SC Media webcasts | IT Security

Webcasts

UPCOMING WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast

Snowflake’s journey to passwordless and beyond

At Snowflake, customer data is sacrosanct, and securing it has remained a top priority since its inception. Snowflake’s advanced data platform was born in and lives in the cloud and the company runs its business entirely in the cloud. Join this webcast and learn why Snowflake chose to go…

Register for Snowflake’s journey to passwordless and beyond

Sponsored by: Beyond Identity

Snowflake’s journey to passwordless and beyond

At Snowflake, customer data is sacrosanct, and securing it has remained a top priority since its inception. Snowflake’s advanced data platform was born in and lives in the cloud and the company runs its business entirely in the cloud.

Join this webcast and learn why Snowflake chose to go passwordless, how it got there, and what’s next as the team advances its cybersecurity and identity management capabilities.

Discussion topics include:

  • why Snowflake went passwordless;
  • what drove the selection of Beyond Identity;
  • lessons learned from the company-wide rollout;
  • what end-users think about the solution; and
  • what’s next.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Thomas TJ Jermoluk

Chief Executive Officer and Co-Founder

Beyond Identity

TJ has served as President and COO of Silicon Graphics, Inc., Founding Chairman and CEO of @Home Network, General Partner at Kleiner Perkins, CEO of Hyperion Development Group, and founded nine companies, including Beyond Identity, HiCMOS, AOptix, and SmartPipes. TJ started his career at Bell Labs after attending Virginia Tech.

Speaker

Mario Duarte

VP of Security

Snowflake

Mario has 20 years of experience as a security professional working in the retail, health care, and financial sectors. He has built and managed security teams developed and implemented security programs, and managed PCI and HIPAA compliance initiatives for medium and large organizations.

Vendor Webcast

Beyond HSM: Key Orchestration for the Enterprise

In a more and more digitized economy, enterprises have to take an in-depth look at their infrastructure and how to manage disparate teams that are swiftly becoming even more decentralized. Keeping those teams and the data they work with secure is as important today as ensuring operational efficiency, agility, and…

Register for Beyond HSM: Key Orchestration for the Enterprise

Sponsored by: Unbound ID

Beyond HSM: Key Orchestration for the Enterprise

In a more and more digitized economy, enterprises have to take an in-depth look at their infrastructure and how to manage disparate teams that are swiftly becoming even more decentralized. Keeping those teams and the data they work with secure is as important today as ensuring operational efficiency, agility, and risk mitigation. Now, organizations must encrypt everything, everywhere, all the time to keep pace with our evolving security landscape.

In this webinar, Unbound Security’s Chief Business Officer, Michael Hughes, and Co-founder and VP R&D Guy Peer, will discuss:

  • Why hardware-based data protection solutions can slow teams down while opening up new vulnerabilities
  • How and where organizations are storing encryption keys, how they are managed and the challenges and risks faced by such an approach
  • The case for a Key Orchestration platform for the enterprise: technical and business considerations

Attendees of this webcast may be eligible for one CPE credit.

Speakers

Speaker

Michael Hughes

Chief Business Officer

Unbound ID

Michael Hughes is the Chief Business Officer for Unbound Security, having responsibility for all go to market activities including sales, marketing, business development and customer success. Michael comes to Unbound from Bonfire Interactive which was acquired and taken public by GTY Technology. Michael brings with him over 20 years of software sales and executive management experience having led his last six firms through either successful acquisition or IPO including WatchDox (acquired by IBM), Watchfire (acquired by Blackberry) and Delano Technology.

Speaker

Guy Peer

VP R&D and Co-founder

Unbound ID

Guy Peer is the Co-founder and VP R&D for Unbound Security. Guy has 20 years of experience in variety of technologies and areas – and 15 years of experience in management of small to very large development teams. For the past 10 years, Guy has been focused on the security industry, and held management roles at Sapiens and SafeNet. He is an expert on encryption and key protection.

Vendor Webcast
Threat outlook: New-world power shift

2021 Threat outlook: New-world power shift

How cloud native endpoint and workload protection will prepare you for the future: As the pandemic continues across the globe, cybercriminals grow more powerful and ransomware becomes big business, what can defenders expect in 2021?  In this webinar, cybersecurity strategists Greg Foss and Rick McElroy will share some key data…

Register for 2021 Threat outlook: New-world power shift

Sponsored by: VMWare

2021 Threat outlook: New-world power shift

How cloud native endpoint and workload protection will prepare you for the future:

As the pandemic continues across the globe, cybercriminals grow more powerful and ransomware becomes big business, what can defenders expect in 2021? 

In this webinar, cybersecurity strategists Greg Foss and Rick McElroy will share some key data from cyberattacks seen over the last year – as well as a glimpse into the findings of the most recent VMware Carbon Black Global Threat Outlook Report. 

Join us to hear the story of evolving attackers and what organizations are (and should be) doing to change their own behaviors in 2021. 

Speakers

Speaker

Rick McElroy

Cybersecurity Strategist

VMware Carbon Black

Rick McElroy, Security Strategist at VMware Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education. As a United States Marine, McElroy’s work included physical security and counterterrorism services.

Speaker

Greg Foss

Senior Cybersecurity Strategist

VMware

Greg Foss is a Cybersecurity Strategist at VMware Carbon Black where he focuses on detection engineering, security efficacy, and bypasses across the diverse product line. In previous roles, Greg led a Threat Research team, built and ran a Global Security Operations program, consulted in penetration testing, and worked as a security analyst for the federal government. Greg is a very active member of the Denver information security community who loves to give back and support the industry. 

DemoCast webcast
A better way to manage encryption keys and data security in multicloud environments

A better way to manage encryption keys and data security in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security…

Register for A better way to manage encryption keys and data security in multicloud environments

Sponsored by: Fortanix

A better way to manage encryption keys and data security in multicloud environments

If you’ve tried to use encryption to secure data in public clouds and SaaS applications, then you know first-hand the challenges of multicloud key management. Legacy solutions were never designed to protect applications and sensitive data moving to the cloud. Cloud providers and SaaS applications provide their own data security tools, but each one is unique and often not much better than leaving a key under the mat at the front door. You need a different approach.
In this webinar we’ll review and demonstrate the advantages of a single unified solution for multicloud data security from Fortanix. See how a cloud-native, DevOps friendly solution can make your life easier, provide the same control as legacy on-prem solutions, and let your company securely use the best that cloud services and SaaS applications have to offer.

We will demo:

· Five common challenges of cloud key management (you’re not alone)

· Automating the key lifecycle across multiple clouds 

· “Kill Switch” to disable data access in the event of a breach 

· Centralized policy management and compliance 

Speakers

Speaker

David Greene

Chief Operating Officer

Fortanix

David Greene leads the company’s efforts to deliver advanced data protection solutions to enterprises worldwide. Prior to Fortanix, David was CEO of ZeroStack, developer of self-driving private cloud platforms. He has over 20 years of experience in enterprise infrastructure and security, including technical and customer-facing roles at Aerohive Networks, Riverbed, BMC Software, and Hewlett-Packard. David holds degrees in Architecture and Computer Science from the University of California, Berkeley.

Speaker

Vishal Gupta

Director of Product Management

Fortanix

Vishal Gupta leads encryption and key management products. He is a product management leader in the enterprise software industry with over 2 decades of enterprise experience in cloud security, encryption and data privacy, mobile, and network security. Vishal has a proven track record in bringing market leading products to market at companies such as Oracle, VMware, Citrix, and Thales eSecurity. Vishal holds a bachelor’s degree from Delhi Technical University and an MBA from Leavey School of Business, Santa Clara.

DemoCast webcast
Vulnerability assessment and web app testing for the modern environment

Vulnerability assessment and web app testing for the modern environment

IT ecosystems have become more sophisticated and so have attackers. Having a vulnerability risk management program that secures every layer of your modern environment including on-premises assets, cloud infrastructure, and web applications can substantially reduce your risk of attacks. Join us for a live demo of Rapid7’s InsightVM, our leading…

Register for Vulnerability assessment and web app testing for the modern environment

Sponsored by: Rapid7

Vulnerability assessment and web app testing for the modern environment

IT ecosystems have become more sophisticated and so have attackers. Having a vulnerability risk management program that secures every layer of your modern environment including on-premises assets, cloud infrastructure, and web applications can substantially reduce your risk of attacks.

Join us for a live demo of Rapid7’s InsightVM, our leading vulnerability management solution and InsightAppSec, our cloud-based DAST solution.

The demo will cover:

• Real risk prioritization

• IT-integrated remediation projects

• The universal translator

• Attack replay and more

Today’s network is vast, with remote workers, cloud and virtualization, mobile devices, and web applications. Thus, your risk exposure is changing every minute, making it vital to secure every layer of your modern environment.

Vendor Webcast
Challenges in the security landscape

Challenges in the security landscape

A recent research report from LogRhythm found that a whopping 75 percent of security professionals say they have more stress now than they did two years ago. The report also found that: · 92 percent said that they need additional preventative solutions to close security gaps · 93 percent admitted…

Register for Challenges in the security landscape

Sponsored by: Cisco

Challenges in the security landscape

A recent research report from LogRhythm found that a whopping 75 percent of security professionals say they have more stress now than they did two years ago. The report also found that:

· 92 percent said that they need additional preventative solutions to close security gaps

· 93 percent admitted that they lack the tools they need to detect known security threats

Forrester joins us to discuss the most pressing challenges currently facing security professionals at organizations of all sizes and what they are doing to overcome security risk. We will introduce Cisco Cloud Mailbox Defense, the new email security product engineered to help security professionals address email threats and overcome security challenges working with Microsoft 365 cloud email. 
Watch this webinar now to learn how you can:

· Optimize your email security to minimize your risk of advanced threats

· Get complete visibility into inbound, outbound, and internal messages

· Improve threat detection, response, and remediation with the Cisco Talos threat research team

· Be up and running in less than five minutes without changing the mail flow

Speakers

Speaker

Jinan Budge

Principal Analyst

Forrester

Speaker

Christian Clasen

Technical Marketing Engineer 

Cisco

Vendor Webcast

A master class in IT security: Roger Grimes teaches ransomware mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. With 30+ years experience as a computer…

Register for A master class in IT security: Roger Grimes teaches ransomware mitigation

Sponsored by: KnowBe4

A master class in IT security: Roger Grimes teaches ransomware mitigation

Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware.

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

In this session you’ll learn:

  • How to detect ransomware programs, even those that are highly stealthy
  • Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
  • The policies, technical controls, and education you need to stop ransomware in its tracks
  • Why good backups (even offline backups) no longer save you from ransomware

You can learn how to identify and stop these attacks before they wreak havoc on your network.

Speakers

Speaker

Roger Grimes

Data-Driven Defense Evangelist

KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

DemoCast webcast

Identify online account risk before it’s too late

With fraud creativity exploding, due to the pandemic and one-third of user activity operating as high risk, companies are left to wrestle with how they tell their threat actors and users apart. Bringing trust to the digital environment is about laying out the red carpet for legitimate users but also…

Register for Identify online account risk before it’s too late

Sponsored by: Mastercard

Identify online account risk before it’s too late

With fraud creativity exploding, due to the pandemic and one-third of user activity operating as high risk, companies are left to wrestle with how they tell their threat actors and users apart. Bringing trust to the digital environment is about laying out the red carpet for legitimate users but also understanding how the enemy behaves and changes techniques.

In this webcast, attendees will learn how behavioral biometrics:

  • helps companies detect risk within an account before it’s too late;
  • enables organizations to trust legitimate users;
  • provides the latest insights on the human side of security; and
  • improves experiences for genuine users.

Magali Vander Vorst

Marketing Manager

NuData, A Mastercard Company

Kevin Rowland

Head of Global Business Development

NuData Security, a Mastercard company

ON-DEMAND WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast

Vulnerability Prioritization: Bridging the Gap Between Security and IT

Too many Security and IT teams know the challenge of establishing an efficient and effective remediation workflow. Mired by murky direction, unsupported priorities, and an insurmountable number of vulnerabilities to tackle, friction can develop between these teams that ultimately hinders security efficacy.  As companies transform their operations and secure their…

Register for Vulnerability Prioritization: Bridging the Gap Between Security and IT

Sponsored by: VMWare

Vulnerability Prioritization: Bridging the Gap Between Security and IT

Too many Security and IT teams know the challenge of establishing an efficient and effective remediation workflow. Mired by murky direction, unsupported priorities, and an insurmountable number of vulnerabilities to tackle, friction can develop between these teams that ultimately hinders security efficacy. 

As companies transform their operations and secure their modern cloud workloads, this challenge that was previously considered “the nature of the beast” is no longer justifiable. To operationalize vulnerability management efforts, bilateral buy-in from both Security and IT teams is paramount. Aligning these groups can be simplified when both are working off the same list of data-backed, prioritized vulnerabilities.

How do you do this? 

VMware Carbon Black’s Senior Vice President of Security Products Tom Corn and Kenna Security’s Chief Product Officer Jason Rolleston will unpack the key steps needed to bridge the gap between Security and IT, including:

  • Establishing a single source of truth for vulnerability prioritization between Security and IT
  • Increasing the efficiency of vulnerability remediation efforts with clear data-backed prioritization
  • Defining clear priorities and recommendations for Security and IT to execute to streamline vulnerability management tasks and improve overall security efficacy
  • Saving time, money, and cycles by focusing on the vulnerabilities that will make the most impact

Attendees of this webcast may be eligible for one CPE credit.

Speakers

Speaker

Tom Corn

Senior Vice President, Security Business Unit

VMware

Tom Corn leads strategy, product marketing, technical marketing, and evangelism/field CTO team for VMware’s Security Business unit.

Speaker

Jason Rolleston

Chief Product Officer

Kenna Security

Jason most recently served as Vice President for Security Operations Products at McAfee, where he was responsible for McAfee’s security operations products, including SIEM, endpoint detection and response, behavioral analytics, and sandboxing. Prior to that, he served as Head of Product Management for Enterprise Routing at Cisco and held several senior positions at Symantec. He holds a B.S. in applied physics and a masters in engineering management from Cornell University, and an MBA from the University of Chicago Booth School of Business.

Vendor Webcast

Improving collaboration between IT & security teams with next generation antivirus

Security and IT teams rank improved collaboration as a top priority for the coming year. However, it’s not always an easy path to create true collaboration between teams. 83 percent of respondents state that IT and Security Teams have a negative relationship, according to a recent Forrester study.  Security and…

Register for Improving collaboration between IT & security teams with next generation antivirus

Sponsored by: VMWare

Improving collaboration between IT & security teams with next generation antivirus

Security and IT teams rank improved collaboration as a top priority for the coming year. However, it’s not always an easy path to create true collaboration between teams. 83 percent of respondents state that IT and Security Teams have a negative relationship, according to a recent Forrester study. 

Security and IT teams moving to a more consolidated approach can tap into benefits including fewer security breaches, improved IT hygiene, and the ability to quickly identify, contain, and remediate threats.

How does this collaboration take place? What are the technologies that need to be in place for these teams to work together toward a common goal? What are the challenges faced?

Join experts Elizabeth Schultheisz, Bob Plankers, and Katherine Chipdey as they discuss how security and IT teams can collaborate. Gain insights including:

  • How the roles of individuals on the team are shifting 
  • The result of that shift and the new lines of communication required
  • How VMware technologies interact with each other in order to enable efficiency and collaboration for your teams 

Attendees of this webcast may be eligible for one CPE credit.

Speakers

Speaker

Katherine Chipdey

Solutions Engineer

VMware

Speaker

Bob Plankers

Sr. Technical Marketing Architect

VMware

Speaker

Elizabeth Schultheisz

Product Line Marketing Manager

VMware

Vendor Webcast

Prevent Supply Chain Email Attacks

Your supply chain partners represent a significant cyber risk, as demonstrated recently by the SolarWinds breaches. More attackers are exploiting organizations’ suppliers, partners, and vendors to launch phishing campaigns. These new tactics bypass cloud email defenses, legacy email gateways, and email authentication standards. Mitigating breaches from a compromised supply chain…

Register for Prevent Supply Chain Email Attacks

Sponsored by: Area 1 Security

Prevent Supply Chain Email Attacks

Your supply chain partners represent a significant cyber risk, as demonstrated recently by the SolarWinds breaches. More attackers are exploiting organizations’ suppliers, partners, and vendors to launch phishing campaigns. These new tactics bypass cloud email defenses, legacy email gateways, and email authentication standards. Mitigating breaches from a compromised supply chain requires a new approach to securing your third-party cloud and digital communications.

This webcast, will show the real-world tactics attackers use to infiltrate an organization’s digital ecosystem, and practical steps for preventing these supply-chain threats before you get breached.

Join to Area 1 Security in this webcast to learn:

  • the seven common supply chain-based attack methods including partner spoofing, business email compromise, new domain campaigns, malicious URLs, and more;
  • real examples of supply chain phishing attacks and the methods attackers use at every step of the cyber kill chain; and
  • the advanced, cloud-native email security techniques that proactively block these attacks in progress.

Speakers

Speaker

Juliette Cash

Senior Threat Researcher

Area 1 Security

Juliette Cash is a passionate information security professional with 15 years experience in technical consulting, computer network operations, and cyber threat analysis and research. She has dedicated her career to tracking and defending against highly sophisticated threats to protect both the public and private sectors, including the United States Intelligence Community and the world’s top Fortune 500 companies. As Area 1’s Senior Threat Researcher, Juliette leads the charge in advanced hunting, collection operations support, technical analysis of intrusion activity, and the development of innovative detection techniques that defend against complex and evolving security threats.

Speaker

Dominic Yip

Director of Sales Engineering

Area 1 Security

Area 1 Security’s Dominic Yip brings over 15 years of networking and security systems engineering expertise, including key engineering roles for Cisco and IronPort. At Area 1, he ensures that some of the world’s most sophisticated organizations — including Fortune 500 banks, insurance companies, airlines and healthcare providers — are protected from targeted phishing attacks.

Vendor Webcast

Too close to the Sun(burst): A supply chain compromise

Even the most secured and well-patched environments are at risk from cyber threats, evidenced by the SUNBURST attack on SolarWinds’ Orion software. When an incident like this occurs, your technical abilities and how you make decisions in the heat of a potential crisis are vital. This interactive crisis sim webcast…

Register for Too close to the Sun(burst): A supply chain compromise

Sponsored by: Immersive labs

Too close to the Sun(burst): A supply chain compromise

Even the most secured and well-patched environments are at risk from cyber threats, evidenced by the SUNBURST attack on SolarWinds’ Orion software. When an incident like this occurs, your technical abilities and how you make decisions in the heat of a potential crisis are vital. This interactive crisis sim webcast is inspired by the real-life events of SUNBURST and enables you to make decisions that balance the risks to your organization. You can investigate how a supply chain software compromise can affect your business and what actions (if any) you need to take. 

Join Immersive Labs in this webcast and see:

  • the impact of the human element in incident management and response;
  • how decisions in a major cyberattack have a business-wide impact; and
  • SUNBURST via our technical labs.

Speakers

Speaker

Chris Pace

Technology Advocate

Immersive Labs

Chris Pace serves as Technology Advocate for Immersive Labs, working to engage organizations with the power of human cyber readiness. Prior to beginning his career in information security, Pace trained as a broadcast journalist. He has additional experience working in IT departments in both the public and private sectors.

Speaker

Paul Bentham

Chief Product Officer

Immersive Labs

Speaker

Kev Breen

Director of Cyber Threat Research

Immersive Labs

DemoCast webcast
Manage third-party risk with a data-driven approach

Manage third-party risk with a data-driven approach

As organizations have increased their scope of vendors and partners, firms have increased their digital risk surface exponentially and are facing new challenges regarding vendor risk management. Traditional mechanisms for third-party risk management, like questionnaires and on-site assessments, are either no longer an option or have become too slow to…

Register for Manage third-party risk with a data-driven approach

Sponsored by: RiskRecon MasterCard

Manage third-party risk with a data-driven approach

As organizations have increased their scope of vendors and partners, firms have increased their digital risk surface exponentially and are facing new challenges regarding vendor risk management. Traditional mechanisms for third-party risk management, like questionnaires and on-site assessments, are either no longer an option or have become too slow to keep up with business needs. Fortunately, there are innovative techniques and practices to effectively manage, understand, and act on third-party cyber risk.

Join RiskRecon on this 30-minute Democast to see how we can help you:

  • utilize inherent risk methodologies to prioritize your vendors;
  • measure your vendor risk exposure;
  • and act on third-party risk and verifying remediation steps.

Speakers

Speaker

John Chisum

Senior Security Advisor

RiskRecon MasterCard

John Chisum leads RiskRecon’s Security Advisor team, with over 15 years of experience spanning the third-party risk, information security, and network security industries. Prior to RiskRecon, John worked with the anti-phishing and anti-fraud company Phishlabs, and has previously held solution architecture and technical sales positions with Juniper Networks’ service provider solutions team and Sprint’s Government Systems Division. He holds a B.S. from Clemson University in Computer Information Systems and is a Certified Third-Party Risk Professional. John currently resides with his family in Charleston, South Carolina.

DemoCast webcast

Protect against the next sunburst attack

Most SOC security products, including your legacy SIEM, were not designed to analyze the massive volumes of threat intelligence and security telemetry data available today. In response, a new generation of security analytics products has emerged to deliver threat detection and prioritization at scale, in real-time, and at a predictable…

Register for Protect against the next sunburst attack

Sponsored by: Anomali

Protect against the next sunburst attack

Most SOC security products, including your legacy SIEM, were not designed to analyze the massive volumes of threat intelligence and security telemetry data available today. In response, a new generation of security analytics products has emerged to deliver threat detection and prioritization at scale, in real-time, and at a predictable cost.

Join Anomali in this demo session to:

  • Learn how security analytics can complement their SIEM to immediately answer the most fundamental question: “Have we been impacted?”;
  • Understand how instant and unlimited retrospective search can speed threat detection, investigation, and response—including for critical events like the recent Sunburst and SolarWinds malware attack; and
  • Better understand the interplay between analyst research tools, security analytics systems, threat intelligence platforms, SIEM, and SOAR.

Get registered for the January 27th Anomali Webinar: Protect Against the Next Sunburst Attack

Speakers

Joe Gehrke

Solutions Architect

Anomali

As a Solutions Architect at Anomali, Joe Gehrke works with companies to build and operationalize threat intelligence programs and help solve some of their most complex challenges. Joe’s 20-year career in cybersecurity spans from security strategy to solution implementation. His current areas of focus include system interoperability, intelligence operationalization, and platform software development kits (SDKs)

Vendor Webcast
Post pandemic preparedness: A security & IT perspective

Post pandemic preparedness: A security & IT perspective

How Cloud Native Endpoint and Workload Protection Will Prepare You for the Future  Thanks to COVID-19, security and IT teams like yours responded— almost overnight— to a new reality. Organizations rushed to scale up distributed work, sometimes without considering the longer-term cybersecurity implications. What’s next? Eventually, we will start to…

Register for Post pandemic preparedness: A security & IT perspective

Sponsored by: VMWare

Post pandemic preparedness: A security & IT perspective

How Cloud Native Endpoint and Workload Protection Will Prepare You for the Future 

Thanks to COVID-19, security and IT teams like yours responded— almost overnight— to a new reality. Organizations rushed to scale up distributed work, sometimes without considering the longer-term cybersecurity implications.

What’s next? Eventually, we will start to get back to normal—or realize the new normal. Enterprises will reflect on their pandemic responses from a cybersecurity perspective. For many firms, COVID-19 helped identify major gaps in securing employees outside of the office.

Distributed work is here to stay. It’s time to think about building a resilient and future ready security stack.

So what tools does your organization need to succeed in a post pandemic era? In this presentation, cybersecurity strategist James Alliband will discuss:

The three most pressing obstacles facing security today – siloed organizations, lack of contextual awareness, and bolted-on point products

Tools security & IT managers can implement now to support longer-term remote and distributed work

Why cloud native endpoint security should be top of your priorities when considering your digital transformation plan

Longer-term benefits of investing in cloud native solutions

Speakers

Vendor Webcast
Hiding in the noise: How attackers take advantage of your alert fatigue

Hiding in the noise: How attackers take advantage of your alert fatigue

Adding new security tools to your SOC toolset may help alert you to your business’s latest cyber threats. However, when a million unprioritized alerts hit you in a day, it’s easy to quickly reach for the snooze button without understanding what is truly going on. Drowning in alerts, the best…

Register for Hiding in the noise: How attackers take advantage of your alert fatigue

Sponsored by: VMWare

Hiding in the noise: How attackers take advantage of your alert fatigue

Adding new security tools to your SOC toolset may help alert you to your business’s latest cyber threats. However, when a million unprioritized alerts hit you in a day, it’s easy to quickly reach for the snooze button without understanding what is truly going on. Drowning in alerts, the best enterprises are discovering that to cut through the chaos and triage alerts accurately, operators need to understand the attack from the adversary’s perspective.

In this session, Randori Director of Offense, Evan Anderson, and VMware Carbon Black Senior Threat Researcher, Greg Foss will break down what’s going inside the mind of an adversary once they land inside the network, how they take advantage of your alert fatigue to hide in the noise.

Attendees will gain:

  • A better understanding of the challenges and trade-offs adversaries have to consider when conducting an attack.
  • Examples of real alerts overlooked by security teams and how you can tell the difference.
  • Actionable tips on how you can leverage an adversary perspective to reduce alert fatigue and improve your visibility, detection, and response capabilities.

Speakers

Speaker

Greg Foss

Senior Cybersecurity Strategist

VMware

Greg Foss is a Cybersecurity Strategist at VMware Carbon Black where he focuses on detection engineering, security efficacy, and bypasses across the diverse product line. In previous roles, Greg led a Threat Research team, built and ran a Global Security Operations program, consulted in penetration testing, and worked as a security analyst for the federal government. Greg is a very active member of the Denver information security community who loves to give back and support the industry.

Speaker

Evan Anderson

Director of Offense

Randori

Evan Anderson is the Director of Offense at Randori. He has over 15 years of experience in red teaming, vulnerability research and exploit development and is a long-time member of the NCCDC Red Team. Prior to co-founding Randori, he worked at Kyrus Technologies supporting commercial and federal projects.

20/20 webcast
Inspired E-Learning: Effectively train employees on security and privacy

Effectively train employees on security and privacy

Defeating malware and ransomware attacks requires more than just technology — it requires people. Your people need to identify the threat, they need to mitigate the threat, and they need to clean up after the threat. The most important part of this three-legged stool is identifying the threat, because if…

Register for Effectively train employees on security and privacy

Sponsored by: Inspired E-Learning

Effectively train employees on security and privacy

Defeating malware and ransomware attacks requires more than just technology — it requires people. Your people need to identify the threat, they need to mitigate the threat, and they need to clean up after the threat. The most important part of this three-legged stool is identifying the threat, because if it is identified before it launches, you have a much easier time to clean up the problem and no data is compromised. Sometimes it will fall to non-security personnel to identify the threat – the random employee who get a phishing email, the employees who find “lost” thumb drives in the parking lot, or perhaps even the security guard who is asked to hold a door open for an “executive-looking” individual carrying coffee and doughnuts for their “colleagues.” Sometimes something that looks legit isn’t and it takes a keen eye to differentiate between the two. This 20/20 webcast will address how US-based security executives and HR staff can train employees to focus on security and privacy, even when it is not their sole focus.

Speakers

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Vendor Webcast
Intrinsic Security: Simplifying and improving threat protection with automation

Intrinsic Security: Simplifying and improving threat protection with automation

Cybercrime is up 600 percent during the COVID-19 pandemic as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased attacks. Organizations need a new cybersecurity approach to stay ahead of attackers. Gain strategic…

Register for Intrinsic Security: Simplifying and improving threat protection with automation

Sponsored by: VMWare

Intrinsic Security: Simplifying and improving threat protection with automation

Cybercrime is up 600 percent during the COVID-19 pandemic as companies deal with the challenges of securing a remote workforce. As the threat landscape evolves, security teams must remain agile in preventing and responding to increased attacks.

Organizations need a new cybersecurity approach to stay ahead of attackers. Gain strategic insights from VMware.

Join our webinar to learn how you can:

  • Simplify security products and operations by making security intrinsic.
  • Gain best practices on automation to improve threat protection.
  • Implement a Security Orchestration Automation and Response (SOAR) platform to dramatically reduce response times.
  • Use API functionality to improve threat analysis and provide robust, real-time reporting

Speakers

Speaker

Tom Kellerman

Head of Cybersecurity Strategy

VM Ware

Tom Kellermann is the Head of Cybersecurity Strategy for VMware. Previously, Tom held the position of Chief Cybersecurity Officer for Carbon Black Inc. Prior to joining Carbon Black, Tom was the CEO and founder of Strategic Cyber Ventures. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy.

DemoCast webcast

Cracking evasive and stealthy threats in today’s pandemic space

Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users…

Register for Cracking evasive and stealthy threats in today’s pandemic space

Sponsored by: Cisco

Cracking evasive and stealthy threats in today’s pandemic space

Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application. In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to deliver malware. The dropped malwares are deadlier and stealthier and are hybrid in nature. There is a need for advanced investigation techniques, like memory forensics in the case of ransomware attacks that are ransacking health sectors and entropy-based detection for new-age trojan exfiltration. Join us to learn how we use traditional methods to identify these threats and also add a pinch of new-age forensics tricks to do some big reveals.

Speakers

Speaker

Shyam Sundar Ramaswami

Lead Security Threat Researcher

Cisco Umbrella India Security Research

DemoCast webcast
Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Moving email to the cloud has likely changed the way you operate your organization, especially at a time when you have shifted to a remote workforce. Many of those conveniences translate to opportunities for bad actors. Join our email security webcast and learn how to remediate attacks quickly. Cloud Mailbox…

Register for Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Sponsored by: Cisco

Learn how to remediate attacks quickly with Cisco Cloud Mailbox Defense

Moving email to the cloud has likely changed the way you operate your organization, especially at a time when you have shifted to a remote workforce. Many of those conveniences translate to opportunities for bad actors.

Join our email security webcast and learn how to remediate attacks quickly. Cloud Mailbox Defense provides the tools to easily manage evolving threats in this new environment. Cloud Mailbox Defense is an integrated cloud-native security platform for Microsoft 365 that focuses on:

  • simple deployment
  • easy attack remediation
  • superior visibility
  • and best-in-class efficacy from Cisco Talos

Speakers

Speaker

Rob Marchi

Cisco Product Manager, Engineering

Cisco

Speaker

Christian Clasen

Technical Marketing Engineer

Cisco

Speaker

Jason Wright

Cisco Marketing Product Manager

Cisco