SC Media webcasts | IT Security

Webcasts

UPCOMING WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
DemoCast webcast

How to make vulnerability management work for you

Vulnerability management is far more comprehensive than simply installing plug-and-play threat modules. Rather, it’s a daily exercise in defense, detection, response, and mitigating risk. This webcast explores how vulnerability management works, how it integrates with other data security strategies, and why you should be concerned with managing and mitigating vulnerabilities.

Register for How to make vulnerability management work for you

Sponsored by: SecureWorks

How to make vulnerability management work for you

Vulnerability management is far more comprehensive than simply installing plug-and-play threat modules. Rather, it’s a daily exercise in defense, detection, response, and mitigating risk. This webcast explores how vulnerability management works, how it integrates with other data security strategies, and why you should be concerned with managing and mitigating vulnerabilities.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Pierre-David Oriol

Sr. Consultant, Product Management

Secureworks

Pierre-David Oriol is a Senior Product Manager in Secureworks’ Product Management and Engineering team. With over 15 years of experience in information security, he has held several security architecture roles in the financial industry, from overseeing smart card security & production systems to the design and implementation of internal architectures & security standards. Additionally, Pierre-David co-founded and presided over NorthSec (nsec.io), the largest on-site CTF event in the world, developing multiple smart-card based challenges. Pierre-David was one of the first employees hired at Delve Labs Inc., a Montreal-based cybersecurity start-up that combined its groundbreaking AI-driven approach with the Vulnerability Management space. Secureworks acquired Delve Labs Inc. in Fall 2020, where Pierre-David joined the team as a key player in leading the development of Taegis VDR. Throughout his career, Pierre-David has helped numerous security companies & MSSP providers accelerate their vulnerability management program and adopt a risk-based approach to vulnerability remediation prioritization.

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Vendor Webcast

Increase visibility across endpoints and workloads

Legacy security solutions are no longer capable of solving the challenges facing Security and IT teams today. Cybercrime is up 600 percent during the COVID-19 pandemic, as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and…

Register for Increase visibility across endpoints and workloads

Sponsored by: VMWare

Increase visibility across endpoints and workloads

Legacy security solutions are no longer capable of solving the challenges facing Security and IT teams today. Cybercrime is up 600 percent during the COVID-19 pandemic, as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased attacks. Organizations need a new cybersecurity approach to stay ahead of attackers.

Join this webcast to learn:

• steps to simplify security and IT operations;

• how to increase visibility across endpoints and workloads; and

• benefits of “built-in” security and the impact on SOC.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Taylor Groff

Senior Partner Development Specialist

VMware

Taylor is a Senior Partner Development Specialist for the Carbon Black Security Business Unit (SBU) at VMware. Taylor resides in Broomfield, CO where he enjoys coaching basketball as well as spending time exploring the mountains with his wife, Amy, and their dog, Dakota.

Speaker

Tyler Zito

Partner Solutions Engineer

VMware

Tyler is an Inside Channel Solution Engineer for the Carbon Black Security Business Unit (SBU) at VMware. As a SE, Tyler covers the US and Canada as the technical resource for Channel and Partner relationships. Tyler resides in Golden, CO and is an avid outdoors enthusiast. Outside of work Tyler is a member of the Alpine Rescue Team which conducts search and rescue efforts throughout the populated front range mountains.

Vendor Webcast

Nip ransomware in the FUD: Detecting attacks pre-encryption

Ransomware operators are evolving their tactics, techniques, and procedures to become more difficult to detect. Recorded Future’s cyber threat analysts researched malicious actors using existing network applications (“living-off-the-land”) open-source resources, and red team tools, with a specific focus on “big game” ransomware operators. This research was conducted to identify opportunities…

Register for Nip ransomware in the FUD: Detecting attacks pre-encryption

Sponsored by: Recorded Future

Nip ransomware in the FUD: Detecting attacks pre-encryption

Ransomware operators are evolving their tactics, techniques, and procedures to become more difficult to detect. Recorded Future’s cyber threat analysts researched malicious actors using existing network applications (“living-off-the-land”) open-source resources, and red team tools, with a specific focus on “big game” ransomware operators. This research was conducted to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase. The team looked at actual compromises by ransomware operators, analyzing their techniques, procedures, and tool usage to derive detections.

In this webcast you’ll learn:

• best practices and methodologies to detect threats;

• specific examples of actual compromises by ransomware operators; and

• how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Lindsay Kaye

Director of Operational Outcomes for Insikt Group

Recorded Future

Lindsay Kaye’s primary focus is driving the creation of actionable technical intelligence – providing endpoint, network and other detections that can be used to detect technical threats to organizational systems. Lindsay’s technical specialty and passion is malware analysis and reverse engineering. She received a BS in Engineering with a Concentration in Computing from Olin College of Engineering and an MBA from Babson College.

Vendor Webcast

Secure your distributed workforce with modern endpoint security

The distributed workforce is re-emphasizing the importance of endpoint security as a pillar of your security operations toolset. But if you are using a legacy endpoint protection platform that uses multiple consoles, it’s time to consider an upgrade. This webcast will share how you can quickly modernize your SOC, leave…

Register for Secure your distributed workforce with modern endpoint security

Sponsored by: VMWare

Secure your distributed workforce with modern endpoint security

The distributed workforce is re-emphasizing the importance of endpoint security as a pillar of your security operations toolset. But if you are using a legacy endpoint protection platform that uses multiple consoles, it’s time to consider an upgrade.

This webcast will share how you can quickly modernize your SOC, leave your legacy tools behind, and consolidate capabilities into one agent and console. Watch this webcast to learn more about:

• the growing importance of endpoint security in today’s distributed work environments;
• why you need to modernize your endpoint security platform; and
• a step-by-step guide on replacing legacy solution tools.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

David Hutt

Solutions Architect

VMware

DemoCast webcast

Improve encryption key and data security management in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security…

Register for Improve encryption key and data security management in multicloud environments

Sponsored by: Fortanix

Improve encryption key and data security management in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security tools, but each one is unique and often not much better than leaving a key under your doormat. You need a different approach.

This webcast will demonstrate the advantages of a single, unified solution for multicloud data security. You’ll see how a DevOps-friendly, cloud-native solution can make your life easier, provide the same control as legacy on-premises solutions, and let your company securely use the best that cloud services and SaaS applications can offer.

Join Fortanix in this webcast, to learn about:

• 5 common challenges of cloud key management;
• automating the key lifecycle across multiple clouds;
• a Kill Switch to disable data access in the event of a breach; and
• centralized policy management and compliance.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

David Greene

Chief Operating Officer

Fortanix

David Greene leads the company’s efforts to deliver advanced data protection solutions to enterprises worldwide. Prior to Fortanix, David was CEO of ZeroStack, developer of self-driving private cloud platforms. He has over 20 years of experience in enterprise infrastructure and security, including technical and customer-facing roles at Aerohive Networks, Riverbed, BMC Software, and Hewlett-Packard. David holds degrees in Architecture and Computer Science from the University of California, Berkeley.

Speaker

Vishal Gupta

Director of Product Management

Fortanix

Vishal Gupta leads encryption and key management products. He is a product management leader in the enterprise software industry with over 2 decades of enterprise experience in cloud security, encryption and data privacy, mobile, and network security. Vishal has a proven track record in bringing market leading products to market at companies such as Oracle, VMware, Citrix, and Thales eSecurity. Vishal holds a bachelor’s degree from Delhi Technical University and an MBA from Leavey School of Business, Santa Clara.

Vendor Webcast

IDC Analyst Frank Dickson reveals how to deploy data-centric security quickly and easily

If you are constantly chasing data as it moves around within the enterprise, to cloud and beyond, this webcast will show you how to implement a data-centric security strategy for your enterprise, quickly and easily. This one-hour session will focus on key advances in the areas of automation and artificial…

Register for IDC Analyst Frank Dickson reveals how to deploy data-centric security quickly and easily

Sponsored by: Seclore

IDC Analyst Frank Dickson reveals how to deploy data-centric security quickly and easily

If you are constantly chasing data as it moves around within the enterprise, to cloud and beyond, this webcast will show you how to implement a data-centric security strategy for your enterprise, quickly and easily. This one-hour session will focus on key advances in the areas of automation and artificial intelligence which have made large-scale deployments of data-centric security technologies, non-disruptive and cost effective.

This webcast will:

• contrast the “yesterday’s reality” of data-centric security with modern approaches, focused on automation and AI;
• enumerate “low hanging fruits” for data-centric security within the enterprise; and
• walk through how two large enterprises deployed modern, automated data-centric security in less than three months.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Frank Dickson

Program Vice President

IDC SME – Cybersecurity Products

Frank leads a team that delivers compelling research in the areas of Network Security; Endpoint Security; Cybersecurity Analytics, Intelligence, Response and Orchestration (AIRO); Identity & Digital Trust; Legal, Risk & Compliance; Data Security; IoT Security; and Cloud Security. Topically, he provides thought leadership and guidance for clients on a wide range of security products including endpoint security, identity and access management, authentication, threat analytics, and emerging products designed to protect transforming architectures and business models.

Speaker

Vishal Gupta

Founder & CEO

Seclore

Vishal comes with more than a decade of experience in sales, marketing, and business management. He is the Founder and CEO of Seclore and handles corporate development, investor relations and strategic vision. Vishal is an IIT Bombay (Electrical Engineering) graduate and a specialist in biometric security systems. His ideation in fingerprint imaging led to the development of the core technology behind Herald Logic, a company he founded in 2000. The company showed record 220% CAGR, spreading to Singapore, Australia, and UK.

Vendor Webcast

It’s time to think more broadly about cloud workload security

There are at least as many ways to monitor and protect cloud workloads as there are types of cloud workloads that need protection. Since all security technologies have inherent advantages and drawbacks, organizations typically deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security profile,…

Register for It’s time to think more broadly about cloud workload security

Sponsored by: Extrahop

It’s time to think more broadly about cloud workload security

There are at least as many ways to monitor and protect cloud workloads as there are types of cloud workloads that need protection. Since all security technologies have inherent advantages and drawbacks, organizations typically deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security profile, and tolerance for risk. What’s important is ensuring that any security gaps are filled.

Join 451 Research and ExtraHop on this webcast and learn how:

• agentless network detection and response can play a crucial role in protecting your cloud workloads against today’s advanced threats and

• your organization can close gaps left by other cloud workload security technologies.

Attendees of this webcast may be eligible for one CPE credit.

Duration: 60 Minutes

Speaker

Fernando Montenegro

Principal Research Analyst, Information Security

451 Research

Fernando is a Principal Research Analyst on the Information Security team at 451 Research, a part of S&P Global Market Intelligence. He is based out of Toronto, Canada. He has broad experience in security architecture for enterprise environments. He currently focuses on covering primarily the endpoint security and cloud security markets. Prior to joining 451 Research, Fernando worked in pre-sales and delivery roles with both startups and established security vendors focusing on different aspects of enterprise security. His areas of interest include security economics (particularly behavior economics), security-focused data science, and cloud-native security. Fernando holds a BSc. in Computer Science and several industry certifications.

Dan Frey

Senior Cloud Product Marketing Manager

ExtraHop

Dan Frey is currently a Marketing Manager with ExtraHop on the Cloud marketing team. He has worked in the cyber security arena since 2007 in various product marketing and management roles with companies including Symantec, McAfee/Intel, Fortinet, and Check Point, focusing on cloud, endpoint, and network security. Dan holds a BS in Electrical Engineering from the California State University system.

ON-DEMAND WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast

The financial industry is under siege: Explore the latest threats

The financial industry’s digital transformation efforts are under siege – going well beyond traditional account takeover. With payment card fraud, synthetic IDs, integrity attacks, and more, how can you best secure yourself and your organization? To help you, we’ve taken the pulse and perspectives of 126 bank CISOs with the…

Register for The financial industry is under siege: Explore the latest threats

Sponsored by: VMWare

The financial industry is under siege: Explore the latest threats

The financial industry’s digital transformation efforts are under siege – going well beyond traditional account takeover. With payment card fraud, synthetic IDs, integrity attacks, and more, how can you best secure yourself and your organization? To help you, we’ve taken the pulse and perspectives of 126 bank CISOs with the fourth annual VMware Carbon Black Modern Bank Heists Report.

Join VMware on this webcast to gain:
• an unvarnished perspective into trends of attacks – notably the evolution of the cyber kill-chains;
• ground truth on cybercrime cartels and their escalation of counter-incident response and island hopping; and
• an understanding of a new paradigm for cybersecurity

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Tom Kellerman

Head of Cybersecurity Strategy

VM Ware

Tom Kellermann is the Head of Cybersecurity Strategy for VMware. Previously, Tom held the position of Chief Cybersecurity Officer for Carbon Black Inc. Prior to joining Carbon Black, Tom was the CEO and founder of Strategic Cyber Ventures. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy.

Speaker

Rick McElroy

Principal Cybersecurity Strategist

VMware Carbon Black

Rick McElroy, Principal Cybersecurity Strategist for VMware, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education.

DemoCast webcast

How to threat hunt in your SIEM with the right network data

Threat hunting might seem out of reach, but all it truly takes is one curious person with direct access to the right data. The network, due to its breadth of visibility, offers an excellent starting point for your hunt. Traditional network logs, like Netflow, however, have left gaping blind spots…

Register for How to threat hunt in your SIEM with the right network data

Sponsored by: Corelight

How to threat hunt in your SIEM with the right network data

Threat hunting might seem out of reach, but all it truly takes is one curious person with direct access to the right data. The network, due to its breadth of visibility, offers an excellent starting point for your hunt. Traditional network logs, like Netflow, however, have left gaping blind spots on the network. That’s why many organizations are deploying Network Detection & Response (NDR) solutions, which fill critical gaps in their network defenses, accelerate incident response times, and unlock powerful new hunting capabilities.

Join Corelight for this Democast, where you will learn how to:

  • find adversaries abusing common protocols, like DNS, to conduct data exfiltration and C2 communications;
  • spot adversaries communicating over encrypted network protocols without decrypting the traffic; and
  • turn successful hunts into automated detections.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Alex Kirk

Evangelist

Corelight

Alex is a veteran open source security evangelist with a deep engineering background. In 10 years with Sourcefire Research (VRT), he wrote the team’s first malware sandbox and established its global customer outreach and intelligence sharing program. He has spoken at conferences across the globe on topics from “Malware Mythbusting” to “Using Bro/Zeek Data for IR and Threat Hunting”, and was a contributing author for “Practical Intrusion Analysis”, and oft-used textbook for university courses on IDS. His security engineering background also includes time at Cisco and Tenable.

DemoCast webcast

5 reasons why privilege access management implementations fail

It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the…

Register for 5 reasons why privilege access management implementations fail

Sponsored by: Remediant

5 reasons why privilege access management implementations fail

It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.

Join Remediant in this webcast to:

• learn the five reasons why privilege access management implementations fail;
• identify areas in your IAM program where you can reduce admin access risk; and
• capitalize on existing investments, while improving your risk posture.

Speaker

JD Sherry

Chief Strategy Officer

Remediant, Inc.

JD Sherry, Chief Strategy Officer, is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cyber security, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.

Vendor Webcast

Tips to avoid the top five mistakes in vulnerability management

Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. Lots of scanning and vulnerability prioritization, but not a lot of actual remediation. Admittedly, moving from simple vulnerability management to deliberate vulnerability remediation isn’t easy. There are so many moving parts, with dozens of stakeholders, and…

Register for Tips to avoid the top five mistakes in vulnerability management

Sponsored by: Vulcan Cyber

Tips to avoid the top five mistakes in vulnerability management

Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. Lots of scanning and vulnerability prioritization, but not a lot of actual remediation. Admittedly, moving from simple vulnerability management to deliberate vulnerability remediation isn’t easy. There are so many moving parts, with dozens of stakeholders, and a crush of infrastructure with related vulnerabilities growing exponentially.

Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn how to avoid the top five mistakes everybody is making in vulnerability management. You’ll also learn:

• The top five mistakes in vulnerability management.

• How you can avoid these mistakes by shifting the objectives from vulnerability management to vulnerability remediation.

• How the Vulcan Cyber platform can help your team get fix done through scan-to-fix vulnerability remediation orchestration.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Yaniv Bar-Dayan

CEO & Co-Founder

Vulcan Cyber

DemoCast webcast

Identify online account risk before it’s too late

With fraud creativity exploding, due to the pandemic and one-third of user activity operating as high risk, companies are left to wrestle with how they tell their threat actors and users apart. Bringing trust to the digital environment is about laying out the red carpet for legitimate users but also…

Register for Identify online account risk before it’s too late

Sponsored by: Mastercard

Identify online account risk before it’s too late

With fraud creativity exploding, due to the pandemic and one-third of user activity operating as high risk, companies are left to wrestle with how they tell their threat actors and users apart. Bringing trust to the digital environment is about laying out the red carpet for legitimate users but also understanding how the enemy behaves and changes techniques.

In this webcast, attendees will learn how behavioral biometrics:

  • helps companies detect risk within an account before it’s too late;
  • enables organizations to trust legitimate users;
  • provides the latest insights on the human side of security; and
  • improves experiences for genuine users.
Speaker

Magali Vander Vorst

Marketing Manager

NuData, A Mastercard Company

Speaker

Kevin Rowland

Head of Global Business Development

NuData Security, a Mastercard company

Vendor Webcast

Reduce the impact of variability in third-party risk assessments

For any organization, variability in third-party risk assessments can increase costs, impact efficiency, and cause frustration within the business. Reducing the impact of variability in third-party risk assessments is a challenge for most organizations. For many companies, volume of third-party risk assessments is driven by less predictable events and more…

Register for Reduce the impact of variability in third-party risk assessments

Sponsored by: PWC

Reduce the impact of variability in third-party risk assessments

For any organization, variability in third-party risk assessments can increase costs, impact efficiency, and cause frustration within the business. Reducing the impact of variability in third-party risk assessments is a challenge for most organizations. For many companies, volume of third-party risk assessments is driven by less predictable events and more to the needs of business and their sourcing strategies. Without proper planning and data insight, variability is inevitable in the process. This webcast will cover three key considerations for tackling this challenge, developed from our broad perspective:

  • overcoming key challenges, such as timeliness and efficiency in assessment completion;
  • optimizing processes, such onboarding third and persistent monitoring; and
  • creating a cohesive solution.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Justin Mulhern Offen

Principal and Risk Command Product Leader

PwC

Speaker

Garit Gemeinhardt

Third-Party Risk Management Partner

PwC

Vendor Webcast

A master class in IT security: Roger Grimes teaches ransomware mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years experience as a computer…

Register for A master class in IT security: Roger Grimes teaches ransomware mitigation

Sponsored by: KnowBe4

A master class in IT security: Roger Grimes teaches ransomware mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware.

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

In this session you’ll learn:

  • How to detect ransomware programs, even those that are highly stealthy
  • Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
  • The policies, technical controls, and education you need to stop ransomware in its tracks
  • Why good backups (even offline backups) no longer save you from ransomware

You can learn how to identify and stop these attacks before they wreak havoc on your network.

Speakers

Speaker

Roger Grimes

Data-Driven Defense Evangelist

KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

DemoCast webcast

Securing workloads on vSphere, VCF, and the private cloud

Deploying and managing workloads and apps in private, public and hybrid clouds takes a village. What we once considered traditional IT has been replaced by a collective. IT Ops, DevOps and SecOps now team together to deliver and secure apps and services from the cloud. However, bolting on dozens of…

Register for Securing workloads on vSphere, VCF, and the private cloud

Sponsored by: VMWare

Securing workloads on vSphere, VCF, and the private cloud

Deploying and managing workloads and apps in private, public and hybrid clouds takes a village. What we once considered traditional IT has been replaced by a collective. IT Ops, DevOps and SecOps now team together to deliver and secure apps and services from the cloud.

However, bolting on dozens of security products to your data center offers very little value and creates risky tradeoffs between security coverage and operational efficiency. These disparate tools often cause information siloes, massive operational complexity and misaligned controls that lead to security gaps from misconfigurations and unknown vulnerabilities.

How can cloud workload protection platforms bridge these gaps and help secure your data center?

Join VMware Senior Security Technical Marketing Manager Evin Hernandez to unpack:

• How your existing investments in products like VMware vSphere combined with a cloud workload protection platform provide deeper, unparalleled visibility into your environment
• Why risk-prioritized vulnerability visibility is key to modern data center security
• How to customize prevention based on your specific IT tools and applications

Attendees of this webcast may be eligible for half CPE credit.

Speaker

Evin Hernandez

Senior Security Technical Marketing Manager

VMware

Evin Hernandez is a proven information security leader with success in guiding implementation of leading-edge technology solutions while balancing security initiatives to risks, business operations and innovations. Specialties include network design, malware analysis, web application security testing, network penetration testing, red teaming, systems architecture, configuration management, and systems administration with extensive experience healthcare, financial, cloud computing, and software development industries. Evin is a volunteer and President for NY/ NJ chapter of OWASP (Open Web Application Security Project).

Vendor Webcast
Challenges in the security landscape

Forrester reveals how to overcome the top email security challenges

A recent research report from LogRhythm states a whopping 75 percent of security professionals have more stress now than they did two years ago. The report also found that 92 percent need additional preventative solutions to close security gaps, and 93 percent lack the tools they need to detect known…

Register for Forrester reveals how to overcome the top email security challenges

Sponsored by: Cisco

Forrester reveals how to overcome the top email security challenges

A recent research report from LogRhythm states a whopping 75 percent of security professionals have more stress now than they did two years ago. The report also found that 92 percent need additional preventative solutions to close security gaps, and 93 percent lack the tools they need to detect known security threats.

Forrester joins us to discuss the most pressing challenges currently facing security professionals and what they are doing to overcome security risk. We will introduce Cisco Cloud Mailbox Defense, the new email security product engineered to help security professionals address email threats and overcome security challenges working with Microsoft 365 cloud email.

Join Forrester and Cisco on this webcast to learn how you can:

· optimize your email security to minimize your risk of advanced threats;

· get complete visibility into inbound, outbound, and internal messages;

· improve threat detection, response, and remediation with the Cisco Talos threat research team; and

· be up and running in less than five minutes without changing the mail flow.

Attendees of this webcast may be eligible for one CPE credit.

Speakers

Speaker

Jinan Budge

Principal Analyst

Forrester

Speaker

Christian Clasen

Technical Marketing Engineer 

Cisco

DemoCast webcast
Vulnerability assessment and web app testing for the modern environment

Vulnerability assessment and web app testing for the modern environment

IT ecosystems have become more sophisticated and so have attackers. Having a vulnerability risk management program that secures every layer of your modern environment including on-premises assets, cloud infrastructure, and web applications can substantially reduce your risk of attacks. Join us for a live demo of Rapid7’s InsightVM, our leading…

Register for Vulnerability assessment and web app testing for the modern environment

Sponsored by: Rapid7

Vulnerability assessment and web app testing for the modern environment

IT ecosystems have become more sophisticated and so have attackers. Having a vulnerability risk management program that secures every layer of your modern environment including on-premises assets, cloud infrastructure, and web applications can substantially reduce your risk of attacks.

Join us for a live demo of Rapid7’s InsightVM, our leading vulnerability management solution and InsightAppSec, our cloud-based DAST solution.

The demo will cover:

• Real risk prioritization

• IT-integrated remediation projects

• The universal translator

• Attack replay and more

Today’s network is vast, with remote workers, cloud and virtualization, mobile devices, and web applications. Thus, your risk exposure is changing every minute, making it vital to secure every layer of your modern environment.

Speaker

Megan Connolly

Security Solutions Engineer

Rapid7

DemoCast webcast
A better way to manage encryption keys and data security in multicloud environments

A better way to manage encryption keys and data security in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security…

Register for A better way to manage encryption keys and data security in multicloud environments

Sponsored by: Fortanix

A better way to manage encryption keys and data security in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security tools, but each one is unique and often not much better than leaving a key under the mat at the front door. You need a different approach.
In this webinar we’ll review and demonstrate the advantages of a single unified solution for multicloud data security from Fortanix. See how a cloud-native, DevOps friendly solution can make your life easier, provide the same control as legacy on-prem solutions, and let your company securely use the best that cloud services and SaaS applications have to offer.

We will demo:

· Five common challenges of cloud key management (you’re not alone)

· Automating the key lifecycle across multiple clouds 

· “Kill Switch” to disable data access in the event of a breach 

· Centralized policy management and compliance 

Speakers

Speaker

David Greene

Chief Operating Officer

Fortanix

David Greene leads the company’s efforts to deliver advanced data protection solutions to enterprises worldwide. Prior to Fortanix, David was CEO of ZeroStack, developer of self-driving private cloud platforms. He has over 20 years of experience in enterprise infrastructure and security, including technical and customer-facing roles at Aerohive Networks, Riverbed, BMC Software, and Hewlett-Packard. David holds degrees in Architecture and Computer Science from the University of California, Berkeley.

Speaker

Vishal Gupta

Director of Product Management

Fortanix

Vishal Gupta leads encryption and key management products. He is a product management leader in the enterprise software industry with over 2 decades of enterprise experience in cloud security, encryption and data privacy, mobile, and network security. Vishal has a proven track record in bringing market leading products to market at companies such as Oracle, VMware, Citrix, and Thales eSecurity. Vishal holds a bachelor’s degree from Delhi Technical University and an MBA from Leavey School of Business, Santa Clara.

Vendor Webcast
Threat outlook: New-world power shift

2021 Threat outlook: New-world power shift

How cloud native endpoint and workload protection will prepare you for the future: As the pandemic continues across the globe, cybercriminals grow more powerful and ransomware becomes big business, what can defenders expect in 2021?  In this webinar, cybersecurity strategists Greg Foss and Rick McElroy will share some key data…

Register for 2021 Threat outlook: New-world power shift

Sponsored by: VMWare

2021 Threat outlook: New-world power shift

How cloud native endpoint and workload protection will prepare you for the future:

As the pandemic continues across the globe, cybercriminals grow more powerful and ransomware becomes big business, what can defenders expect in 2021? 

In this webinar, cybersecurity strategists Greg Foss and Rick McElroy will share some key data from cyberattacks seen over the last year – as well as a glimpse into the findings of the most recent VMware Carbon Black Global Threat Outlook Report. 

Join us to hear the story of evolving attackers and what organizations are (and should be) doing to change their own behaviors in 2021. 

Speakers

Speaker

Rick McElroy

Cybersecurity Strategist

VMware Carbon Black

Rick McElroy, Security Strategist at VMware Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education. As a United States Marine, McElroy’s work included physical security and counterterrorism services.

Speaker

Greg Foss

Senior Cybersecurity Strategist

VMware

Greg Foss is a Cybersecurity Strategist at VMware Carbon Black where he focuses on detection engineering, security efficacy, and bypasses across the diverse product line. In previous roles, Greg led a Threat Research team, built and ran a Global Security Operations program, consulted in penetration testing, and worked as a security analyst for the federal government. Greg is a very active member of the Denver information security community who loves to give back and support the industry.