real time.

By automating time-intensive tasks across complex networks, organizations can:

  • effectively reduce risk and support compliance
  • better manage distributed endpoints, both on- and off-network
  • deliver necessary IT services and support with minimal disruption
  • reduce the labour and processes required to manage and secure endpoints

Join us on May 25, 2:00 pm EDT to explore the benefits of this new endpoint management and security solution—and learn how it can help improve your organization.

More Info

Sponsored by: IBM

Vendor Webcast

Bridging Network & Endpoint Security

In this session we will examine workflows used by mature SOC and IRT practices to efficiently resolve security investigations.

x

Bridging Network & Endpoint Security

Security Operators detect and respond to threats by examining data generated by network and endpoint monitoring tools. One of the biggest challenges is bridging these two different types of tools. In this session we will examine workflows used by mature SOC and IRT practices to efficiently resolve security investigations.
More Info

Sponsored by: Lancope

20/20 Webcast

Overcoming ransomware

Today’s 20/20 webcast looks at some of the ways ransomware attacks are conducted, why they can be so devastating, and how to defend against those attacks.

x

Overcoming ransomware

Ransomware is hardly new but it has evolved into a very dangerous trend. A recent Flash alert from the FBI that raised concern about a new breed of ransomware is in the wild and attacking US corporations is just the latest in a series of warnings and advisories from the Dept. of Justice.

Today’s 20/20 webcast looks at some of the ways ransomware attacks are conducted, why they can be so devastating, and how to defend against those attacks.

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Selecting An Application Security Testing Vendor

Finding an appropriate security testing vendor or technology becomes a critical step toward securing our business applications.

x

Selecting An Application Security Testing Vendor

We have to accept and deal with the fact that our applications with be attacked by hackers. Therefore, before being moved into production and exposed to such attacks, our applications should be tested for possible security vulnerabilities. Finding an appropriate security testing vendor or technology becomes a critical step toward securing  our business applications. In this session Joseph Feiman, Chief Innovation Office at Veracode will discuss the following key issues:
 
  • What technology and business criteria your application security testing (AST) vendor should satisfy?
  • What AST technologies you should adopt?
  • What technologies should complement your AST choice? 
  • How to optimize your AST choice?
More Info

Sponsored by: Veracode

Vendor Webcast

Helping the C-Suite Define Cyber Risk Appetite

Join RSA for this informative session as we discuss practical steps for identifying and categorizing cyber risk with your key business stakeholders and technical...

x

Helping the C-Suite Define Cyber Risk Appetite

In the constantly changing landscape and myriad of sources behind cyber risk, executives and board members are increasingly forced to take ownership and accountability. Yet many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies that are ineffective and reactionary.

The success and failure of modern enterprises is dependent on the ability to quantify cyber risk and make informed decisions within an organizations cyber risk appetite. Those who do so effectively will be better positioned to enable continued growth and those who do not, will expose their organization to risks with potential calamitous implications. Without having a foundational, solid understanding, determining how and where to allocate human, financial, and technology resources is a complicated calculus. 

Join RSA for this informative session as we discuss practical steps for identifying and categorizing cyber risk with your key business stakeholders and technical owners of risk. Attend this session to calculate your own organizations cyber risk appetite.

More Info

Sponsored by: RSA

Vendor Webcast

Do You Really Know Your Users? How User Behavior Analytics Can Help You Detect User Threats

As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re...

x

Do You Really Know Your Users? How User Behavior Analytics Can Help You Detect User Threats

As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.
 
Many companies are confronting this challenge with User Behavior Analytics (UBA). This solution can help you detect and respond to user threats, including when:
 
  • An insider turns against your organization
  • A cyber-attacker steals a user’s credentials
  • An administrator abuses account privileges
 
If you’re focused on addressing user threats, UBA can be a powerful tool in your kit. Join David Gorton and Mark Settle from LogRhythm, as they discuss the elements of an effective user threat detection program. You’ll learn:
 
  1. Why detecting user threats is so important—and so difficult
  2. Different approaches to UBA
  3. The value of data from across your enterprise
  4. How to maximize the efficiency of your analysts
More Info

Sponsored by: LogRhythm

Virtual Conference

Tackling vulnerabilities

Keynote: Tom Kellermann, Cyber-intelligence expert Platinum Sponsor: Trend Micro

x

Tackling vulnerabilities

Networks are no longer homogeneous. Diverse hardware and infrastructure architecture makes the discovery of vulnerabilities more like a game of Tetris than simply scanning for open ports. This SC Virtual Conference will address how vulnerabilities can be identified and mitigated even in the most complex IT environments.    

More Info

Sponsored by: SC Magazine

Vendor Webcast

Evaluating New Technologies – TIP, Endpoint Solutions and More!

Latest security technologies to hit the marketplace including: endpoint detection and response solutions, malware analysis, insider threat and threat intelligence...

x

Evaluating New Technologies – TIP, Endpoint Solutions and More!

Breaches disclosed in the media foster conversations within organizations on how to protect critical assets and enterprise infrastructure.  Loss of intellectual property, financial data and customer confidence have produced tangible evidence of an evolving threat landscape that, in turn, has elevated the conversation to the board room.  This cyber awakening has many organizations evaluating current security measures including tools and technology – and the options available in the market are endless!    

 As Chief Technologist for Lockheed Martin’s commercial cyber business, Aaron Shafer is responsible for leading technical innovation with a focus on evaluating the latest cyber technology available in the market and advancing the Intelligence Driven Defense® tradecraft.  In this session, Aaron will share his point of view on the latest security technologies to hit the marketplace including: endpoint detection and response solutions, malware analysis, insider threat and threat intelligence platforms. 

More Info

Sponsored by: Lockheed Martin

Virtual Conference

Advanced monitoring and forensics

Keynote: Rebecca Gurley Bace, Chief Strategist for the Center for Forensics, Information Technology and Security (CFITS)

x

Advanced monitoring and forensics

It’s one thing to identify a breach exists; it’s quite another to dig deeply into the bowels of the affected system to see who committed the breach, how they did it, and perhaps even the ongoing status of the breach in progress. This eSymposium looks at how monitoring and digital forensics can unlock the secrets of a data breach and bring hidden details to light.
More Info

Sponsored by: SC Magazine

Virtual Conference

Cyberespionage

Keynote: Ari Schwartz, Managing Director of Cybersecurity Services, Venable LLC Platinum Sponsor: TrendMicro

x

Cyberespionage

Is there a difference between those attackers involved in cyberespionage and run-of-the-mill cybercriminals? Does it matter? This SC Virtual Conference will look at various approaches state-sponsored and corporate cyberespionage attackers use to penetrate corporate networks. Our experts will present a number of recommendations that companies can take today to defend themselves from these malicious attacks.    

More Info

Sponsored by: SC Magazine

Vendor Webcast

Flying Blind – How encrypted traffic is changing enterprise security strategies.

Effective strategies that can help you identify and stop security risks caused by encrypted network traffic

x

Flying Blind – How encrypted traffic is changing enterprise security strategies.

All the analysts agree: encrypted network traffic is wreaking havoc on enterprise security.  Most next generation firewalls, intrusion prevention, anti-malware sandboxes and other advanced threat defense solutions are blind to SSL/TLS traffic. The rise of cloud and mobile applications drives network encryption, meaning most organizations cannot see or protect a significant portion of their own network traffic. And according to Gartner, 50 percent of all attacks will happen through encrypted traffic by 2017.
Join this informative webinar to learn:
  • The impact of rapid SSL/TLS adoption by cloud-based applications
  • The implications of decryption – do your Legal and HR teams approve?
  • The challenges and benefits of implementing a holistic encrypted traffic management solution
  • Strategies you can deploy immediately to reduce your risk and prepare for the day when 100% of your network traffic is encrypted
More Info

Sponsored by: Blue Coat

Vendor Webcast

Revealing ransomware secrets with threat intelligence

Threat intelligence can help you defend against the two key attack vectors used by ransomware — malicious emails and malvertising.

x

Revealing ransomware secrets with threat intelligence

Threat intelligence can help you defend against the two key attack vectors used by ransomware — malicious emails and malvertising.

In this webinar, you will learn:

 

  • The four recent vulnerabilities in Adobe Flash Player and Microsoft SilverLight which allow exploit kits such as Angler to deliver ransomware in malvertising campaigns.
  • How threat intelligence enables faster verdicts on key technical indicators associated with malicious emails with ransomware such as Locky.
  • The rising popularity of ransomware over the past four years and top ransomware families as shown by trend analysis.
  • Best practices on applying threat intelligence to help prevent ransomware infections.

 

More Info

Sponsored by: Recorded Future

Vendor Webcast

CASBs and The Treacherous 12 Top Cloud Threats

The CSA concludes that although cloud services deliver business-supporting technology more efficiently than ever before, they also bring significant risk

x

CASBs and The Treacherous 12 Top Cloud Threats

On February 29, 2016 the Cloud Security Alliance (CSA) Top Threats Working Group released a report titled, “The Treacherous 12: Cloud Computing Top Threats in 2016.” In this report, the CSA concludes that although cloud services deliver business-supporting technology more efficiently than ever before, they also bring significant risk. 

 

Regardless of whether the IT department sanctions new cloud services or not, the door is wide open for the Treacherous 12. The CSA report points out that businesses need to take security policies, processes, and best practices into account. 

 

At the same time, Gartner predicts that through 2020, 95 percent of cloud security failures will be the customer’s fault. This does not mean that customers lack security expertise. It does mean, however, that it is no longer sufficient to know how to make decisions about risk mitigation in the cloud. Automation is the key. 

 

Cloud security automation is where Cloud Access Security Brokers (CASBs) come into play. A CASB helps automate visibility, compliance, data security, and threat protection for cloud services. 

 

In this free, live webinar you will learn about:

  • ·        The CSA Working Group's definition of the top cloud computing threats in 2016
  • ·        The role of CASBs in protecting you from the Treacherous 12
More Info

Sponsored by: Palerra

Vendor Webcast

Resiliency and survivability: 2016 Global Threat Intelligence Report

Far too many organizations fall into the “what can I buy with my budget” approach to security as opposed to taking a real hard look at tactical and strategic approaches...

x

Resiliency and survivability: 2016 Global Threat Intelligence Report

Far too many organizations fall into the “what can I buy with my budget” approach to security as opposed to taking a real hard look at tactical and strategic approaches. The annual Global Threat Intelligence Report (GTIR) from NTT Group offers a different approach, hoping to persuade readers into mitigating attacks by providing a roadmap to address threats.

This webinar will review the following from the 2016 GTIR:

 

  • Global Data Analysis Findings from 2015
  • Threat Intelligence – Attribution and Source Confidence
  • Vulnerabilities, Attacks and Exploitations
  • How to Use the 7 Steps of the Kill Chain and Critical Security Controls 

 

More Info

Sponsored by: Solutionary

20/20 Webcast

Rightsizing Your SIEM

This 20/20 webcast looks at some of the issues companies face as they embrace SIEM for the first time.

x

Rightsizing Your SIEM

SIEM might be old hat for large enterprises, but the explosion of threat intelligence technology is fueling the SIEM market -- even for companies that might not have considered it essential in the past. This can be a challenge, especially for companies without the financial and personnel resources. This 20/20 webcast looks at some of the issues companies face as they embrace SIEM for the first time.

More Info

Sponsored by: LogRhythm

Vendor Webcast

A Day Inside a Security Operations Center

In this webinar you’ll get to know what SOC analysts actually do on a daily basis when they aren’t browsing Reddit or cursing the existence of Flash.

x

A Day Inside a Security Operations Center

SOCs, or Security Operations Centers,; You’ve seen them in the news, the movies, even on TV.  But what really happens on the inside? What are they showing on those screens when the cameras aren’t rolling? If you think it’s all about the screens and even more screens you only know half the story. In this webinar you’ll get to know what SOC analysts actually do on a daily basis when they aren’t browsing Reddit or cursing the existence of Flash.

Join this webinar to learn:

 

  • What happens in a SOC on a typical day, when there aren’t “incidents”
  • Roles, responsibilities and skillsets of successful SOC teams
  • Why teamwork is essential to a SOC

 

We'll finish up with a demo of AlienVault USM to show how it can help SOC analysts speed up threat detection and incident response.

More Info

Sponsored by: AlienVault

Vendor Webcast

Securing the Identity Perimeter: Defeat cloud and mobile threats with enlightened cloud security

In this webinar, we discuss the importance of securing the identity perimeter and gathering deep insights into authentication activity

x

Securing the Identity Perimeter: Defeat cloud and mobile threats with enlightened cloud security

Today, cloud and mobile computing has changed the nature of the network perimeter. The threat of a data breach has grown. CISOs are faced with a monumental challenge: Securing information wherever it resides, without interfering with the productivity of the mobile, connected workforce.

In this webinar, we discuss the importance of securing the identity perimeter and gathering deep insights into authentication activity. Accurately tracking the who, what, where, when, and why (along with how and how much) of data access can mean the difference between shutting your entire network down, or just shutting a hacker out.

Key takeaways:

 

  • How adopting cloud solutions improves your security posture
  • Why effective security measures start with a great user experience
  • Why contextual user access data is the key to unlocking smarter security policies

 

More Info

Sponsored by: Okta

Vendor Webcast

Go ahead: make my day!  Secrets to resolving the daily demands on IT Admins and CISO’s

Join Thycotic as we walk through a day in the life of an IT Admin and CISO.

x

Go ahead: make my day! Secrets to resolving the daily demands on IT Admins and CISO’s

IT Administrators and CISO’s have to juggle tons of tasks every day while balancing security policies with productivity goals in order to keep our systems running, updated, and secure---and make sure users have what they need to get their jobs done.  From needing an admin password to fix an employee’s workstation or managing employee turnover, to scanning the network for vulnerabilities, how your privileged credentials are managed by these teams can enable instantaneous action or create bottlenecks that hamper both security and productivity.

Join Thycotic as we walk through a day in the life of an IT Admin and CISO, where we demonstrate how many of the most demanding IT challenges can be solved in minutes with the proper tools to automate privileged account management and security.

More Info

Sponsored by: Thycotic

Vendor Webcast

Getting scammed: A security CEO’s firsthand encounter

Join Tom Kemp, CEO of Centrify, as he shares his firsthand account as a target of this scam and tips to avoid becoming a victim of a BEC scam.

x

Getting scammed: A security CEO’s firsthand encounter

It’s a business’s worst nightmare. Hundreds of thousands, or even millions, of dollars have been transferred out of company accounts and into a scammer’s hands.

Business email compromise (BEC) also known as “CEO fraud,” attempts to trick employees into carrying out large wire transfer payments by impersonating upper management. These types of scams are becoming extremely sophisticated through usage of social engineering or computer intrusion techniques and are an emerging global threat. The FBI reports that over 12,000 victims have lost $2 billion in the last two years.

Join Tom Kemp, CEO of Centrify, as he shares his firsthand account as a target of this scam and tips to avoid becoming a victim of a BEC scam.

More Info

Sponsored by: Centrify

Virtual Conference

Mobile Security

Keynote: Mitch Parker, CISO, Temple University Health System Platinum Sponsors: CA Technologies, Centrify

x

Mobile Security

There was a time every computer user used a desktop system or terminal. We call that ancient history. Today's user might have a laptop, tablet, cell phone or two, and other specialized mobile device that is customized to their job responsibility. data is mobile and must be rendered across multiple platforms, but it also has to be secure across multiple platforms as well. This eSymposium will address strategies companies can take to ensure that their data is safe, no mater where or how it is accessed.

More Info

Sponsored by: SC Magazine

Vendor Webcast

Network + Endpoints: Unifying Visibility, Capabilities and Intelligence for Action

Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence.

x

Network + Endpoints: Unifying Visibility, Capabilities and Intelligence for Action

Advanced and evasive threats are growing exponentially and getting harder to detect. Adversaries are continuing to get more sophisticated and targeted in their attacks even sometimes gaining access to your company’s network by “living off the land” and using little to no malware at all. Unified visibility and interpretation of all of the data across your network and endpoints has never been so valuable to ensure that your team is able to accurately detect and quickly respond threats to your organization. 

Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence, people and processes to enable you to reduce the time to detect and effort to respond by answering the following questions:

•        Is there an advanced threat actor present on my network or endpoints?
•        Who is behind the attack?
•        How did they get in? 
•        What did they take?
•        Which systems have been compromised?
•        How do I best repair the damage quickly and get them out?

In addition, we’ll go over analyst insights and predictions about industry trends as well as specific use cases examples from the SecureWorks Counter Threat UnitTM research team that showcase how our clients are leveraging endpoint and network visibility to significantly reduce their risk as well as costs to respond to identified threats.

More Info

Sponsored by: Dell SecureWorks

Vendor Webcast

Not your father’s tokenization solution: Recent Innovations are driving use cases beyond PCI

In this webinar we will discuss how format preserving encryption is the engine behind seismic shifts in performance and scale required when moving and processing...

x

Not your father’s tokenization solution: Recent Innovations are driving use cases beyond PCI

Tokenization is changing how we solve security problems. Long considered a stop-gap security measure for PCI compliance, recent innovations of vaultless tokenization help solve emerging use cases for desensitizing sensitive data at scale. 

 

In this webinar we will discuss how format preserving encryption is the engine behind seismic shifts in performance and scale required when moving and processing large amounts of data in complex IT environments. Join us to learn how these new algorithms are driving a new era in vaultless tokenization, and the new data protection use cases for cloud and big data environments—including supporting PCI DSS, ePHI and GDPR compliance. 
More Info

Sponsored by: Vormetric

Vendor Webcast

State-of-the-Hack: The Top 10 Security Predictions for 2016

As the new year begins, we can expect the size, severity and complexity of cyber threats to continue to increase in 2016.

x

State-of-the-Hack: The Top 10 Security Predictions for 2016

As the new year begins, we can expect the size, severity and complexity of cyber threats to continue to increase in 2016. Attacks will continue to evolve, forcing organizations to expand their focus and be flexible to withstand unexpected, high impact events. Some of the notable predictions include cyber criminals leveraging personally identifiable information (PII), trusted partner networks, hacktivism, ransomware for corporations, and many more.

 

What are the top 10 security predictions for 2016 that you should care about?

 

Join Michael Sutton, CISO, Zscaler, Inc., for a comprehensive overview of what to expect in 2016, including:

 

  • The top 10 security predictions for 2016
  • How these key trends will impact your organization
  • Critical takeaways for a comprehensive security strategy in 2016

 

More Info

Sponsored by: Zscaler

Virtual Conference

Advanced persistent threats

This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable...

x

Advanced persistent threats

It is no secret that bad guys are attacking your network every day. Nor should it surprise anyone that bad guys are already inside your network looking for data to exfiltrate. This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable corporate data. We also will look at approaches to identify potential attacks vectors so that the security can focus on the anomalies while allowing regular business traffic to pass through the network.
More Info

Sponsored by: SC Magazine

Vendor Webcast

2016 Cyber-Security Trends and Predictions – Behavioural Analytics is the game change

With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared as they head into 2016...

x

2016 Cyber-Security Trends and Predictions – Behavioural Analytics is the game change

As we see more and more media coverage of data breaches and security incidents, the inevitable question becomes, “What are we doing to make sure that doesn't happen to us?” In 2015 there were numerous high-profile breaches include; insurance companies, government organizations, kid’s internet gaming, power utilities and dating sites.  With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared as they head into 2016.

Enter machine learning and behavioral analytics – a technology that is at the top of most everyone’s hot new technologies for 2016, but can this technology detect and help stop cyber-attacks?

Listen to Joseph Blankenship, Senior Security & Risk Analyst at Forrester Research, and Stephan Jou, CTO at Interset, discuss what you need to know for the coming year and predict how behavioral analytics will play in the fight to stop cyber-attacks. Topics will include:
  • Key strategies for taking a proactive stance against advanced attacks
  • How behavioral analytics effectively detects and surfaces targeted attacks
  • Addressing the inside threat – compromised accounts and malicious employees
  • How analytics can be successfully operationalized in an information-protection program
More Info

Sponsored by: Interset

Vendor Webcast

Go Beyond the Firewall with DNS

Today’s security appliances and agents have to wait until malware reaches the perimeter or endpoint before they can detect or prevent it. That’s not the case with...

x

Go Beyond the Firewall with DNS

Nothing stops threats earlier than DNS-layer network security. Today’s security appliances and agents have to wait until malware reaches the perimeter or endpoint before they can detect or prevent it. That’s not the case with OpenDNS.

DNS is known for being a fundamental component in how we connect to the Internet, but it’s also a revolutionary way of providing security visibility and enforcement—whether users are on or off the corporate network. 

Join this webcast and learn:
• How DNS can be used for security beyond the firewall
• How easy it is for enterprises to deploy this additional layer of network security worldwide

More Info

Sponsored by: OpenDNS

Virtual Conference

How cybercriminal gangs work

Keynote:Eric Shiffman,Task Force FBI Chicago Division Platinum Sponsors: HPE, TrendMicro

x

How cybercriminal gangs work

Movies are wonderful diversions, but they fail miserably in showing how cybercriminal gangs really work. These gangs are not just based in dark rooms in China or Russia, but sometimes they thrive in breezy cafes in the United States. This eSymposium will look at the different types of cyberattacks (ransomware, corporate espionage, state-sponsored, hacktivists, and others), what motivates cybercriminals, and various approaches companies can take to make their data less interesting to these gangs.     

Keynote Session
Eric Shiffman
Supervisory Special Agent – Criminal Cyber Investigations / Task Force FBI Chicago Division

Platinum Sponsors:
Hewlett Packard Enterprise
TrendMicro

                                                                                                                                                                                                 

More Info

Sponsored by: SC Magazine

20/20 Webcast

Harnessing Big Data Security

This 20/20 webcast takes a dive into what big data really means and how companies can harness the potential of big data analytics.

x

Harnessing Big Data Security

We hear a lot about big data and how it is going to change the way enterprises will manage network security? But what does that really mean? Today’s 20/20 webcast takes a dive into what big data really means and how companies can harness the potential of big data analytics.
More Info

Sponsored by: SAS

Vendor Webcast

Latest Trends in Web Application Security

Join John Graham-Cumming, CTO of CloudFlare, as he shares the latest trends and changes in Web Application Security

x

Latest Trends in Web Application Security

Web Application Firewall security is evolving. Join John Graham-Cumming, CTO of CloudFlare, as he shares the latest trends and changes in Web Application Security. This talk will give details of the big trends in web application security seen in 2015, and how to defend against these threats and talk about the evolving web application security landscape. 

More Info

Sponsored by: CloudFlare

20/20 Webcast

Defending against insider threats - Malicious and benign

This 20/20 webcast will look at the challenge of a variety of insider threats and what you can do about it.

x

Defending against insider threats - Malicious and benign

How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks, deliberate or accidental, put a lot of corporate data at risk. Often companies don’t even know how much data they have at risk. This 20/20 webcast will look at the challenge of a variety of insider threats and what you can do about it.

More Info

Sponsored by: LogRhythm

Vendor Webcast

Defending Your Organization Against Ransomware

In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat.

x

Defending Your Organization Against Ransomware

It’s 2:00 p.m. on a Friday afternoon and you get that fateful call. An employee’s laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link he/she thought might help, a message appears indicating that his files have been encrypted and that a ransom fee must be paid to get them back.
 
Not knowing what to do, the user called your SOC. Unfortunately, it wasn’t just a single laptop, but the file shares that it was connected to were encrypted beyond reach. Other callers start coming in. Files in various department shares are “corrupted” and things are grinding to a halt. Another ruined weekend for the SOC and IT—and likely another payday for the bad guys.
 
In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You’ll also be given a framework that you can work through to better protect your organization in the face of this looming menace.
 
Join this webinar to learn:
  • The early indicators of Ransomware
  • Automated defenses that you can put in place to thwart the attack
  • The steps that must be followed (with robotic precision) to make a mole hill out of the possible mountain
More Info

Sponsored by: LogRhythm

Vendor Webcast

 Top 10 Best Practices for Privileged Identity Management

This webcast explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud

x

Top 10 Best Practices for Privileged Identity Management

Data breaches continue to be top of mind for organizations large and small. Three key dynamics are making that challenge much harder — the cloud, the growing sophistication of attackers and dramatic growth in outsourced services. This webcast explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and outsourced administrators. 
Watch this webcast to learn about:
  • Trends impacting data security and increasing identity-related risks
  • How to reduce the risk of security breach by minimizing your attack surface & stopping in-progress attacks
  • Best practices for managing and governing privileged identities in the modern enterprise
More Info

Sponsored by: Centrify

Vendor Webcast

Make Security Great Again: What works in practice? Examples from the real world

In this webinar, A.N. Ananth, co-founder and CEO of industry award-winning EventTracker, shows you how a blend of technology, experts and process simplify your...

x

Make Security Great Again: What works in practice? Examples from the real world

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2016 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins are so busy managing operations and ensuring the company's ongoing security efforts that "detection deficit" sets in and they miss key indicators that their network has been compromised.

 In this webinar, A.N. Ananth, co-founder and CEO of industry award-winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex life. See practical examples from a team that reviews more than a billion logs daily.

More Info

Sponsored by: EventTracker

Virtual Conference

PCI Compliance

Protecting PII was difficult enough when US-based consumers thought it was done by mirrors and magic.

x

PCI Compliance

Protecting PII was difficult enough when US-based consumers thought it was done by mirrors and magic. For the past six months, consumers have had hands-on experience with chip-protected bank cards, yet data breaches still occur. This eConference will look at how PCI compliance is changing due to pressures from consumers on one side, corporate management that finally is starting to take data security seriously, and the CISO in between them who must implement bank card security while balancing the pressures from consumer and management.
More Info

Vendor Webcast

Forget the SIEM. What you need is a SOC!

This webinar will cover the following topics to help mid-market companies understand what the best approach may be for their unique security and operational requirements...

x

Forget the SIEM. What you need is a SOC!

Hackers love mid-market companies.  
  • They have less robust cybersecurity and limited staff
  • Lack budget and resources for a comprehensive cybersecurity plan
  • Lack access to advanced security tools and best practices

This webinar will cover the following topics to help mid-market companies understand what the best approach may be for their unique security and operational requirements. 
  • Cyber attack detection and prevention data showing that most companies do not even know they have been breached
  • Security monitoring options for mid-market companies ranging from SIEMs to managed security service providers
  • Overview of the differences between traditional managed security services and a SOC-as-a-service

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Recognizing the Collective Risk, HPE 2016 Cyber Risk Report

This session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected...

x

Recognizing the Collective Risk, HPE 2016 Cyber Risk Report

In a world where all devices now have global reach, risk is no longer contained to just one organization. Breaches now have collateral damage and legislation threatens security practitioners in unintended ways. Just as attackers continue to evolve their techniques, defenders must accelerate their approach to detection, protection, response, and recovery as we move into the concept of the digital enterprise. Jewel Timpe, Senior Manager at HPE Security Research, will highlight our unique perspective on the attack surface. Drawing from the latest findings from the 2016 Cyber Risk Report, this session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected world.
More Info

Sponsored by: HPE

Vendor Webcast

15 Years of Web Security: The Rebellious Teenage Years

Fifteen years ago, Jeremiah Grossman founded WhiteHat Security to help secure the web by enabling organizations to find and fix application vulnerabilities before...

x

15 Years of Web Security: The Rebellious Teenage Years

Fifteen years ago, Jeremiah Grossman founded WhiteHat Security to help secure the web by enabling organizations to find and fix application vulnerabilities before the bad guys could exploit them. With the knowledge and perspective that comes from being an application security leader for a decade and a half, Jeremiah will provide perspectives on:

  • How the types of threat actors have changed and what they now target
  • The intersection of security guarantees and cyber-insurance
  • Easing the burden of vulnerability remediation
  • Measuring the impact of SDLC security controls
  • Addressing the application security skill shortage
More Info

Sponsored by: WhiteHat

Vendor Webcast

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. The challenge posed by this new mobile world is security.

x

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. Your employees are only going to use them more and more in their jobs — and customer service levels, enterprise agility, and overall profitability will improve because of it. The challenge posed by this new mobile world is security. Traditional identity and access controls built around desktops and laptops won’t work. Passwords are too vulnerable, hardware tokens are too cumbersome, smart cards don’t fit and any approach that causes most employees trouble will lead them to circumvent friction.

More Info

Sponsored by: Entrust

Vendor Webcast

Top 5 Ways Next-Generation Data Masking Is Changing How Businesses Prevent Breach

With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data.

x

Top 5 Ways Next-Generation Data Masking Is Changing How Businesses Prevent Breach

With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach.

Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data — without the slowdown caused by traditional methods. Join this webinar to learn:

  • The key reasons why next-generation data masking reduces risk of breach
  • How masking compares to other security approaches such as encryption
  • Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX
More Info

Sponsored by: Delphix

Virtual Conference

Web Application Security

This eSymposium looks at various web application security approaches and how you can protect your data and applications in the cloud.

x

Web Application Security

The eggshell is broken. Bad guys are inside your network. Now it’s time to rethink how you protect your data and your applications — especially in the cloud. Even when the bad guys are able to breach your cloud-based software, it only is valuable if they can monetize it. This eSymposium looks at various web application security approaches and how you can protect your data and applications in the cloud.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Why wait for malware to reach your perimeter or endpoint when you can block it on the Internet

Learn why companies are shifting security to the cloud. And why it takes only 30 minutes to protect any device, anywhere.

x

Why wait for malware to reach your perimeter or endpoint when you can block it on the Internet

There are two dilemmas with your security stack. First, your threat protections must wait until malware reaches your perimeter or endpoint before they can detect and prevent. Second, your mobile employees must keep their VPN always on for your full security stack to have control and visibility. 

Malware as well as command & control servers and phishing sites reside on the Internet. OpenDNS leverages the Internet’s existing infrastructure—the Domain Name System—to block these threats. Blocking threats on the Internet results in a 2-10X reduction in break-fix busy work and security alert noise.

Your mobile employees get work done using Office 365, Salesforce, Box, and other cloud-hosted business apps, which means they don’t turn the VPN on. OpenDNS’s cloud-delivered network security service is a new layer of breach protection and Internet-wide visibility on and off the corporate network. You can even extend existing threat protections beyond your perimeter using our API-based integrations.

Learn why companies are shifting security to the cloud. And why it takes only 30 minutes to protect any device, anywhere.

More Info

Sponsored by: OpenDNS

Virtual Conference

SIEM

This eSymposium on SIEM will addresses the challenges companies face in making sure their log files are providing the data they need to make educated decisions...

x

SIEM

Having great log data is great. Actually making the data actionable is something else. This eSymposium on SIEM will addresses the challenges companies face in making sure their log files are providing the data they need to make educated decisions based on accurate and useful information. It also will address the perennial questions: Is SIEM dead?
More Info

Sponsored by: SC Magazine

Vendor Webcast

Best Practices: Server Configuration

We will discuss how secure server configuration for SSL protects your sites from online threats

x

Best Practices: Server Configuration

The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement.
 

We will discuss how secure server configuration for SSL protects your sites from online threats and: 

  • Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems 
  • Enhanced Security Features: Discuss enhanced security features and the benefits they provide 
  • Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server

 



 

More Info

Sponsored by: Entrust

Vendor Webcast

Endpoint Threats: How to Understand the Full Scope of an Attack

Join this webinar to hear an update from one of RSA's Incident Responders, Jared Myers, discuss how RSA’s endpoint threat detection and blocking solution helps...

x

Endpoint Threats: How to Understand the Full Scope of an Attack

Adversaries and their tactics and procedures continue to become more targeted, dynamic, and sophisticated. Much of the advanced malware and activity is geared toward the endpoint. Why? It's the most human interactive system in a network, making it a prime target. Therefore, organizations need an effective endpoint security strategy that helps security teams expose, analyze and respond to advanced threats faster. 

Join this webinar to hear an update from one of RSA's Incident Responders, Jared Myers, discuss how RSA’s endpoint threat detection and blocking solution helps security teams understand the full scope of an attack.

You will also learn how to address endpoint threats by:
  • Detecting malware leveraging behavioral techniques rather than signatures
  • Linking low confidence events to correlate high confidence events
  • Achieving deep endpoint visibility and real-time alerting
  • Using intelligent, risk-level scoring system to prioritize threats
  • Confirming infections quickly and blocking with precision in real time
  • Gathering relevant investigation data quickly

More Info

Sponsored by: RSA

Vendor Webcast

How to Leverage Threat Intelligence for Every Day Defense

For IT security teams considering integrating threat intelligence, what are the first steps to get started?

x

How to Leverage Threat Intelligence for Every Day Defense

As malware becomes more commercialized, attackers are leveraging the same attack kits again and again. Threat intelligence offers the ability to detect attacks carried out using methods previously reported by others. But,only if it can be effectively integrated into security controls & processes. For IT security teams considering integrating threat intelligence, what are the first steps to get started?

Join AlienVault for this practical session covering:

  • How to evaluate threat intelligence sources
  • How to get started with threat intelligence
  • How to simplify the integration of threat intelligence into your daily operations
  • Practical use cases for mid-market organizations

 

More Info

Sponsored by: AlienVault

Vendor Webcast

Successfully Securing the Cloud: A Primer for Success at Blue Cross and Blue Shield of Minneapolis

In this webinar, Jeremie Kass will share his experience of rolling out a comprehensive security framework to monitor and protect critical Cloud services including...

x

Successfully Securing the Cloud: A Primer for Success at Blue Cross and Blue Shield of Minneapolis

Like many leading enterprises today, Blue Cross and Blue Shield of Minneapolis has embraced the Cloud services as critical enablers for their business. In this webinar, Jeremie Kass (Cloud Security Architect at Blue Cross Blue Shield of Minneapolis) will share his experience of rolling out a comprehensive security framework to monitor and protect critical Cloud services including Microsoft Office365, Salesforce and ServiceNow. 

During this webinar, Jeremie Kass will cover:
  • Key considerations and requirements for securing enterprise Cloud applications.
  • How to lay a foundation to monitor the entire Cloud environment, from IaaS to SaaS.
  • Best practices for monitoring and securing users, data and workloads in the Cloud.

This webinar is sponsored by Palerra, the industry leader in Cloud Security Automation.  Palerra enables organizations to protect business-critical cloud infrastructure, data and applications with LORIC™, the cloud security automation platform.  

More Info

Sponsored by: Palerra

Virtual Conference

Cloud Security

This eSymposium will look at the potential storm brewing around whether or not your service provider's cloud is secure.

x

Cloud Security

As the cliché goes, “Everyone talks about the weather but no one does anything about it.”  This eSymposium will look at the potential storm brewing around whether or not your service provider's cloud is secure. There is a natural dichotomy between cloud providers that want to limit their risk and their customers that rely on the provider to supply appropriate security. As a result, cloud security often comes down to two main discussions: trust with verification and the Service Level Agreement. Today we will look at how customers can negotiate the murky waters of the Terms of Service and the Service Level Agreement in order to feel secure with their chose cloud provider.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Why You Should Take DNS as a Threat Vector Seriously

Taking a DNS-centric approach to security can help address the variety and sophistication of threats aimed at taking down network infrastructure and stealing data...

x

Why You Should Take DNS as a Threat Vector Seriously

According to the Infoblox DNS Threat Index Q3 Report, the creation of Domain Name System (DNS) infrastructure for exploit kits soared a whopping 75% over a year prior, with Angler being the most widely used exploit kit. Recently, Cisco's Talos security group reported disrupting a major part of the Angler network infrastructure, some of which incorporated infected servers of a targeted service provider. Before Cisco took action, this malicious operation had been generating an estimated $30 million annually for the perpetrators—proof that cybercrime pays. 

It’s also a good example of why networking and security teams need to go beyond traditional perimeter defenses to address what happens once malware gets inside the network. Taking a DNS-centric approach to security can help address the variety and sophistication of threats aimed at taking down network infrastructure and stealing data. 

 Attend this webinar to learn about:

  • The latest Infoblox DNS Threat Index, and what it has revealed about the threats to your critical infrastructure and data
  • The top DNS threats
  • Best practices for improving security through DNS

 



 

More Info

Sponsored by: Infoblox

Vendor Webcast

Combating Insider Threats – Protecting Your Agency from the Inside Out

Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.

x

Combating Insider Threats – Protecting Your Agency from the Inside Out

When Edward Snowden leaked classified information to the mainstream media, it brought the dangers posed by insider threats to the forefront of public consciousness, and not without reason.  Today’s agencies are drowning in fears surrounding sophisticated cyber-attacks but perhaps the most concerning type of attack out there – the insider threat.   According to Forrester, abuse by malicious insiders makes up 25% of data breaches.  Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.  

•         Become aware of the different types of insider threats, including their motives and methods of attack
•         Understand why conventional security tools like firewalls, antivirus and IDS/IPS are powerless in the face of the insider threat
•         Gain clarity on the various technologies, policies and best practices that should be put in place to help detect and thwart insider threats
•         Discover how network logs, particularly NetFlow, can be used to cost-effectively monitor for suspicious insider behaviors that could indicate an attack
•         Know about emerging attack methods such as muleware that could further escalate insider threats in the coming years



 

More Info

Sponsored by: Lancope

MarketFocus Webcast

Cyber Threat Intelligence Demystified

We were able to take the mystery out of how organizations are using threat intelligence and how ThreatStream can help solve the pain points enterprises face today...

x

Cyber Threat Intelligence Demystified

Cyber threat intelligence is one of the hottest, most talked about topics in security today.  Security teams are trying to get a handle on whether their intelligence programs are on target with the latest advances.  What does it all mean? What are the best practices that enterprises are leveraging?  Am I getting value out of my current security investment?

In an extensive survey, we were able to take the mystery out of how organizations are using threat intelligence and how ThreatStream can help solve the pain points enterprises face today.  

More Info

Sponsored by: ThreatStream

Vendor Webcast

5 top security issues enterprises should prepare for in 2016

Join for a special online discussion with Chief Technology Officer, Amrit Williams and CMO Mitch Bishop as they discuss what are expected to be some of the most...

x

5 top security issues enterprises should prepare for in 2016

The cybersecurity landscape is changing fast and security teams need to keep up. As we all prepare for 2016, there are critical forces at work that should influence our planning on both technology and business fronts.
Join for a special online discussion with Chief Technology Officer, Amrit Williams and CMO Mitch Bishop as they discuss what are expected to be some of the most pressing security issues in 2016, and advice on how to plan ahead.

 Tune into this informative webinar to learn:

  • What security issues will be at the forefront in the coming year?
  • How the vendor landscape is changing and the impact to your security strategy.
  • Best practices to help your organization future-proof your security investments.

 

More Info

Sponsored by: CloudPassage

Vendor Webcast

Don’t Let Docker Containers Set Sail Unprotected

Join Vormetric’s Chief Security Officer, Sol Cates, to explore Docker’s architecture, and how organizations are shoring up the gaps that this amazing new model...

x

Don’t Let Docker Containers Set Sail Unprotected

The world of containers and micro services is very exciting as it is disrupting the way we all develop and deploy software at an amazing pace.  However, many like you are trying to get to the bottom of what security in Docker means, and how you will operationalize security with containers.  Security professionals must be ready to protect their companies that are rushing to optimize their development and resource utilization with containers. 

 

Join Vormetric’s Chief Security Officer, Sol Cates, to explore Docker’s architecture, and how organizations are shoring up the gaps that this amazing new model is presenting.

More Info

Sponsored by: Vormetric

Virtual Conference

Insiders with Access

This eSymposium will look at various physical and logical security approaches the CISO can take to protect corporate data.

x

Insiders with Access

Most companies don’t make a federal case out of an employee going home with a company pen or extra tablet of paper. But it quite possibly could become a federal case if the employee walks out with the company’s intellectual property or customer database to sell to a competitor or foreign agent. This eSymposium will look at various physical and logical security approaches the CISO can take to protect corporate data. The discussion will range from multifactor authentication and controls for physical access to data, as well as identity, credential and access management defenses that logically provide defenses.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Smart Authentication Can Stop Data Breaches

This webinar shows you what Okta Adaptive MFA brings to your security plan.

x

Smart Authentication Can Stop Data Breaches

Every IT professional¹s nightmare. One breach can damage your brand and costs a fortune. It¹s your job to stop it. But you¹ve been fighting an army of hackers with underpowered tools. Until now. Okta Adaptive Multi-factor Authentication (MFA) is smarter. Use it to set up robust authentication policies. It works with second factors like Okta Verify with Push, SMS verification, and YubiKey. And it integrates easily with your apps and VPNs. This webinar shows you what Okta Adaptive MFA brings to your security plan.

In this webinar you will learn how Okta Adaptive Multi-factor Authentication
  • Provides a rich set of contextual access policies to protect access to your applications
  • Offers a comprehensive set of second factors to secure access for all your users
  • Integrates with all your apps and VPNs to eliminate coverage gaps
More Info

Sponsored by: Okta

Virtual Conference

Cyber Threat Intelligence

Here, for your consideration, are some thoughts on how to improve and expand your threat intelligence operations.

x

Cyber Threat Intelligence

Cyber threat intelligence is one of the keys to unlocking potential attacks by state-sponsored attackers and criminals alike. If you understand how, where and why an attacker will try and breach your network, you can build defenses that identify and shut down the attacks quickly. The question becomes how do you obtain the requisite intelligence you need. What, for example, can the deep web and other outside intelligence troves tell us about emerging threats? What policies, procedures and processes can enterprises employ today to improve the analysis of data they already have in their log files, SIEMs and beyond? Here, for your consideration, are some thoughts on how to improve and expand your threat intelligence operations.
More Info

Sponsored by: SC Magazine

Virtual Conference

Hacktivism

These vigilante-style, politically motivated attacks are meant to embarass executives by publicizing their secret dealings.

x

Hacktivism

These vigilante-style, politically motivated attacks are meant to embarass executives by publicizing their secret dealings. What can authorities do to go after those behind these illegal activities, and how can corporations better protect themselves so incidents such as those that happened at the NSA, RSA, Twitter, PayPal, Sony, Pfizer, the FBI, a number of police forces, the U.S. military and many other entities, doesn't happen to them? We'll take a deep dive.
More Info

Sponsored by: SC Magazine

20/20 Webcast

Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks.

x

Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats

“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research.

This shift in investment highlights the fact that organizations require a new security model designed to rapidly detect and neutralize cyber-threats that have penetrated the enterprise perimeter or originated from within.

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks. The webinar will also cover how you can use next-generation security solutions to detect, respond to and neutralize these threats to reduce the risk of a material breach or cyber incident.

You will learn how machine data generated across your network—including contextual identity and access telemetry from the Cisco Identity Services Engine (ISE)—can be leveraged by LogRhythm’s security intelligence and analytics platform to provide organizations with highly corroborated risk-based alerts and enable immediate automated response to contain threats by interfacing with Cisco pxGrid to take protective action.  

Join this webinar to learn:

 

  • Common ways hackers get into your network
  • How threat actors attempt to avoid detection
  • Tips on finding the hacker trail: how to look in the right place
  • How to expand and accelerate your organization’s mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR)

 

More Info

Sponsored by: LogRhythm

Vendor Webcast

The Good, the Bad and the Secure of Mobile Identities

This webinar will help you understand how mobile incorporated into your existing enterprise environment.

x

The Good, the Bad and the Secure of Mobile Identities

Take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.

 

This webinar will help you understand how mobile incorporated into your existing enterprise environment. Entrust Datacard’s Jason Soroko will take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.

 

Key Benefits:

·         What Makes Mobile Different — Define the major differences between mobile architecture and that of a desktop.

·         Applications for an Enterprise Environment — Probe into mobile applications and their uses in a modern mobile business environment.

·         Staying Ahead of Threats — Uncover the threats to mobile that may affect your business environment.

·         Best Practices – Find out how to securely develop mobile applications.

·         Look to the Future — Get an outlook on the capabilities of mobile technology in the pipeline.

More Info

Sponsored by: Entrust

Vendor Webcast

Defend Your Network Now: The Top 5 Things You Need to Know

In this webinar, A.N. Ananth, CEO of industry award winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex...

x

Defend Your Network Now: The Top 5 Things You Need to Know

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2015 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins  are so busy managing operations and ensuring the company's ongoing security efforts that "detection deficit" sets in and they miss key indicators that their network has been compromised. 

 In this webinar, A.N. Ananth, CEO of industry award winning EventTracker, shows you how a blend of technology, experts and process  simplify your already complex life.  Learn about:

  • Rogue process detection
  • Evidence of persistence
  • Suspicious traffic
  • Unknown processes
  • Unusual OS artifacts

Protect your network now.

More Info

Sponsored by: EventTracker

20/20 Webcast

A Vision of Vulnerabilities

Today’s 20/20 webcast will address how companies can increase the visibility of potential vulnerabilities through better use of tools, intelligence and analytics...

x

A Vision of Vulnerabilities

According to the Verizon Data Breach Report, “97% of breaches are avoidable through standard controls.” If the key to eliminating APTs and other high-cost, high-profile breaches is implementing common-sense, standardized controls, what should CISOs do to bring their risk management to the next level? What trends can we expect to see in 2016 that will address the vulnerabilities that have led to major breaches over the past few years? Today’s 20/20 webcast will address how companies can increase the visibility of potential vulnerabilities through better use of tools, intelligence and analytics.

More Info

Sponsored by: Skybox

Vendor Webcast

Why manufacturers are using the cloud to deliver infosec

Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

x

Why manufacturers are using the cloud to deliver infosec

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

 

Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team.

 

They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

 

Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:

 

  •  why they use a layered approach to security
  • how his security analyst, Kevin Merolla, quickly responds to incidents or false positives 
More Info

Sponsored by: OpenDNS

Vendor Webcast

Turning Tables On Cybercriminals

Attendees of this webcast will get recommendations on building the kind of security architecture that shifts the power balance toward defenders.

x

Turning Tables On Cybercriminals

The attacker defender asymmetry is well known. While it’s impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint. Doing so requires a focus on the inside of networks and all the data that passes back and forth there. With the security architecture to continuously monitor and analyze network data, organizations can uncover the patterns of that telegraph attacker lateral movement and malicious communication before data is stolen or lost. Attendees of this webcast will get recommendations on building the kind of security architecture that shifts the power balance toward defenders.

 

They will get practical advice for:

  • Security architecture re-design
  • Leverage of network-wide visibility for attack detection
  • Sustaining and scaling multi-tiered security environments
More Info

Sponsored by: Gigamon

20/20 Webcast

SIEMs Like Old Times

This 20/20 looks at various approaches on how to ensure your SIEM is working at top efficiency, regardless of the vendor that supplies the application.

x

SIEMs Like Old Times

Just about every major enterprise employs a SIEM. However, if your SIEM isn’t tuned correctly, you might not be able to get the most out of this extremely complex and expensive piece of software. This 20/20 looks at various approaches on how to ensure your SIEM is working at top efficiency, regardless of the vendor that supplies the application.
More Info

Sponsored by: LogRhythm

Virtual Conference

Vulnerability Management

Cybercriminals frequently take advantage of vulnerabilities in web and other applications to gain entrance to wider corporate infrastructures. We learn from experts...

x

Vulnerability Management

Cybercriminals frequently take advantage of vulnerabilities in web and other applications to gain entrance to wider corporate infrastructures. We learn from experts what companies can do to mitigate against these threats.
More Info

Sponsored by: SC Magazine

Virtual Conference

ID Management

We will survey how security professionals can best safeguard cloud-based applications, critical databases and more via ID management tools and techniques.

x

ID Management

We will survey how security professionals can best safeguard cloud-based applications, critical databases and more via ID management tools and techniques.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Six Steps to SIEM Success

Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

x

Six Steps to SIEM Success

The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can:

    • Identify exposures
    • Investigate incidents
    • Manage compliance
    • Measure your information security program

 

However, going from installation to insight with a SIEM can be a challenge. Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

More Info

Sponsored by: AlienVault USM

Vendor Webcast

How to Build a World-Class Threat Intelligence Capability From Scratch

This webinar will reveal critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

x

How to Build a World-Class Threat Intelligence Capability From Scratch

Threat intelligence is a broad subject and the natural tendency is to produce intelligence on any topic or event regardless of its applicability to the company. True success in threat intelligence depends on focusing intelligence efforts to very specific business objectives, which removes the large surface area and leaves only a challenging sliver of ultra-high value to pursue. This webinar will reveal critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

More Info

Sponsored by: Recorded Future

Vendor Webcast

Keeping Compromises from Becoming Breaches

In this webinar we will explore how unified security intelligence is empowering organizations to accelerate their mean-time-to-detect (MTTD) and mean-time-to-respond...

x

Keeping Compromises from Becoming Breaches

The stakes have never been higher as businesses attempt to protect their assets from a barrage of threats that continue to grow in frequency and sophistication.

 

However, even the most advanced cyber security teams acknowledge that user accounts, systems and networks WILL be compromised, regardless of the prevention measure in place.  It’s amidst this reality that organizations are exploring new, more effective ways to detect and respond when the inevitable occurs. 

 

In this webinar we will explore how unified security intelligence is empowering organizations to accelerate their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to compromises and avoid material breaches.  

 

Chris Kissel, industry analyst from Frost & Sullivan will start with a quick update on the state of SIEM and how next-gen SIEM has evolved to deliver true security intelligence through a number of new capabilities including behavioral analytics, network and endpoint monitoring and analytics, as well as advanced search capabilities.

 

Attend this webinar if you:

  • Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
  • Struggle to find the needle in the haystack of security events
  • Believe your current incident response process lacks adequate automation and efficiency
  • You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots
More Info

Sponsored by: LogRhythm

Vendor Webcast

Visual hacking high-risk areas in vertical industries

While visual hacking is a threat to any industry, it can be especially dangerous in healthcare and financial industries, where some of the most sensitive personal...

x

Visual hacking high-risk areas in vertical industries

While visual hacking is a threat to any industry, it can be especially dangerous in healthcare and financial industries, where some of the most sensitive personal and financial information is routinely accessed and displayed. But even with passwords, firewalls and Secure IDs, a simple glance may compromise your organization’s privacy – no matter the industry. Learn about the unique visual privacy approaches to consider in different high-risk industries including healthcare, finance and education, help educate your organization on the issue of visual privacy and discover potential actions to implement in preventing sensitive data from being compromised due to visual hacking.
More Info

Sponsored by: 3M

Virtual Conference

Advanced Persistent threats

Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague...

x

Advanced Persistent threats

Cybercriminals enlisting APTs are patient and much more technically advanced than the common cyberthief. These more sophisticated and motivated miscreants infiltrate networks and surreptitiously steal critical data bit by bit, day by day, month by month. If a company reacts too hastily after discovering them, the bad guys can quickly modify the coding on which their attacks are based and regain anonymity. Some companies are getting a handle on these elite attackers and their methods. We look to them to help us better equip other security teams to address this plague. 
More Info

Sponsored by: SC Magazine

Vendor Webcast

Cover your “What happens off-network, stays off-network” security gap

We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these...

x

Cover your “What happens off-network, stays off-network” security gap

We know that “What happens in Vegas, stays in Vegas” is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network? If you’re thinking VPN? Think again. Why would employees VPN when they’re working in Office 365 or Google Docs?

 

We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these days, now that employees work anywhere, anytime.

 

Learn how...

 

●      Unlike VPN’ing, we do not add latency, hog memory, or burden the end-user.

●      Unlike endpoint protections, we block threats before the first victim is hit.

More Info

Sponsored by: OpenDNS

Vendor Webcast

Behavioral Analytics: How one company used it to change data protection forever

Discuss the specific challenges facing organizations today, and why behavioral analytics is the first step in helping achieve information protection.

x

Behavioral Analytics: How one company used it to change data protection forever

The rate at which new data breaches are announced in the headlines should alarm every company with sensitive data to protect. From OPM to Ashley Madison to Machine Zone video games, data breaches are going undetected by existing security technologies and processes.

It is time to look for new approaches in the fight to protect sensitive data.  In this case the new ally is data science and the new approach is behavioral analytics.  Learn how combining math with big data will compress millions of events (most normal, some bad, some very bad) down to an accurate and prioritized short list of true threats that your security team can actually deal with in a timely manner.  See  how one company put this new and innovative technology into practice to protect their critical R&D project plans, test data, process methodologies and proprietary formulas from both insider and targeted outside attack.

Join Paul Calatayud, CISO at Surescripts, and Stephan Jou, CTO at Interset for a discussion on how behavioral analytics effectively detects and surfaces targeted attacks and how it can be successfully operationalized in an information protection program.

Sign up for our upcoming webinar where we will discuss how behavioral analytics:

  • Accurately detects and surfaces advanced attacks while they are happening
  • Reduces noise and false positives through advanced  analytics enabling your security team to focus on true threats
  • Uses machine learning and advanced statistical analysis to find employees, contractors, and compromised accounts that are attempting to steal sensitive data
  • Integrates with and greatly improves the performance of your existing security tools, and

Discuss the specific challenges facing organizations today, and why behavioral analytics is the first step in helping achieve information protection.

More Info

Sponsored by: Interset

Vendor Webcast

Don’t Let Sensitive Data Hitch a Ride out of Your Network

Attend this webinar and learn how you can use it as an optimal detection and enforcement point to strengthen your network security.

x

Don’t Let Sensitive Data Hitch a Ride out of Your Network

Data is at the core of every business, and data theft is one of the most potent risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences of customer defection.

Hackers often use DNS as a pathway for exfiltrating data to avoid detection by standard security controls that primarily focus on Web and email. They can accomplish this using off-the-shelf DNS tunneling toolkits—or custom techniques that are far more sophisticated and harder to detect. Mitigating these threats effectively requires applying the right technique based on the exfiltration method used.

Join this webinar to learn about:

 

  • Various ways data can be stolen over DNS  
  • Signature-based techniques for mitigating DNS tunneling
  • The use of query analytics to stop data exfiltration over DNS queries

 

Traditional security controls don’t effectively secure DNS, and closing this critical gap is key to protecting your data. DNS is ubiquitous, and it is close to your endpoints. Attend this webinar and learn how you can use it as an optimal detection and enforcement point to strengthen your network security.

More Info

Sponsored by: Infoblox

Virtual Conference

PCI

This eConference will update you on the latest guidance from the PCI Security Standards Council.

x

PCI

This eConference will update you on the latest guidance from the PCI Security Standards Council. Guest speakers explore current guidance around data protection for mobile, cloud and other vectors.
More Info

Sponsored by: SC Magazine

Vendor Webcast

Breach Prevention: Hunting for Signs of Compromise

How effective is your security strategy at hunting and detecting signs of compromise?

x

Breach Prevention: Hunting for Signs of Compromise

Data Breaches in 2015 are on pace to break all records. 2014 saw a record 783 breaches with over 85 million records compromised. So far in 2015, there have been 551 confirmed breaches, with over 150 million compromised records, with the “detection-deficit” between the good and bad guys is growing.  In 60% of cases, attackers are able to compromise within minutes, while organizations take days or months to detect these breaches. Traditional methods of detecting breaches only enable enterprises to react once an alert indicates that an attacker is in the network. A proactive strategy is needed to eradicate an attacker early in their mission to prevent exfiltration of data.

How effective is your security strategy at hunting and detecting signs of compromise?

A new approach is needed – one that turns defense into offense. Join Dan Maier, Sr. Director Product Management, Zscaler, for a thought provoking webcast addressing;

 

  • Best practices hunting and detecting the signs of compromise
  • Why the vast majority of targeted attacks aren’t ever uncovered by the victim enterprise
  • Tools and processes needed to identify and mitigate such threats before any real damage is done
  • Insights into the mindset of today’s cyber criminals, who continuously manage to adapt their defenses as quickly as organizations deploy them

 

More Info

Sponsored by: Zscaler

Vendor Webcast

Strategies for effectively Protecting Intellectual Property

Join our webinar "Strategies for Effectively Protecting Intellectual Property" on October 1st at 2PM ET. In this session, experts from Dell, 451 Research and TITUS...

x

Strategies for effectively Protecting Intellectual Property

When it comes to protecting your organization’s intellectual property (IP), a single click by an end-user can either lead to a disastrous result (a data breach) or a great result (data protection). 

Organizations need to educate and utilize employees to assist in the protection of IP and other sensitive information. By providing your users with tools for identifying and classifying data, your organization can effectively protect high-value, high-risk assets. 

Join our webinar "Strategies for Effectively Protecting Intellectual Property" on October 1st at 2PM ET. In this session, experts from Dell451 Research and TITUS will discuss use cases and share best practices. Key takeaways:

  • Understand the challenges of protecting IP
  • Learn how organizations can educate and use their own employees to assist with IP protection
  • Hear how automating security policies can help to prevent data breaches
  • Case study and practical advice from Dell
More Info

Sponsored by: Titus

Vendor Webcast

Lessons learned from building and running MHN, the world's largest crowdsourced honeynet

Honeypots are really useful for collecting security data for research, especially around botnets, scanning hosts, password brute forcers, and other misbehaving...

x

Lessons learned from building and running MHN, the world's largest crowdsourced honeynet

Honeypots are really useful for collecting security data for research, especially around botnets, scanning hosts, password brute forcers, and other misbehaving systems. They are also the cheapest way collect this data at scale. Deploying many types of honeypots across geo-diverse locations of the Internet improves the aggregate data quality and provides a holistic view. This provides insight into both global trends of attacks and network activity as well as the behaviors of individual malicious systems. For these reasons, we started the Modern Honey Network, which is both an open source (GPLv3) project and a community of hundreds of MHN servers that manage and aggregate data from thousands of heterogeneous honeypots (Dionaea, Kippo, Amun, Conpot, Wordpot, Shockpot, and Glastopf) and network sensors (Snort, Suricata, p0f) deployed by different individuals and organizations as a distributed sensor network. The project has turned into the largest crowdsourced honeynet in the world consisting of thousands of diverse sensors deployed across 45 countries and 6 continents worldwide.  Sensors are operated by all sorts of people from hobbyists, to academic researchers, to Fortune 1000 companies. In this talk we will discuss our experience in starting this project, analyzing the data, and building a crowdsourced global sensor network for tracking security threats and gathering interesting data for research. We've found that lots of people like honeypots, especially if you give them a cool realtime visualization of their data and make it easy to setup; lots of organizations will share their data with you if it is part of a community; and lots of companies will deploy honeypots as additional network sensors, especially if you make it easy to deploy/manage/integrate with their existing security tools.

More Info

Sponsored by: ThreatStream

Vendor Webcast

Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics

This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization...

x

Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics

This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization one of them?

With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.

In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm’s Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.

Key themes to be covered include:

·         Emerging attack motives and strategies

·         Maximizing prevention, detection, and incident response

·         Corroborating external threat intelligence with behavioral changes on the network

·         Prioritizing threats to prevent attack propagation  

More Info

Sponsored by: LogRhythm

Vendor Webcast

Securing your website to protect brand reputation

This webinar will explore protecting your business and your reputation from website security hiccups.

x

Securing your website to protect brand reputation

Customers are doing more and more business online. Nearly 80% of the U.S. population shops online and half bank online. However, websites are constantly under attack. 71% of consumers feel it is up to the online stores to ensure the protection of their information, making website security a top priority for many businesses.  In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information. This webinar will explore protecting your business and your reputation from website security hiccups.

 

Learn how website security contributes your overall brand reputation, how to properly secure your online applications/ servers and discuss:

 

  • SSL/TLS best practices and certificate suggestions for secure domains
  • Secure server communication and encryptions
  • Using SSL/TLS to mitigate against malware, attacks and vulnerabilities
  • The importance of vulnerability identification and management
  • Adoption of preventive technology solutions to block attacks
More Info

Sponsored by: Entrust

Vendor Webcast

Creating an encryption strategy for modern risks mitigation

David Shackleford, IANS faculty member, will share his research results, recommendations and answer questions on the insight he gained in writing his recent report...

x

Creating an encryption strategy for modern risks mitigation

Every company has a data security risk mitigation strategy.  However, the continuous news cycle on data breaches is proof that it is time to augment that strategy.  David Shackleford, IANS faculty member, will share his research results, recommendations and answer questions on the insight he gained in writing his recent report, “Encryption as an Enterprise Strategy.” You’ll leave this webinar understanding how an encrypt everything security architecture could significantly reduce risk of sensitive data theft and exposure of your company’s data.   
More Info

Sponsored by: Vormetric

Virtual Conference

Data Security

With IT infrastructures proving less centralized these days, so too is critical data.

x

Data Security

With IT infrastructures proving less centralized these days, so too is critical data. What are organizations doing, then, to make sure the most important data they trade in is protected from cybercriminals taking advantage of the myriad vulnerabilities introduced by ever-widening mobile and decentralized environments?
More Info

Sponsored by: SC Magazine

Vendor Webcast

The five capabilities that define your organization’s secure file transfer effectiveness

The webinar will reveal the results of a recent survey of IT professionals globally of how organizations rate their own existing capability against the new Capabilities...

x

The five capabilities that define your organization’s secure file transfer effectiveness

This webinar will examine the business risks and regulatory compliance requirements associated with file transfers.  We’ll show how to effectively manage the broad range of compliance requirements by focusing on standard IT controls and how that approach can be used to select appropriate security technology, such as Managed File Transfer service to ensure your organization is protected and in compliance.   

The webinar introduces a new Capability Maturity Model to enable organizations to position their own capability against the critical success factors and best practices presented in the webinar, including:

 

  • Policy
  • Risk Mitigation
  • Automation
  • Agility

 

The webinar will reveal the results of a recent survey of IT professionals globally of how organizations rate their own existing capability against the new Capabilities Maturity Model.

More Info

Sponsored by: Ipswitch

20/20 Webcast

The new mindset for building secure services in the cloud

This 20/20 webcast looks at some of the best practices for creating a secure, cloud-based infrastructure for your enterprise workloads.

x

The new mindset for building secure services in the cloud

Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when a CISO is trying to secure an infrastructure over which he or she has no physical access. But despite the challenges, it is possible to build a secure network environment that includes cloud-based applications and storage. This 20/20 webcast looks at some of the best practices for creating a secure, cloud-based infrastructure for your enterprise workloads. 
More Info

Sponsored by: SumoLogic

Vendor Webcast

Best way to operationalize threat intelligence is enforcing it at the DNS layer

Based on our research, it takes 100-200 days for most organizations just to detect a new threat—before any action can be taken. How many more days go by before...

x

Best way to operationalize threat intelligence is enforcing it at the DNS layer

Based on our research, it takes 100-200 days for most organizations just to detect a new threat—before any action can be taken. How many more days go by before new threat intelligence is enforced? 

Where are you gathering this intelligence from? Where and how are you enforcing it? Feed providers, network appliances, endpoint agents, or everywhere? 

In this webinar, you'll learn how...

  • Both time-to-detection and attack dwell time is reduced by orders of magnitude through security automation.
  • Integrating threat analytics in your security stack creates intelligence specific to your organization.
  • A turn-key integration between AMP Threat Grid and OpenDNS automatically blocks newly discovered malicious domains at the DNS layer, both on and off the corporate network.
  • You'll prioritize investigating malicious domains and files involved with severe threats compromising critical systems.

OpenDNS is now part of Cisco, and together, our cloud-delivered, API-based services enforce security everywhere. The Threat Grid integration is the first of many upcoming innovations that enables you to stay ahead of attacks. 

More Info

Sponsored by: OpenDNS

Vendor Webcast

Understanding the FFIEC Cybersecurity Assessment tool

Join us for an informative webinar as Jennifer Allen, InfoSec Compliance Specialist, digs into what you need to know about the CAT.

x

Understanding the FFIEC Cybersecurity Assessment tool

The Federal Financial Institutions Examination Council (FFIEC) recently released the Cybersecurity Assessment Tool (CAT) to help financial institutions identify their risks and determine their cybersecurity preparedness. The CAT will no doubt be relied on by examiners from the OCC, FDIC and other agencies as they assess banking institutions’ cybersecurity readiness.

Join us for an informative webinar as Jennifer Allen, InfoSec Compliance Specialist, digs into what you need to know about the CAT. Jennifer will explore the key components of the tool using the inherent risk profile and the 5 cyber security assessment maturity domains, and highlight the key takeaways from each. She’ll then detail a case study based on real-world data which compares a national bank’s preparedness profile based on different technology approaches.

More Info

Sponsored by: Bit9 + Carbon Black

Vendor Webcast

Peeling back the layers - does security still have a chewy center?

This presentation will share some positive trends we're seeing in the security marketplace that are finally addressing challenges as old as the security discipline...

x

Peeling back the layers - does security still have a chewy center?

Security practitioners might not like to admit it, but they've been playing games with adversaries for years. Whether it's whack-a-mole, cat-and-mouse or chutes and ladders, the security game has always been reactive in nature or one that has us alternating between steps forward and steps back. A market full of point products with steep learning curves have left many security organizations feel like they can never hire enough staff. There is good news, however! This presentation will share some positive trends we're seeing in the security marketplace that are finally addressing challenges as old as the security discipline itself.

More Info

Sponsored by: ThreatTrack

MarketFocus Webcast

IT security managers speak out

What do IT security managers want from the IT security products that they own? What are they actually getting?

x

IT security managers speak out

What do IT security managers want from the IT security products that they own?  What are they actually getting?  Listen to the results of market research commissioned by ForeScout and distributed on the company's behalf to the readers of SC Magazine, that shows a huge gap between what IT security managers want and what they are actually getting from their IT security products. The survey explored the ability of IT security products to work together by sharing information and automating incident response.

More Info

Sponsored by: ForeScout

Vendor Webcast

Proven approaches for securing enterprise applications; An inside look at deploying Office 365 and SFDC

Put experience and innovation to work for you – register now to get ahead of cloud challenges and simplify deployment of Office 365, Salesforce and other cloud...

x

Proven approaches for securing enterprise applications; An inside look at deploying Office 365 and SFDC

As cloud apps and mobile devices move your data and systems access outside the firewall, how secure are you from cyber threats? While reliance on cloud apps like Office 365 and Salesforce is growing, breaches from compromised identities are in the news regularly. Do users have to deal with yet another username and password for each app and more restrictive policies? How will IT support provisioning, de-provisioning and even more forgotten password calls?

 

Get an inside perspective on proven approaches for improving user productivity and satisfaction, while simplifying and automating identity management. Learn how cloud-based identity management with full featured enterprise mobility management enables enterprises to:

  • Drive cloud app adoption, eliminate password sprawl, and close security holes
  • Centralize, standardize and automate access management – across apps and devices
  • Simplify with a Microsoft-validated alternative to AD FS, DirSync, and Azure Active Directory

 

Put experience and innovation to work for you – register now to get ahead of cloud challenges and simplify deployment of Office 365, Salesforce and other cloud applications.

More Info

Sponsored by: Centrify

Vendor Webcast

Stamping out fraud with governance

Learn how governance technologies are becoming a primary weapon in the war against fraud, while providing the foundation for simplified data management.

x

Stamping out fraud with governance

The overwhelming volume and complexity of data is creating widespread opportunity for fraudsters. Organizations in the healthcare industry, financial services and even government departments have fallen victim as they've been unable to get a clear understanding of patients, customers or citizens. Learn how governance technologies are becoming a primary weapon in the war against fraud, while providing the foundation for simplified data management.

 
More Info

Sponsored by: IBM

Vendor Webcast

Cyber security is now a boardroom agenda

How prepared is your organization to handle a security breach and discuss this in the boardroom?

x

Cyber security is now a boardroom agenda

Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. KPMG states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to Gartner, any lapses will cost executives their job. The stakes are very high and getting it wrong has significant consequences, including:

 

  • Brand damage due to customer loss
  • Loss of competitive advantage due to corporate espionage
  • Cost of responding to breach

 

How prepared is your organization to handle a security breach and discuss this in the boardroom?

Join Kevin Peterson, CISSP, Director, Security & Network Transformation, Zscaler, for a compelling webcast that will address cyber-security priorities being discussed at the boardroom level, including:

 

  • Managing security risk in today’s digital world
  • Securely leveraging key technologies such as cloud, mobile and analytics
  • Addressing security gaps across the ecosystem of customers and suppliers
  • Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities

 

Don’t miss this event. Register today!

More Info

Sponsored by: Zscaler

Virtual Conference

Mobile Security

What about all those applications that end-users keep downloading to their smartphones, laptops and smartwatches?

x

Mobile Security

This is the hot topic of the day. What about all those applications that end-users keep downloading to their smartphones, laptops and smartwatches? What about the data they want to download on them? Any legal ramifications? How does the company stay compliant? We'll provide some answers.
More Info

Sponsored by: SC Magazine

20/20 Webcast

Keeping critical data secure in the cloud

Getting visibility into cloud infrastructure to keep critical data secure is the topic of this 20/20.

x

Keeping critical data secure in the cloud

Companies of all sizes are realizing the benefits of moving to private, public and hybrid clouds, but traditional security tools simply aren’t working well in these environments. The fact is traditional solutions don’t scale well or deploy automatically on systems that are spun up. Many organizations focus on securing their corporate networks, and hope cloud providers have security covered. Or they end up picking and choosing which servers receive a full set of security tools. This leaves the majority of their cloud servers vulnerable to attack with no way to see it coming. Getting visibility into cloud infrastructure to keep critical data secure is the topic of this 20/20. 

More Info

Sponsored by: CloudPassage

Vendor Webcast

Detect ransomware before its too late with AlienVault USM

Join us for a live demo that will show how AlienVault USM detects threats quickly, saving you valuable clean up time by limiting the damage from the attack.

x

Detect ransomware before its too late with AlienVault USM

By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

You'll learn:

 

  • How AlienVault USM detects communications with the command and control server
  • How the behavior is correlated with other signs of trouble to alert you of the threat
  • Immediate steps you need to take to stop the threat and limit the damage

 

More Info

Sponsored by: AlienVault USM

Virtual Conference

Web application security

We review what organizations are missing when it comes to the privacy and security issues regarding the use of social media and find out what they can do to better...

x

Web application security

With social networking a part of everyday business, companies readily have embraced their tweets and Facebook updates to reach out to customers and others. But, the malware and social engineering attacks that cybercriminals have introduced on these sites still prove effective. We review what organizations are missing when it comes to the privacy and security issues regarding the use of social media and find out what they can do to better their approaches. 
More Info

Sponsored by: SC Magazine

Vendor Webcast

How to simplify PCI DSS compliance with AlienVault USM

Demonstrating compliance with PCI DSS is far from a trivial exercise. Are you sure you can document your organization's compliance with the new 3.0 standards?

x

How to simplify PCI DSS compliance with AlienVault USM

Demonstrating compliance with PCI DSS is far from a trivial exercise. Are you sure you can document your organization's compliance with the new 3.0 standards? Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
We'll review:
  • Common PCI DSS compliance challenges
  • Questions to ask as you plan and prepare
  • Core capabilities needed to demonstrate compliance
  • How to simplify compliance with a unified approach to security

 

More Info

Sponsored by: AlienVault USM

Vendor Webcast

Cloud-managed IT security — Simple. Complete. Powerful.

Join us for a live webcast featuring Sophos Cloud SVP and GM Bill Lucchini as he demonstrates how cloud-managed security offers simpler, better protection for your...

x

Cloud-managed IT security — Simple. Complete. Powerful.

IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies. 

Join us for a live webcast featuring Sophos Cloud SVP and GM Bill Lucchini as he demonstrates how cloud-managed security offers simpler, better protection for your organization.  

  • Simple, user-centric management
  • Complete endpoint, mobile and web security
  • Powerful next-generation protection
More Info

Sponsored by: Sophos

Vendor Webcast

What’s missing in your network security stack? DNS

DNS is used by every device on your network. But are you leveraging it in your security stack?

x

What’s missing in your network security stack? DNS

DNS is used by every device on your network. But are you leveraging it in your security stack? DNS can see every connection destined to anywhere on the internet, whether on or off the corporate network. In fact, Verizon’s highly regarded Data Breach Investigation Report stated that “[DNS is] among the single best sources of data within your organization.”

OpenDNS provides a network security service that can deliver you the quickest “WIN” to improve your security stack. From small businesses without dedicated security professionals to multinational enterprises with complex environments, it takes mere minutes to gain a new layer of breach protection and Internet-wide visibility on and off your network.

OpenDNS’s CEO, David Ulevitch, will discuss:

  • Where you have compromised systems and data exfiltration blind spots today.
  • Why signature-based antivirus, firewalls, and proxy gateways miss most command & control (C2) callbacks.
  • How we prevent (vs. detect) threats with a painless deployment and transparent experience.
More Info

Sponsored by: OpenDNS

Vendor Webcast

Intrusion vs. breach:  How security analytics & automated response can improve your chances of avoiding a breach

60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds...

x

Intrusion vs. breach: How security analytics & automated response can improve your chances of avoiding a breach

60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds of days to detect the intruders.  Fortunately, an intrusion does not equal a breach.  In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.   Detecting early warning signs such as an initial system compromise, command and control activity or suspicious lateral movement of intruders can provide the necessary lead time to respond and neutralize a threat before the intrusion leads to a material breach.     

In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident. 

Attend this webinar if you:
  • Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
  • Struggle to find the needle in the haystack of security events
  • Believe your current incident response process lacks adequate automation and efficiency
  • You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots

More Info

Sponsored by: LogRhythm

Vendor Webcast

Preparing for the holiday breach season

The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales. ...

x

Preparing for the holiday breach season

The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales.

Unfortunately, cyber criminals are also gearing up for the holiday rush, as they know that the IT team is often too busy keeping Point of Sale systems and servers running smoothly to be on the lookout for signs of attack. They also know that many organizations enter a "code freeze" period, when no new security patches are introduced lest they disrupt transaction speed. What’s more, according to our recent survey, nearly 20% of businesses actually turn off antivirus during rush periods to avoid slowdowns.

Intensifying the pressure this holiday season are a number of distractions:

  • The October deadline to migrate to EMV-enabled technology or face increased liability
  • PCI DSS 11.3 (penetration testing methodology) is now a requirement instead of a “best practice”
  • More POS systems than ever before now rely on end-of-life systems, including Windows XP and Windows Server 2003

During the high-volume, highly-critical holiday period retailers can't afford to let down their guard. Attend our webinar, featuring Chris Strand, PCIP, and an industry expert from Coalfire, to learn about the potential cyber threats facing your organization this holiday season and what you can do about it.

More Info

Sponsored by: Bit9 + Carbon Black

Vendor Webcast

21st century defense-in-depth involves more than 2 AVs

In this webinar, we’ll explore the hows, whys and wherefores of layered defense, and suggest how you can implement a practical defense-in-depth strategy for your...

x

21st century defense-in-depth involves more than 2 AVs

If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That’s the way we used to do it back in the ‘80s and ‘90s, but does this approach still work? Is this what is meant by “defense-in-depth”? This question was recently posted in a popular IT community forum, and elicited a rash of responses.

In this webinar, we’ll explore the hows, whys and wherefores of layered defense, and suggest how you can implement a practical defense-in-depth strategy for your endpoints. Come with your questions, and we’ll arm you with ways to improve endpoint defenses and performance, and overall business resilience.  

More Info

Sponsored by: Lumension

Vendor Webcast

Before the kill chain: what attackers are doing and how you can spot them

What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?

x

Before the kill chain: what attackers are doing and how you can spot them

Attackers can’t hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers.

What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?

Join our webcast on July 30th with Guest Speaker, Forrester Research, Inc. Principal Analyst, Rick Holland and Dan Hubbard, OpenDNS Chief Technology Officer, to hear more about:

  • What attackers do before the kill chain
  • How you can spot their activity
  • How you can leverage this information to stay ahead of attacks

More Info

Sponsored by: OpenDNS

Vendor Webcast

Reinventing security in a feudal world

Feudal Security, a concept popularized by cyber security guru Bruce Schneier, requires organizations to entrust the security of their data and infrastructure to...

x

Reinventing security in a feudal world

Feudal Security, a concept popularized by cyber security guru Bruce Schneier, requires organizations to entrust the security of their data and infrastructure to cloud providers. However, security is a shared responsibility and organizations are expected to safeguard their assets in a manner similar to on-premise but with much less control. Martin Giles, the former San Francisco-based technology writer of The Economist Newspaper, and Tim O’Brien, Director of Threat Research at Palerra, will sit down to discuss:

 

  • The state of the Union on cyber security
  • The risks of entrusting security to the feudal lords (cloud providers)
  • The challenges of a status quo approach to security
  • Innovative approaches to regain control

 



 

More Info

Sponsored by: Palerra