Upcoming webcasts

  • Show:
  • Show All
Fri December 02, 2:00 PM ET

Vendor Webcast

Three Practical Use Cases for Threat Intelligence

Join this webinar to learn how to take specific action in three areas of cybersecurity to make better security decisions and reduce the time to act against threats...

x

Three Practical Use Cases for Threat Intelligence

There is no shortage of sources of external threat intelligence, from free feeds to premium streams. Without the ability to identify the right piece of data and take action on it to stop threats, however, there is limited value no matter the price. Join this webinar to learn how to take specific action in three areas of cybersecurity to make better security decisions and reduce the time to act against threats.
More Info

Sponsored by: IBM

Mon December 05, 2:00 PM ET

Vendor Webcast

The Critical Infrastructure Attack Surface – Assessing Its Breadth, Fragility, Threats and Defenses

Should our view of the composition of CI evolve as the threats and underlying technologies evolve?

x

The Critical Infrastructure Attack Surface – Assessing Its Breadth, Fragility, Threats and Defenses

The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands.  It caused many to ask whether our current definition of “Critical Infrastructure” (CI) is sufficient.  Should our view of the composition of CI evolve as the threats and underlying technologies evolve?  If so, how?  What responsibility does the private sector play in protecting the nation’s CI?  Does compliance with best-practices for the protection of PII do enough to mitigate the risks for an organization likely to be impacted by an attack on the CI?  How is IOT amplifying the scope of CI? Where should organizations focus to best mitigate the growing and shifting threats?  
More Info

Sponsored by: LogRhythm

Tue December 06, 2:00 PM ET

Vendor Webcast

Password Management Perspectives

Join us for a compelling webcast discussing lessons learned and insights from a highly respected veteran cybersecurity analyst, a financial services IT professional...

x

Password Management Perspectives

Today, the attention of both IT and business managers in organizations of all sizes is fixed on cybersecurity. The reason is simple: Absolutely no organization is immune to cyber attacks in an ever-growing threat environment.

According to Verizon, 63% of data breaches are due to weak, stolen or default passwords. Considering that a single breach of a corporate network can have consequences that affect the entire business and everyone who works for it means password management is more important today than it’s ever been.

Join us for a compelling webcast discussing lessons learned and insights from a highly respected veteran cybersecurity analyst, a financial services IT professional and from a password management consultant.

The password management perspectives covered in this webcast will go a long way towards protecting your business from attacks that are inevitable. These perspectives include:

• Password management through the lens of CTO at a cybersecurity analyst firm
• A case study on how a mid-sized credit union fights cyber theft
• Live demonstration of the Keeper password management solution



 

More Info

Sponsored by: Keeper Security

Thu December 08, 2:00 PM ET

Vendor Webcast

Security Analytics – Paving the Way for Automation & Reducing the Risk of Breaches

In this webinar, Joseph Blankenship, senior analyst at Forrester, and Chris Brazdziunas, vice president of products at LogRhythm, will discuss security analytics...

x

Security Analytics – Paving the Way for Automation & Reducing the Risk of Breaches

Reducing the mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to cyber threats is a priority for every enterprise information security team. Security analytics solutions are improving the speed and accuracy of detection by providing security pros with better data with which to make decisions. These solutions are also delivering robust security context in alerts and accelerating response by providing efficient and effective incident orchestration workflows.       

In this webinar, Joseph Blankenship, senior analyst at Forrester, and Chris Brazdziunas, vice president of products at LogRhythm, will discuss security analytics and the role it plays in a mature security operations program.

You’ll learn:
• Key market dynamics driving the adoption of Security analytics 
• What constitutes critical capabilities of best-in-class  Security analytics solutions
• How to use Security analytics to identify the most critical threats amidst a mountain of security events
• The impact Security analytics  can have on improving your organization’s MTTD and MTTR
• How SA can reduce TCO as well as the risk of experiencing a material breach 
Register now to explore how security analytics can help you expedite your organization’s detection and response process.

More Info

Sponsored by: LogRhythm

Fri December 09, 2:00 PM ET

Vendor Webcast

Hunting and Disrupting Cyber-Criminals

See why more organizations are enforcing security in the cloud.

x

Hunting and Disrupting Cyber-Criminals

Warning. It’s Hunting Season.  Hackers don’t wear blaze orange. 

Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.  

Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you.

Hunt or be hunted.

Attendees will learn::

● Ways to identify malicious infrastructure across the internet to predict where future attacks may be staged.
● Why signature-based antivirus, firewalls, and proxy gateways don’t protect against advanced targeted attacks 
● How to gain visibility into threat across your endpoints, network and in the wild.

See why more organizations are enforcing security in the cloud.

More Info

Sponsored by: OpenDNS

Thu December 15, 2:00 PM ET

Vendor Webcast

Let's Get Fancy: Use Threat Intel to Find the Bears (Adversaries) in Your Network

Attend this webinar to see how to leverage threat intelligence to identify adversaries in your network.

x

Let's Get Fancy: Use Threat Intel to Find the Bears (Adversaries) in Your Network

Attend this webinar to see how to leverage threat intelligence to identify adversaries in your network. Follow recent investigations conducted by the ThreatConnect Research team into possible FANCY BEAR sightings to see firsthand how you can use data and intelligence to understand attackers and better protect your organization from potential threats.

In this webinar you will learn:
  • How to leverage data and intel to identify adversaries
  • How to make sense of threat intelligence through context and relevance
  • How you can block FANCY BEAR and other adversaries using a cybersecurity platform
More Info

Sponsored by: ThreatConnect

Fri December 16, 2:00 PM ET

20/20 Webcast

Privacy vs. Convenience Conundrum

Today's 20/20 looks at the daily face-off between convenience and security, sometimes also viewed as business operations versus personal privacy.

x

Privacy vs. Convenience Conundrum

In you work on the operations side of a business, it's all about productivity. In the financial industry, much of the data you deal with is either personally identifiable data or confidential corporate data, such as investments, mergers and acquisitions. If you are the CIO, you do whatever you can to help employees work faster and more efficiently. If you occupy the chair of the chief risk officer, CISO, or general counsel, you have an entirely different set of priorities. Today's 20/20 looks at the daily face-off between convenience and security, sometimes also viewed as business operations versus personal privacy.
More Info

Sponsored by: Samsung

Tue December 20, 2:00 PM ET

20/20 Webcast

Do Faster Payments = Faster Losses?

Today’s 20/20 webcast looks at the challenges faced by real-time payments versus the risk companies face from delayed payments.

x

Do Faster Payments = Faster Losses?

Americans like things Fast: fast Internet access, fast food and fast payments. But is fast always better? Fast internet access is good; fast food might clog your arteries, and fast payments might make it possible to lose your money much more quickly. So is fast better — not necessarily.  Even though countries around the world are implementing real-time or near real-time payments, potential fraud is still a factor. Today’s 20/20 webcast looks at the challenges faced by real-time payments versus the risk companies face from delayed payments.

More Info

Sponsored by: IBM

On-Demand Webcasts

  • Show:
  • Show All

Vendor Webcast

Secure Digital Business Transformation: What every CIO or CISO should know

Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000...

x

Secure Digital Business Transformation: What every CIO or CISO should know

Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom. Digital business transformation is no longer a question of it, but WHEN.
According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the center of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren’t. How ready is your enterprise?

Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000 organizations through a massive cloud transformation. This webcast will cover:

• The impact of digital transformation on your organization
• Bringing digital and transformation together
• Security strategies for a cloud-first enterprise
• Best practices that every CIO or CISO should know



 

More Info

Sponsored by: Zscaler

Vendor Webcast

Stay out of the headlines: A Planned Path to Reducing Risk

Join Bill Mann, Chief Product Officer at Centrify, as he walks through some proven practices for prioritizing a risk mitigation strategy.

x

Stay out of the headlines: A Planned Path to Reducing Risk

Today’s breaches all have a common attack vector – stolen usernames and passwords.  Attackers are making major headway into our businesses with simple tactics that exploit our weakest points.  It’s clear that we need to bolster our defenses, but prioritization can seem daunting.  Join Bill Mann, Chief Product Officer at Centrify, as he walks through some proven practices for prioritizing a risk mitigation strategy, starting with the easy gaps that most often lead to data breach, and moving to sophisticated and comprehensive control.
More Info

Sponsored by: Centrify

Vendor Webcast

How a Reliable CA Can Help with the Certificate Lifecycle

Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.

x

How a Reliable CA Can Help with the Certificate Lifecycle

Managing your SSL certificates doesn’t have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.
 
  • Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs.
  • Discuss what to look for when choosing your certificate provider.
  • Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
More Info

Sponsored by: Entrust

Vendor Webcast

The Power of the Cloud for Security Intelligence & Analytics

It's time to upgrade your network security game beyond simple perimeter defenses technology.

x

The Power of the Cloud for Security Intelligence & Analytics

It's time to upgrade your network security game beyond simple perimeter defenses technology.  But, how do you get visibility into and across your network without bringing additional tools in house and without leaving un-met needs on the table?  

You need an affordable solution that your staff can manage, and something that will expand and grow to meet your ever-changing business needs. 

Learn the power of the cloud in delivering a security intelligence and analytics platform to help you:

- Identify and contain incidents quickly with market leading security analytics
- Keep up with ongoing compliance and reporting requirements
- Get advanced cyberthreat protection in an all-operating-expense model
More Info

Sponsored by: IBM

Vendor Webcast

5 Steps to Improving Your Organization’s Visual Privacy

Dr. Larry Ponemon will walk through how companies can amp up their visual privacy policies to help protect them from this low-tech hacking technique that is a threat...

x

5 Steps to Improving Your Organization’s Visual Privacy

As security and privacy threats evolve, companies must be prepared to protect proprietary and confidential information in all forms from emerging threats – including visual hacking. In this webinar, attendees will learn just how prevalent visual hacking is worldwide, as evidenced by the Global Visual Hacking Experiment, sponsored by 3M. Dr. Larry Ponemon will walk through how companies can amp up their visual privacy policies to help protect them from this low-tech hacking technique that is a threat to organizations all over the world.
More Info

Sponsored by: 3M

Vendor Webcast

The Role of DevOps in Reducing the Likelihood of a Data Breach

In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an...

x

The Role of DevOps in Reducing the Likelihood of a Data Breach

Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**. Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster. While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. 

Specific topics addressing the threat of data breaches to be discussed include:

• The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention
• Practical steps both teams can take to transition to a secure DevOps environment
• Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle

More Info

Sponsored by: Veracode

Vendor Webcast

Understanding Insider Threats:  Proactive Protection from the Inside Out – Part II

Did you know, it only took one employee and a poor performance review to take down connectivity to appx 90% of North American networks by erasing configuration...

x

Understanding Insider Threats: Proactive Protection from the Inside Out – Part II

Did you know, it only took one employee and a poor performance review to take down connectivity to appx 90% of North American networks by erasing configuration files for nine routers within a global network operations center?

Join Ollie Luba, from Leidos and Stephan Jou from Interset, as they discuss user behavior analytics (UBA) and how it has become a non-negotiable when preventing cyber threats from inside your organization. Go with them behind the scenes to hear about real-world customer use cases and success stories.

Register here and attend this webcast to better understand:

  • user behavior analytics tools for detect insider threats
  • how to mitigate cyber risk
  • how to “make cybersecurity everyone’s responsibility”

 

More Info

Sponsored by: Leidos

Vendor Webcast

Automation: The Future of Security Incident Response

The core issue is that security teams are overwhelmed and lack the speed and agility to effectively stop a breach. The only way to make security teams more effective...

x

Automation: The Future of Security Incident Response

The era of the megabreach is upon us.  And it’s had a seismic effect on global businesses.  Many name-brand organizations are spending millions dealing with the aftermath of losing customer data or intellectual property, and others are working as hard as they can to avoid the type of media attention that no one wants.

The core issue is that security teams are overwhelmed and lack the speed and agility to effectively stop a breach. The only way to make security teams more effective at stopping breaches is to automate security incident response processes.  

Join guest speaker Joseph Blankenship, Forrester Senior Analyst and Piero DePaoli, Senior Director from ServiceNow’s Security Operations team as they discuss and demonstrate the following. 

•      The need for rules of engagement to defend against breaches

•      Defining policies and workflows to automate much of incident response

•      Best practices for creating a response index

•      Six game-changers for efficient security incident response - in action

More Info

Sponsored by: ServiceNow

20/20 Webcast

How to select a managed security service provider

This 20/20 webcast looks at the pluses and minuses for each approach and tries to makes sense out of the build-vs-buy dilemma for security services.

x

How to select a managed security service provider

It’s the age-old question: build or buy your security infrastructure and management. Do you invest in acquiring additional infrastructure, along with trained staff and the ongoing expenses for security, or do you hire a managed security services provider and do your security in the cloud? Today’s 20/20 webcast looks at the pluses and minuses for each approach and tries to makes sense out of the build-vs-buy dilemma for security services.

More Info

Sponsored by: Arctic Wolf Networks

20/20 Webcast

 Building a SOC

Today’s 20/20 looks at how the SOC functions, where it fits in the overall architecture of an IT environment, and why your company might benefit from a formalized...

x

Building a SOC

Most midsize to large companies have a network operations center from which all network activity can be monitored and managed. However, many fewer companies have a formal security operations center – or SOC. Today’s 20/20 looks at how the SOC functions, where it fits in the overall architecture of an IT environment, and why your company might benefit from a formalized SOC rather than just managing security through the IT department.
More Info

Sponsored by: LogRhythm

20/20 Webcast

Vulnerability management

LIVE NOW

x

Vulnerability management

It's all about identifying and defending against vulnerabilities. How well is the security software finding known vulnerabilities, such as viruses that have been identified for more than one year? Are you certain? Research shows that companies are far less successful at finding known vulnerabilities than they thought. Here's a harder question: How successful are you at finding unknown vulnerabilities, such as zero-day attacks? This SC Virtual Conference will address what companies are tending to do right and wrong when it comes to known vulnerabilities and what needs to be done to find the unknown vulnerabilities.
More Info

Vendor Webcast

Stop Ransomware In Its Tracks

Learn how ransomware threats work and how to stay secure against them.

x

Stop Ransomware In Its Tracks

Ransomware has become one of the most widespread and damaging threats internet users face today.
Since CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organizations. And in 2016 alone it’s cost over $1 billion.
Learn how ransomware threats work and how to stay secure against them.
  • Why these attacks are so successful
  • Common ransomware attack paths
  • Critical security features to stop ransomware
  • Nine practical steps to protect your organization
More Info

Sponsored by: Sophos

Editorial Webcast

From Target to the DNC: Inside a Breach

Substantive suggestions on mitigation techniques.

x

From Target to the DNC: Inside a Breach

While getting a firsthand view of a network breach in process, you’ll learn some tricks used by the bad actors, what they are after versus what you are protecting, ways these miscreants avoid being noticed and, of course, hear substantive suggestions on mitigation techniques.
More Info

Sponsored by: SC Magazine

20/20 Webcast

The Case for Security Awareness Training

This 20/20 webcast looks at necessity for on-going security awareness training, how it can be incorporated into the workday.

x

The Case for Security Awareness Training

Ask a security expert what the most vulnerable cog in the security wheel is and they will tell you it is the user. A company with the most detailed policies and procedures and best-in-class security hardware and software is still vulnerable if a user decides to take an action potentially compromises data, such as copying a confidential file to a thumb drive to work on it at home, opening a spearphishing email and clicking on the attachment, or deciding to check out their favorite YouTube channel from a workstation attached to the corporate network. This 20/20 webcast looks at necessity for on-going security awareness training, how it can be incorporated into the workday, and the kinds of user activities that can be changed through such training.

More Info

Sponsored by: KnowBe4

Vendor Webcast

How to Secure Any SaaS with Any Security in One Click

This webinar will show you an entirely new approach to protect your SaaS applications with the the vendors you trust like FireEye, Cylance, Check Point, Symantec...

x

How to Secure Any SaaS with Any Security in One Click

As most organizations have moved their Email, File Sharing, and other applications to SaaS, hackers are also shifting their focus and are starting to hack SaaS applications with threats ranging from malware and ransomware attacks, phishing and compromised credentials; to data loss, unauthorized file-sharing and compliance violations. This webinar will show you an entirely new approach to protect your SaaS applications with the the vendors you trust like FireEye, Cylance, Check Point, Symantec, McAfee, Palo Alto Networks and more. No traffic redirection or proxy needed - all via API and with one click. Join to learn how!

More Info

Sponsored by: Avanan

Vendor Webcast

Data Threats 2016 – The Good, The Bad and The Ugly

What we found across the world when surveying IT Security professionals was that when it comes to their protecting their data there are things we’re doing well...

x

Data Threats 2016 – The Good, The Bad and The Ugly

What we found across the world when surveying IT Security professionals was that when it comes to their protecting their data there are things we’re doing well, bad habits we’ve all gotten into, and some really ugly results – with some industries much harder hit than others.  Learn about these results, and what you should be doing about them, from leading analyst Garrett Bekker with 451 Research and author of the 2016 Vormetric Data Threat Report.
More Info

Sponsored by: Vormetric

Editorial Webcast

Using cyberthreat intelligence effectively

This webcast looks at the changing landscape in threat intelligence and how to create actionable defenses from the multiple data streams available today.

x

Using cyberthreat intelligence effectively

Today’s cybersecurity professionals have evolved well beyond simply reacting to data breaches. Certainly every bit akin to James Bond's 007 agent in the battle against corporate cyberattacks, state-sponsored assaults on corporate data or targeted, criminal data breaches, executive leaders like you must now be prepared to not only mitigate attacks but have some data prior in order to better fend off these onslaughts. As such, threat intelligence is no less essential in defending against today’s cyberattack than political intelligence is needed in the world of global affairs of state. This webcast looks at the changing landscape in threat intelligence and how to create actionable defenses from the multiple data streams available today.    

More Info

Sponsored by: Recorded Future

MarketFocus Webcast

If you’re serious about security, think like a visionary

Intel Security will discuss where most companies go wrong and provide recommendations for keeping your organization safe.

x

If you’re serious about security, think like a visionary

Today’s visionary security leaders know that a compliance audit is only part of the picture, and that without a comprehensive security framework, it’s likely that at some point their networks will be breached.

A recent survey, commissioned by Intel Security and distributed on the company's behalf to the readers of SC Magazine, uncovered some unexpected results. While data theft was listed as the #1 threat survey participants are most concerned with preventing, companies seem fairly upbeat about their ability to respond. But sophisticated malware and targeted attacks are also constantly increasing and evolving. Proliferation on this scale is almost impossible to defend against at the perimeter by treating your security like another exercise. This leaves the cybercriminals with free access to your valuable data without your knowledge.  
The bad guys aren’t slowing down. To protect yourself and your organization against today’s advanced threats, you must act like a visionary and lead your organization through sound, constant risk management and data security controls. Intel Security will discuss where most companies go wrong and provide recommendations for keeping your organization safe.

More Info

Sponsored by: Intel Security

Vendor Webcast

Beyond Certificate Management – PKI Operations Management for the Enterprise

Join us to explore why managing certificates may not be enough.

x

Beyond Certificate Management – PKI Operations Management for the Enterprise

As enterprise and IoT certificate usage continues to increase, many have made the leap from unmanaged certificates, to tracking with a spreadsheet, to implementing certificate management software.  While automating the certificate lifecycle with software is a good first step, the backbone Public Key Infrastructure (PKI) and the operations that support this crucial IT service must be enhanced to ensure it continues to maintain the intended level of trust in the organization.
 
Join us to explore why managing certificates may not be enough. Learn how control over PKI operations helps reduce risk and improve efficiency by centralizing certificate sources, preventing outages, mitigating breaches and boosting IT effectiveness while meeting compliance and regulatory requirements.
 
Topics include:
 
•         Elevating your PKI to an enterprise-class operation
•         PKI and certificate vulnerabilities and risks
•         Pitfalls of managing only certificates
•         Advantages of managing your entire PKI operations
•         Assessing your current state
•         Best practices for PKI operations and certificate management
More Info

Sponsored by: CSS Security

Vendor Webcast

Go Beyond the Phish with Wombat Security CTO Trevor Hawthorn

Join Wombat Security CTO Trevor Hawthorn as he discusses the Wombat Security 2016 Beyond the Phish Report.

x

Go Beyond the Phish with Wombat Security CTO Trevor Hawthorn

Join Wombat Security CTO Trevor Hawthorn as he discusses the Wombat Security 2016 Beyond the Phish Report. The webinar will discuss end-user readiness, current trends, as well as strategies and tips for identifying and preventing security threats beyond the phish that can put your company at risk if left unaddressed. Key threat vectors discussed include social engineering, password security, mobile/BYOD security, and working safely outside the office.

More Info

Sponsored by: Wombat Security

20/20 Webcast

Incident Response from the inside out

Let’s take a deeper dive today into the components of an IR plan, specific activities the IR team will undertake, and how to analyze the incident response and...

x

Incident Response from the inside out

The last time we spoke about incident response, we discussed some of the basics about setting up an IR program and some of the dos and don’ts of IR. Let’s take a deeper dive today into the components of an IR plan, specific activities the IR team will undertake, and how to analyze the incident response and learn how to do it better the next time – because there will be a next time.
More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Putting the brakes on mobile application security issues

This 20/20 will look at mobile application security issues and how to address them.

x

Putting the brakes on mobile application security issues

Mobile security continues to be a challenge for corporate IT departments. Even though the Apple and Android stores claim to be very careful about the applications they allow to be distributed through those stores, many of those applications are found to have malware preinstalled or serious security vulnerabilities. In some cases, IT departments require that software be downloaded from the vendors directly, but that’s no promise of security either. This 20/20 will look at mobile application security issues and how to address them.

More Info

Sponsored by: Arxan

Vendor Webcast

The 2016 Securing Information in the Age of Collaboration Report – Areas of Concern and How To Mitigate them with a Data-Centric Security Strategy

Join this webinar and gain practical information on how to best design a comprehensive Data-Centric Security Strategy for shared information that will protect data...

x

The 2016 Securing Information in the Age of Collaboration Report – Areas of Concern and How To Mitigate them with a Data-Centric Security Strategy

The need for organizations to collaborate with third-party entities is making sharing files with such audiences’ commonplace with 34% of participants indicating that 26% to 50% of their employees regularly share files with individuals external to their organizations. And every day we are hearing about an employee being duped into sending sensitive files to a vendor that is actually a malicious actor. These dynamics correlate to the need for security controls such as Enterprise Digital Rights Management (EDRM) to protect sensitive information when it travels outside of the corporate firewall.

In this presentation, analyst Doug Cahill from Enterprise Strategy Group (ESG) will discuss the findings from a recent study where over 200 IT and Security Professionals shared their views on the challenges with external collaboration, and his recommendations for best practices. Lynne Courts, VP of Marketing from Seclore will share how to build a comprehensive data-centric security strategy with such technologies as next-generation EDRM. 

Join us and discover:  
• The most vulnerable information – what types of files are regularly shared externally that pose the greatest risks.
• Industry and analyst views on where shared sensitive data needs protecting, and what defences are most effective.
• How next-generation data-centric security is enabling organizations to embrace technology innovations such as file synch and share and the use of personal devices with less risk.
• What to look for in a data-centric security solution to ensure a successful implementation.

Join this webinar and gain practical information on how to best design a comprehensive Data-Centric Security Strategy for shared information that will protect data, meet compliance regulations and reduce your risks. This webcast is for anyone who manages or handles the security of documents that are shared externally, whether you are in IT, Security or a Business Unit.



 

More Info

Sponsored by: Seclore

Vendor Webcast

Understanding Insider Threats:  Proactive Protection from the Inside Out – Part I

From unpatched vulnerabilities to third-party apps installed by employees, insider threat is a highly dynamic cybersecurity issue that requires a different strategy...

x

Understanding Insider Threats: Proactive Protection from the Inside Out – Part I

Did you know, according to  Ponemon Institute, 62% of business users have reported they have access to company data they probably shouldn’t see. From unpatched vulnerabilities to third-party apps installed by employees, insider threat is a highly dynamic cybersecurity issue that requires a different strategy for prevention.
 
Join Andy Ashmar, Manager, Insider Threat Services at Leidos  and Paul Reid, Technology Strategist at Interset on Tuesday, October 11th at 2 PM EST as our senior insider threat subject experts go “behind the scenes” using the latest user and entity behavior analytics (UEBA) and machine learning technologies to implement an insider threat program. 
 
Register to attend Understanding Insider Threats:  Proactive Protection from the Inside Out –Part I webcast on Tuesday, October 11th at 2 PM to:
 
•        Develop a successful insider threat detection program
•        Proactively detect and mitigate cyber threats
•        Understand how and why analytics and machine learning are security game changers
•        Communicate meaningful, context rich risk reports to executives and board members

More Info

Sponsored by: Interset

Vendor Webcast

Why Information Sharing is Critical for Easing Security Operations

How Cisco ISE and Infoblox uses automated information exchange to see and stop threats faster

x

Why Information Sharing is Critical for Easing Security Operations

Today’s security teams are flooded with alerts from dissimilar sources and they have to manually correlate and assemble data from these sources to mitigate threats, which is a complicated and slow process.   They struggle to gain clear visibility across an increasingly diverse infrastructure, including network and security operations silos, making it difficult to recognize, prioritize, and contain threats before it’s too late.
 
Infoblox integration with Cisco pxGrid enables automatic sharing of critical information, such as DDI data and network context, and rapid containment of threats.  Infoblox DDI is a data gold mine that identifies infected devices, where they’ve been, and the malicious sites they tried to access.  Infoblox combines identity context derived from ISE via pxGrid with indicators of compromise detected by DNS Firewall to create actionable network intelligence to see and stop threats faster.
 
Join Infoblox and Cisco in this webinar to learn about:
• How siloed security are damaging defense
• Why DNS is the enabler for malware and ransomeware
• How Cisco ISE and Infoblox uses automated information exchange to see and stop threats faster

More Info

Sponsored by: Infoblox

Vendor Webcast

Top 5 reasons why SIEM is a bad idea for small and midsize companies

Let’s discuss the top 5 reasons why SIEM as a product is a bad idea for your business.

x

Top 5 reasons why SIEM is a bad idea for small and midsize companies

No company is too small to get attacked. Every company is a target for an attack. Most large companies protect their business & IT through comprehensive, 24x7, security operations. However, using just a cloud/ SaaS/ co-managed SIEM will not help you detect or manage attacks. In fact, using SIEM as a product may cause more harm or damage than you think. Let’s discuss the top 5 reasons why SIEM as a product is a bad idea for your business. We will cover the upfront costs, resources, expertise, and long deployment cycles of SIEM. We will also cover the alternate options to safeguard your small or medium sized business like Fortune 500 companies, but in an efficient and economical way.

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Recovery Against the Growing Threat

Best practices & recommendations to reduce risk and assure continuous data protection and recovery.

x

Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Recovery Against the Growing Threat

The ransomware crisis is growing exponentially, with more than 45% of businesses hit in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. Additionally, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware an inevitability.

Join this live webcast with guest speaker, Forrester Vice President and Principal Analyst John Kindervag and Code42 Enterprise Systems Engineer Arek Sokol to learn more about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers. You’ll hear:

• Why ransomware is a burgeoning business and who is being targeted. 

• Best practices & recommendations to reduce risk and assure continuous data protection and recovery.

• How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom.
More Info

Sponsored by: Code42

Vendor Webcast

RANSOMWARE: Your money or your data

Ransomware is increasingly targeting business – and the cost of an attack goes well beyond the ransom.

x

RANSOMWARE: Your money or your data

In the last few years, ransomware has taken the cybercrime world by storm. CryptoWall 3.0, one of the most lucrative and broad-reaching ransomware campaigns, was alone responsible for 406,887 infection attempts and accounted for about $325 million in damages in 2015.1 And, according to the Institute for Critical Infrastructure Technology, ransomware promises to wreak more havoc in 2016.

While individual users were once the preferred target of ransomware, perpetrators have increasingly set their sights on businesses and organizations. And you can bet that with larger targets, the ransom demands will increase accordingly.Are you prepared for such an attack?

Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your business and why legacy security solutions don’t stand a chance against such threats. Bil will also cover:
• How has ransomware evolved
• Lessons learned from the recent attacks
• Why is cloud sandboxing so important
• How ransomware can be mitigatedgoes

More Info

Sponsored by: Zscaler

20/20 Webcast

Security Analytics

This 20/20 webcast will look at the issues surrounding security analytics and how to use them most effectively.

x

Security Analytics

If there has been one buzzword that has dominated the enterprise market lately its “big data.” Everybody wants a piece of the big data pie, but big data isn’t just the domain of big companies. It seems midsize businesses too want to filter their data using so-called big data analytics tools. But what does all of this really mean? What is security analytics and how can it help a company perform more effective data security across its networks? Today’s 20/20 webcast will look at the issues surrounding security analytics and how to use them most effectively.
More Info

Sponsored by: LogRhythm

Vendor Webcast

Voice of AppSec: The State of Application Security Practice 2016

In this webinar, Tim Jarrett, Senior Director, Enterprise Security Strategy of Veracode, shares insights about the current perceptions and practices organizations...

x

Voice of AppSec: The State of Application Security Practice 2016

Would it surprise you to learn that ….
A recent survey found that most security professionals use a Web application firewall as their primary method for ensuring application security? Or that only 30% of respondents keep track of the open source components used in development?

In this webinar, Tim Jarrett, Senior Director, Enterprise Security Strategy of Veracode, shares insights about the current perceptions and practices organizations are reporting regarding their approach to application security. 

Topics to be discussed will include:
•      Trends related to application security risk within these organizations
•      How organizations are currently addressing these risks
•      Changes to strategy and budget priorities to address application security concerns
•      The primary obstacles organizations face in adopting an application security strategy and program and how they can overcome them

More Info

Sponsored by: Veracode

Vendor Webcast

Triage: The Art of Threat Detection and Risk Assessment

How to artfully perform IT Security triage to increase productivity and reduce alarm fatigue.

x

Triage: The Art of Threat Detection and Risk Assessment

Today’s increasingly sophisticated threat landscape combined with disparate detection systems has left security teams drowning in hundreds if not thousands of events and alarms. Without the right tools and processes sorting through the noise and identifying whether an event is an actual incident is increasingly difficult, if not impossible. 

In healthcare, medical professionals use triage procedures to quickly assess, prioritize and allocate the right resources to treat patients, adjusting their response to the severity of the situation. Similar to healthcare, today’s cyber security teams dealing with a constant barrage of alarms must utilize the concept of triage to gain control of their IT environment.

In this webinar, Paul Davis, director of advanced threats security solution architects at Cisco, and Seth Goldhammer, director of product management at LogRhythm, will breakdown how to artfully perform IT Security triage to increase productivity and reduce alarm fatigue.

You’ll learn:
• Challenges your peers are facing around alarm fatigue
• What triage is and how you can apply the concept to your environment
• How AMP Threat Grid can provide intelligence into your disparate events
• How LogRhythm can turn triage and intelligence into actionable response
Register now to learn how LogRhythm and Cisco AMP Threat Grid can help you streamline your prioritization and response to events.

More Info

Sponsored by: LogRhythm

Vendor Webcast

The New Enterprise Security Model: Cyber Risk Management

This webcast explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats...

x

The New Enterprise Security Model: Cyber Risk Management

One of the biggest challenges in cyber security today is how to manage the volume, velocity, and complexity of data generated by the myriad of IT security tools. The feeds from these disconnected, siloed tools must be analyzed, normalized, and remediation efforts prioritized. The more tools, the more difficult the challenge. This security model requires legions of staff to comb through huge amounts of data to connect the dots and find the needle in the haystack. These efforts can take months, during which time attackers can exploit vulnerabilities and extract data. Rather than adding more tools, organizations need to implement a new, more efficient enterprise security model. According to analyst firm Gartner, cyber risk management that uses intelligence-driven analytics can help organizations operationalize cyber security practices, break down silos, and enhance security operations tasks through automation.
 
This webcast explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.

More Info

Sponsored by: RiskSense

Vendor Webcast

Hacker vs. Defender: How Threat Actors Attack Vulnerabilities and How to Defend Against Them

In this enlightening webinar you will hear from both sides – hacker vs. defender, exploitation vs. prevention, exfiltration vs. remediation.

x

Hacker vs. Defender: How Threat Actors Attack Vulnerabilities and How to Defend Against Them

When it comes to cyber security, you’ll find there’s no shortage of experts with information as to how to prevent breaches from happening. But what does an impending attack look like from a threat actor’s perspective?

In this enlightening webinar you will hear from both sides – hacker vs. defender, exploitation vs. prevention, exfiltration vs. remediation.

Join us and you will get the backgrounds of recent data breaches, plus:

Hear a “threat actor” perspective:
•         How they observe and select the target – the “slow gazelle”
•         Why they select certain targets
•         Their definitions of an opportunistic vs. targeted victim
•         How they complete the kill chain (attack structure)
 
Hear a “defender” perspective:
•         How they detect and remediate; disrupting the kill chain
•         How they purge any path the threat actor sets up for future access
•         How they apply the security measures to recent data breaches and how these breaches could have been prevented

More Info

Sponsored by: Armor

Vendor Webcast

Overcoming the Two Biggest Obstacles to Effective Data-Centric Security

Recent public data breaches has made data protection an executive-level issue, but such heightened awareness has highlighted two significant data protection problems...

x

Overcoming the Two Biggest Obstacles to Effective Data-Centric Security

The good news is that senior business leaders are increasingly aware of the risk to the organization’s sensitive data. A steady stream of public data breach disclosures has made data protection an executive-level issue. For most organizations, however, such heightened awareness quickly shines a light on the two biggest problems in data protection.

The first problem is that organizations don’t really know where their sensitive data is – because their data is pretty much everywhere: on premise, in the cloud, and on a diverse range of platforms and devices. The second difficulty is ensuring people and processes make the right decisions about how data should be handled. Both of these challenges need to be addressed before it is possible to make decisions about the various technical means for data protection (e.g., access controls, monitoring, encryption, right management)

In this webinar, learn how to:
• Discover your data at rest, and intercept your data in motion
• Analyze both your data and your user behaviors to monitor trends, and to identify areas of risk
• Classify your data, and inform policies for how it should be protected
• Implement mechanisms to allow people and processes to make better day-to-day decisions on how data should be handled

More Info

Sponsored by: Titus

Vendor Webcast

FAILURE TO SECURE: The 2016 State of Privileged Account Management

Groundbreaking research from Thycotic and Cybersecurity Ventures indicates 52% companies fall short in protecting privileged credentials

x

FAILURE TO SECURE: The 2016 State of Privileged Account Management

Groundbreaking research from Thycotic and Cybersecurity Ventures indicates 52% companies fall short in protecting privileged credentials

It’s shocking to realize how many organizations today are still struggling with securing their privileged account passwords. Especially since privileged credentials are prime targets for hackers and malicious insiders to gain access to your most critical and sensitive data.

 

How do you think your organization compares to these PAM Benchmark Survey results?

  • 60% still rely on manual methods to manage privileged accounts and credentials
  • 20% have never changed their default passwords
  • 70% don’t require approval to create privileged accounts

 

Join us in this information packed webinar and you will learn:

  • Results of our groundbreaking research conducted with 500+ organizations world-wide
  • Current limitations in privilege account management fundamentals
  • How to identify if your organization has security risks in your privileged account management practices
  • Best practice recommendations you can immediately implement to improve your security posture

 

Special incentive: All attendees will be given free access to an online PAM benchmark to learn how their organization’s privileged account management practices compare to their peers.

More Info

Sponsored by: Thycotic

Vendor Webcast

Okta Provisioning Deep Dive: The Roadmap for Next-Gen Lifecycle Management in the Cloud

Attend this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features, and learn how Okta Lifecycle Management can help...

x

Okta Provisioning Deep Dive: The Roadmap for Next-Gen Lifecycle Management in the Cloud

Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. The average customer needs to deal with many inbound asks to provision applications to different user types, with different lifecycles, and sometimes this requires a complex business process.

Attend this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features, and learn how Okta Lifecycle Management can help automate your IT and business processes. Securely delegate to business application owners all inbound requests for access in the organization, and have the ability to easily detect when users have access to an application when they shouldn’t. You’ll learn:

  • What is Okta Lifecycle Management
  • What new roadmap features Okta announced at Oktane around lifecycle management
How to configure the new Access Request Workflow for a multi-step application approval process
More Info

Sponsored by: Okta

20/20 Webcast

Stopping Data Exfiltration

OK, we know the bad guys are in the network. We might not be able to stop every attempt to enter the network, so let's focus our efforts to ensure they cannot leave...

x

Stopping Data Exfiltration

OK, we know the bad guys are in the network. We might not be able to stop every attempt to enter the network, so let's focus our efforts to ensure they cannot leave the network. 

This 20/20 webcast looks at strategies companies can take immediately to stop data exfiltration and some general, long-range tactics they might consider putting in place to ensure that attackers who enter cannot reach back out to their command and control centers.

More Info

Sponsored by: Infoblox

Vendor Webcast

Activated Charcoal-- Making sense of endpoint data

This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

x

Activated Charcoal-- Making sense of endpoint data

Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.
 
This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats. 
 
You’ll discover:
• Why endpoints are the new perimeter
• How employees can strengthen your security operations strategy
• Techniques to test and validate security awareness programs
• How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform 
 
Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

More Info

Sponsored by: LogRhythm

Vendor Webcast

Over 50% of Insider Threats come from the Inside – Learn how to solve them

Attend this webinar and learn how you can detect insider threats faster, easier and more efficiently than ever before.

x

Over 50% of Insider Threats come from the Inside – Learn how to solve them

Attend this webinar and learn how you can detect insider threats faster, easier and more efficiently than ever before. With the latest advancements from an IBM app, you can monitor users, detect unusual behaviors, identify at-risk users, create watch lists and calculate user risk scores—all from a dedicated dashboard with a user-centric view.  Even better news is that this new app can be downloaded at no cost so you can protect your organization from insider threats right away.
More Info

Sponsored by: IBM

Vendor Webcast

Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways

Join Atri Chatterjee, Chief Marketing Officer, Zscaler Inc., for a compelling webcast providing deep insights into Gartner's findings that are relevant for CISO's...

x

Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways

According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. Newer and more advanced threats are creating risks that traditional appliances are struggling to keep up with. Consequently, the report highlights a number of key priorities for your security strategy, including:

• The need for ‘advanced threat defense’ and not just a web filtering solution
• The critical nature of securing your remote offices

Join Atri Chatterjee, Chief Marketing Officer, Zscaler Inc., for a compelling webcast providing deep insights into Gartner's findings that are relevant for CISO's and CIO's. He will also address:

• Latest security trends for enterprise security
• Implications of the recent M&A activity in the security market
• Key considerations when making your next web security decision
More Info

Sponsored by: Zscaler

Vendor Webcast

Baking Security into Digital and Cloud Initiatives - Tips, tricks and security best practices

The escalating demand for agility is driving cloud-based digital initiatives to the forefront of today’s enterprise economy.

x

Baking Security into Digital and Cloud Initiatives - Tips, tricks and security best practices

Continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. The escalating demand for agility is driving cloud-based digital initiatives to the forefront of today’s enterprise economy. Software-centric companies keenly focused on delivering differentiated customer experiences are reshaping markets and the way we do business.
 
Digital enterprises are migrating mission-critical workloads to the cloud and leveraging advanced AWS infrastructure to reap the benefits of agile development and competitive advantage. However, a lack of real-time visibility inhibits robust and consistent cloud security… and keeps business executives awake at night.

In this webinar, George Gerchow and Mark Bloom will be discussing:
• Tips and tricks to get deep visibility into your AWS Logs
• Leveraging log management solutions for cloud security analytics and visualizations
• Tips, tricks and best practices to maximize the value derived from your investments
• Challenges encountered in the journey and how they were addressed

More Info

Sponsored by: SumoLogic

Vendor Webcast

A day inside a SOC - Part 2: Routines, roles and investigations

Back by popular demand, join us for Part 2 of our "A Day Inside A SOC" series

x

A day inside a SOC - Part 2: Routines, roles and investigations

The Security Operations Center, or SOC, is the command center for security monitoring and incident response. You’ve seen them in the news, the movies, even on TV. But what really happens on the inside?

Back by popular demand, join us for Part 2 of our "A Day Inside A SOC" series, where we'll dive into:

• Routines: How they are affected by shifts, roles and tooling
• Roles: What other skillsets and professions are found in SOCs
• SOC and Analyst layouts: More details on screens and their origins
• Investigations: What they were before SIEM, after SIEM and with AlienVault USM
• Whether you are a "one-man SOC" or part of a team, you'll come away with practical tips to improve threat detection and response.

More Info

Sponsored by: AlienVault

Vendor Webcast

Stopping Targeted Attacks with Sandbox Technology

Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.

x

Stopping Targeted Attacks with Sandbox Technology

Targeted threats using zero-day malware embedded in file downloads and email attachments are increasingly used to attack organizations like yours. Unfortunately these bleeding-edge attacks are often undetectable by traditional anti-virus engines.
 
So what can you do to keep yourself secure?
 
Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.
 
In the session we’ll cover:
• Why organizations like yours need sandboxing
• How Sophos Sandstorm keeps you secure against the latest threats
• Getting started with sandbox protection that’s simple to use and affordable
More Info

Sponsored by: Sophos

Vendor Webcast

Building the business case for privileged account security

This webinar will help you justify a privileged account security project to business and executive management through demonstrated methods that streamline operations...

x

Building the business case for privileged account security

To stay competitive in the market, businesses need to remain agile, minimize costs and maximize user productivity – all without compromising on security.  

This webinar will help you justify a privileged account security project to business and executive management through demonstrated methods that streamline operations and simplify user processes all while improving the organization’s security posture. You’ll better understand how to maximize the value of a privileged account security investment, enable IT teams to do more with less and eliminate tedious manual processes. 

We’ll use sample business case elements that address how organizations can: 
• Reduce the attack surface and detect threats faster to minimize the potential damage
• Automate processes to save and time and money – and improve employee satisfaction
• Improve audit processes by centralizing audit data and protecting its integrity
More Info

Sponsored by: CyberArk

Vendor Webcast

Fight Ransomware Now or Pay the Price Later – Learn How with Zones

Learn what you need to become a Ransomware expert

x

Fight Ransomware Now or Pay the Price Later – Learn How with Zones

Ransomware, a familiar–and unwelcome–issue in IT security circles, has risen sharply in recent months to become one of the top enterprise cyber security threats of 2016. Ransomware threats in 2015 were up 165% over the previous year, according to a recent study by professors at Northeastern University. Experts say that Ransomware has a lot to do with exploitation of the human element – like employees, customers, and suppliers. But organizations can still win with the right technology on their side.

Deploying tech offerings and tools designed to combat Ransomware alongside comprehensive company-wide strategies can go a long way in preventing – and in the worst case – mitigating a Ransomware incident’s impact. Learn what you need to become a Ransomware expert. In this webinar we will discuss:

• How Ransomware has evolved
• What Ransomware might do next
• Best in class Ransomware solution

More Info

Sponsored by: OpenDNS

20/20 Webcast

Software-Defined Data Centers: Not Your Daddy's Data Center

This 20/20 webcast looks at the trends as well as the business and technical trade-offs between physical versus virtual versus hybrid data centers, plus how the...

x

Software-Defined Data Centers: Not Your Daddy's Data Center

Datacenters generally are a very high-cost, high-maintenance expense. They often are not only expensive in terms of hardware and software, but also infrastructure costs ranging from HVAC and physical security to real estate and personnel, not to mention soft costs such as property taxes and utilities. The alternative, of course, is outsourcing, which also is rife with challenges. This 20/20 webcast looks at the trends as well as the business and technical trade-offs between physical versus virtual versus hybrid data centers, plus how the three core components of a SDDC must be coordinated. These include network, server and storage virtualization.
More Info

Sponsored by: HyTrust

Vendor Webcast

Top Cybersecurity Experts Reveal How to Protect Your Business Against Cyber Attacks

Live solution demonstration: See how Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to...

x

Top Cybersecurity Experts Reveal How to Protect Your Business Against Cyber Attacks

Cyber attacks on businesses of all sizes are at an all-time high. A recent study by Keeper Security and the Ponemon Institute found over 50% of small to medium-sized businesses (SMBs) have been breached in the past 12 months.

Studies show that IT security budgets and access to experienced security personnel is lacking within SMBs.  The challenge for these organizations is to get a clear understanding on where the greatest vulnerabilities exist and then leverage proven best practices and technologies that provide high risk mitigation potential, are cost effective and easy to implement.

On this webcast, three cybersecurity and privacy experts will provide you with the following:

• Exclusive research: SMB cybersecurity trends, emerging threats and best practices

• Case study: How one CIO defends his organization against cyber theft

• Live solution demonstration: See how Keeper Security is transforming the way businesses and individuals protect their passwords and sensitive digital assets to significantly reduce cyber theft



 

More Info

Sponsored by: Keeper Security

Vendor Webcast

The modern way of hunting - How three CTOs tackle incident response

Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope along with for a complete review of what it takes to accelerate investigations, decrease...

x

The modern way of hunting - How three CTOs tackle incident response

Your corporate network is open terrain.  And it's hunting season.  Malware, ransomware, and phishing scams are lurking.  It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here. 

Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild. 

Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future. 

Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope along with for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched. 

Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on July 29th at 10am PT. You’ll learn:

● Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
● Three unique approaches for digging deeper into what happened before, during, and after an attack
● How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

Register now and let the hunting begin.
More Info

Sponsored by: OpenDNS

Vendor Webcast

Securing Office 365 is Easier than Herding Sheep

The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable...

x

Securing Office 365 is Easier than Herding Sheep

The pervasiveness of shadow IT is a result of the tremendous value these SaaS applications are providing to end users. Because of data exposure and threat insertion risks, users can’t run unchecked. A sledgehammer approach of simply blocking applications is not the right approach. Disrupting business critical applications while blocking risky applications will have significant business impact since users have become accustomed to using these applications to do their daily jobs. This has never been truer than with Office 365. This puts a spotlight on the existing challenge of securing SaaS applications that can no longer be ignored. 

Enable safe usage of SaaS applications, including Office 365, with complete visibly and granular enforcement across user, folder and file activity within the applications to prevent data risk and compliance violations.

This webinar will show you how to:

● Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.
● Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
● Protect against new insertion and distribution points for malware.
● Gain visibility and granular, context-based control of SaaS applications.

The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
More Info

Sponsored by: Palo Alto Networks

Vendor Webcast

Guccifer 2.0, the DNC Hack and Fancy Bears, oh my!

Join us for a webinar on July 28 to see how the ThreatConnect research team was able to build off the work of others to add its own observations gleaned from analyzing...

x

Guccifer 2.0, the DNC Hack and Fancy Bears, oh my!

On June 15, 2016, Crowdstrike, published a blog article detailing the breach of the Democratic National Committee (DNC) by two Russia-based threat groups. ThreatConnect, using the Crowdstrike blog article as a basis, conducted further research into the DNC breach and discovered additional findings and also challenged Guccifer 2.0’s claimed attribution for the DNC breach. 

Join us for a webinar on July 28 to see how the ThreatConnect research team was able to build off the work of others to add its own observations gleaned from analyzing the metadata on Guccifer 2.0’s released files and other discoveries. 

We’ll talk about: 
• The methodology and tools that the ThreatConnect research team used: 1) to find additional intelligence for future protection and 2) come up with competing hypotheses concerning Guccifer 2.0 
• The findings: what we uncovered - Fancy Bear, Guccifer 2.0, and the timeline
• Why other agencies and organizations should care about this information and what they should do with it - i.e. it’s not just a DNC problem.



 

More Info

Sponsored by: ThreatConnect

Vendor Webcast

Access Denied: Reducing the Risk of Data Breach

How to ensure your organization is protected from privileged user compromises

x

Access Denied: Reducing the Risk of Data Breach

$40 billion is spent annually on information security products. The vast majority of that sum is spent on legacy security technologies like firewalls, anti-virus and intrusion prevention.  Albeit a valuable component to defending networks from being breached, networks are being accessed in frequency with increased severity.  The cyber threat involves a different set of solutions than those which have traditionally been deployed.
 
The majority of these breaches are categorized as inside threats. The most notable breach concern is the insider threat, in particular the privileged user.  Malicious or negligent these roles create a high risk scenario for critical government data to be exfiltrated.  Such breaches cause significant concerns to critical infrastructure, mission success, and personal information being compromised.
 
In this webinar you will learn from industry experts:
 
•         Key threat vectors and how to mitigate risks
•         How a layered approach to cyber security creates a more compelling defense against threats
•         Role based access controls that extend from the data center to the cloud
•         How to ensure your organization is protected from privileged user compromises

More Info

Sponsored by: Vormetric

Vendor Webcast

API vs. Proxy: Understanding How to Get the Best Protection from Your CASB

Attendees of this webinar will learn the pros and cons of API and proxy-based CASBs and be able to answer these critical questions about them

x

API vs. Proxy: Understanding How to Get the Best Protection from Your CASB

More than a quarter of 3rd party apps connected to corporate environments are considered "high-risk.” This explains why you might be feeling pressure to secure your company’s IP when there is no longer an identifiable network perimeter.

That’s where Cloud Access Security Brokers (CASBs) come in. A CASB can help you secure your full cloud security footprint. But not all CASBs are created equally -- some use API-mode, and others use proxy-mode. Does it really make a difference? Which implementation method should you choose?

Attendees of this webinar will learn the pros and cons of API and proxy-based CASBs and be able to answer these critical questions about them:


• Which one will enable you to protect SaaS, IaaS, and PaaS?
• Which one will enable you to secure unmanaged traffic?
• Which one will enable you to maintain network performance?
More Info

Sponsored by: Palerra

Vendor Webcast

A CISO’s guide to navigating cyberinsurance

Join us for an informative webinar where we will discuss what security professional need to know to ensure they are protected.

x

A CISO’s guide to navigating cyberinsurance

Cyberinsurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyberinsurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. Join us for an informative webinar where we will discuss what security professional need to know to ensure they are protected, including:

• The current state of cyberinsurance from a business operations perspective – what is covered and what isn’t
• What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack
• How financial reimbursement does not address the real impact of a data breach
• How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game

More Info

Sponsored by: SecureAuth

Vendor Webcast

Cloud Agility and Security: Misperceptions Dispelled

Real World Strategies for Migrating to the Cloud Securely

x

Cloud Agility and Security: Misperceptions Dispelled

When companies move their IT assets to the cloud, they have an opportunity to realize cost savings, accelerate innovation and improve IT performance. Unfortunately, the utility of the cloud is constrained by perceptions and misperceptions about security and control. And even without appropriate controls in place, organizations are moving to the cloud at a very fast pace.
 
For those of us responsible for security, this is a terrifying proposition--our most precious assets are seemingly moving outside of our control.  However, perhaps, the cloud is more secure than you realize.  Perhaps the cloud is a chance for a restart for how your organization looks at security of its data and applications.  In this webcast, we’ll dispel some of the misperceptions that exist and jump right into both “lift and shift” and cloud native strategies for migrating to the cloud securely.  Knowledge is power and this is an opportunity to advance your team’s understanding of the cloud and how to accelerate the transition.  
 
You will learn how to:
 
•         Develop an organization-wide cloud strategy
•         Assess your risk as you adopt cloud solutions
•         Identify common practices and frameworks for cloud migrations
•         Determine which cloud migration architecture meets your business objectives
More Info

Sponsored by: Dell SecureWorks

20/20 Webcast

It's all about risk

Today's 20/20 broadcast will look at how risk analytics works, how it fits into an overall cyber security strategy, and what kind of actionable intelligence you...

x

It's all about risk

It's all about risk. Virtually everything we do in information security balances the value of the data with the potential risk having that data compromised. But what is risk analytics anyway and how is it different from risk management? Today's 20/20 broadcast will look at how risk analytics works, how it fits into an overall cyber security strategy, and what kind of actionable intelligence you can expect to glean from your network.
More Info

Sponsored by: Anamoli

Vendor Webcast

Keeping Your Workloads Secure on AWS

Are you moving applications from your data center to AWS?

x

Keeping Your Workloads Secure on AWS

Are you moving applications from your data center to AWS? If so, you have a new set of challenges around securing those workloads. While AWS provides strong security for their underlying compute and networking infrastructure, you are responsible for security of your workloads, data and apps. Doing that in an environment that is dynamic and elastic — like AWS — calls for a modern approach to security. 

Join this informative webinar to learn about:
• Key points of AWS’ shared responsibility model for security
• When it’s necessary to supplement AWS Security Groups with more granular network security
• How to ensure data security compliance to meet the requirements of auditors
• Ways to ditch manual processes through security automation

More Info

Sponsored by: CloudPassage

Vendor Webcast

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

This webinar will dive into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps.

x

Beyond Deployment Velocity: How Technology and Process Increase the Likelihood of a Successful, Secure DevOps Initiative

DevOps - one of the most disruptive trends to hit software development – is a major organizational and cultural driver of development and IT operations. DevOps practices such as continuous integration and continuous deployment are core concepts, but automation alone does not encompass why DevOps is rapidly changing application development.  DevOps has more to do with changing the organization’s mindset, fostering teamwork and a commitment to quality — as opposed to the quantity — of code being delivered. These practices provide the opportunity to improve the security of applications by enabling developers to weave security testing, validation, and monitoring into application development, deployment and production. Yes, DevOps enables teams to work together to identify and address the obstacles which slows the delivery software, but it’s that they work together — instead of in silos — while turning priorities upside down that’s getting results. This shared job of getting things right instead of just getting things done, when you include security as a basic assumption, is resulting in secure, quality software, and a sense of empathy that allows teams to work more effectively.
 
This webinar will dive into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discuss the challenging process and technical requirements for integrating security into DevOps. Join Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode as they discuss these challenges and trends related to security and DevOps including:
 
•         A broad based look at DevOps and DevOps principles beyond code production
•         The DevOps cultural impact both inside and outside the development pipeline
•         Getting Started with Secure DevOps
•         The role of security champions
•         How to break down barriers from a cultural perspective
By embracing DevOps principles and looking beyond the pipeline to organizational and production capabilities, the chances of successfully integrating security with DevOps are substantially improved.
 

More Info

Sponsored by: Veracode

Vendor Webcast

Shell No! — Uncovering Adversary Web Shell Trends and Mitigations

Web shells are preferred by specific threat actor groups for their small size and ability to maintain unauthorized access.

x

Shell No! — Uncovering Adversary Web Shell Trends and Mitigations

Phishing is effective, but predictable. A drive-by (watering hole) campaign paired with a zero-day exploit also accomplishes the objective, but identifying and compromising the correct website(s) for specific victim redirection is tricky and time consuming. 

Contrast those attack vectors with web shells. Identifying a target’s vulnerable web server and implanting a web shell is relatively straightforward and perhaps unexpected. Most organizations maintain a web presence full of application layer software which presents a wide attack surface. Web shells are preferred by specific threat actor groups for their small size and ability to maintain unauthorized access. 

In this threat intelligence webinar Levi Gundert, Vice President of Information Security Strategy, will show:

• Numerous web shell samples.
• Malicious web shell attack trends. 
• The current web shell taxonomy.
• Specific guidance for operational defenders on detecting web shell attacks.

More Info

Sponsored by: Recorded Future

20/20 Webcast

Incident response: One size fits none

This 20/20 looks at the steps you need to take to launch an incident response and how to develop your incident response plan.

x

Incident response: One size fits none

The FBI just called to tell you your data is plastered across the dark web. What do you do now? Whom do you call first? Do you hit the power switch on the servers or start a forensic investigation? This 20/20 looks at the steps you need to take to launch an incident response and how to develop your incident response plan. (Spoiler alert -- don't turn off that server!)

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Are you ready for behavioral firewalls? A proactive approach to preventing insider threats and breaches

The Preempt Behavioral Firewall is changing how security teams improve enterprise security in real time.

x

Are you ready for behavioral firewalls? A proactive approach to preventing insider threats and breaches

Despite Next Gen Firewalls and some of the latest User Behavior Analysis solutions, organizations still struggle with preventing breaches and identifying insider threats. One cannot respond to threats and the other does not understand user behavior. Enterprises need a more automated way of responding to emerging threats, by analyzing user behavior, without overwhelming the security organization.

 

The Preempt Behavioral Firewall is changing how security teams improve enterprise security in real time. Register now to learn how organizations are using Behavioral Firewalls to improve visibility, gain security insights, instantly verify user identity and automatically respond to threats. 

More Info

Sponsored by: Preempt

Vendor Webcast

Upgrading Your Firewalls?  Use the Opportunity to Deploy a More Resilient Inline Security Fabric.

Attend this webinar to learn how an Ixia Security Fabric™ works with next generation firewalls and other appliances to maximize security resilience and deliver...

x

Upgrading Your Firewalls? Use the Opportunity to Deploy a More Resilient Inline Security Fabric.

Any time you’re looking to strengthen and/or upgrade your inline security infrastructure, you have the perfect opportunity to also upgrade your security fabric.  Even new security tools can’t do their job if your network is compromised by device failures, packets are dropped, or tools are overwhelmed.  You need an inline security fabric designed to minimize downtime and maximize detection of cyber threats.
 
Attend this webinar to learn how an Ixia Security Fabric™ works with next generation firewalls and other appliances to maximize security resilience and deliver the best possible ROI for your security investments.
 
What You’ll Learn:
•         Current security tool deployment practices
•         What is a bypass switch?  What is a network packet broker (NPB)?
•         What is Ixia Security Fabric™?
•         How can I improve my inline security tool deployments?

More Info

Sponsored by: Ixia

Vendor Webcast

Are open source vulnerabilities hiding out in your repo?

Here’s what you need to know to stay secure while realizing the benefits of open source.

x

Are open source vulnerabilities hiding out in your repo?

Artifactory streamlines use of open source for your development teams giving a central location where they can select and access the latest versions of the open source components they rely on. But unless you are vigilant, open source vulnerabilities in your repository can quickly affect your apps.  Here’s what you need to know to stay secure while realizing the benefits of open source. In this session you will learn:

• How open source vulnerabilities can appear in your codebase
• Why traditional security testing approaches often miss open source vulnerabilities and what you can do about it
• Best practices in mitigating open source vulnerabilities throughout the development lifecycle

More Info

Sponsored by: Black Duck Software

Vendor Webcast

Follow that file – Tackling file sharing compliance risks

Join a distinguished panel of seasoned information security experts and practitioners to gain pragmatic file collaboration security and compliance insights.

x

Follow that file – Tackling file sharing compliance risks

File sharing demand has ushered in the age of Bring Your Own Collaboration (BYOC), as well as a complex array of data protection and privacy compliance challenges for IT to manage. From network files shares and e-mail to new cloud-based file sharing platforms, once a file containing sensitive, regulated or confidential data is obtained by an authorized employee or third-party, data leakage liabilities begin to mount.

 

What are the key operational and legal measures to consider to balance business needs with compliance mandates?

 

Join a distinguished panel of seasoned information security experts and practitioners to gain pragmatic file collaboration security and compliance insights as this roundtable tackles:

  • How to prioritize legal file data privacy and protection obligations?
  • How to avoid common file access and sharing control oversights?
  • When to involve which constituents when upgrading file security policies and controls?
  • What file security caveats exist in cloud-based file sharing platforms?
  • Where can file protection controls breakdown or are impractical?
  • How best to prepare for and respond to the imminent file data leakage incident?
More Info

Sponsored by: FinalCode

Vendor Webcast

PCI 3.2: From checkbox assessment to security control

PCI DSS version 3.2 focuses on security control accountability, a concept that introduces the notion of continuous monitoring and measurement of your entire security...

x

PCI 3.2: From checkbox assessment to security control

“Four out of five companies still fail at interim assessment,” according to the "Verizon 2015 PCI Compliance Report."  
 
PCI DSS version 3.2 focuses on security control accountability, a concept that introduces the notion of continuous monitoring and measurement of your entire security ecosystem.
 
Join Christopher Strand, security, risk and compliance officer at Carbon Black, as he provides an overview of the 3.2 changes and demonstrates how Carbon Black has been helping thousands of organizations under the scope of PCI prove these measures and remain in continuous compliance.
 
You’ll learn:
• Where to deploy and measure critical security controls and processes to ensure continuous compliance and achieve a strong security posture.
• The ways in which Cb File Integrity Control can reduce noise within your environment and narrow the scope of compliance efforts.
• Why making a paradigm shift from patch mitigation to threat mitigation will ensure your PCI security posture has no weak spots.
• How malware and ransomware breaches, like the ones making headlines, could have been prevented with the Carbon Black approach.
More Info

Sponsored by: Carbon Black

Vendor Webcast

Data Breach Risk Intelligence That Matters

In this session, we will discuss a straightforward approach to quantifying and reporting on the potential financial liability and impact of a data breach.

x

Data Breach Risk Intelligence That Matters

When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal penalties. In this session, we will discuss a straightforward approach to quantifying and reporting on the potential financial liability and impact of a data breach. We will use real world experiences to show how to create actionable intelligence encompassing sensitive data and detected threads as well as the importance of producing reports and analysis showing:

• Liability exposure for C-level executives and board members tied to financial reporting;
• Clear prioritization of where to invest IT resources to prevent breaches and maintain shareholder value;
• Metrics that substantiate and validate efforts to reduce and mitigate the impact of a breach;
• Calculations to help evaluate risk posture organization-wide.

More Info

Sponsored by: LogicNow

20/20 Webcast

Deconstructing DDoS

This 20/20 webcast looks at the state of the DDoS market, some of the factors that are causing it to expand and some recommendations for companies to defend against...

x

Deconstructing DDoS

Distributed denial of service attacks are one of the most common types of attacks used by those who are not interested in stealth but rather simply causing a web site extreme grief. This 20/20 webcast looks at the state of the DDoS market, some of the factors that are causing it to expand and some recommendations for companies to defend against these attacks.

More Info

Sponsored by: Arbor Networks

Vendor Webcast

Big Data security unwrapped

Join this webcast for live and interactive access to an esteemed panel of security thought leaders who will answer your questions and discuss live polling results...

x

Big Data security unwrapped

Hadoop Environments are holding and analyzing an incredible and growing amount of data for most organizations.  This data represents intellectual property, monetized product, and is increasingly holding regulated data.  These facts are making big data environments prime cyber threat targets and a challenge for both security compliance offices. 

 

Join this webcast for live and interactive access to an esteemed panel of security thought leaders who will answer your questions and discuss live polling results on current best practices and the direction of Hadoop data protection. 

More Info

Sponsored by: Vormetric

Vendor Webcast

What Guns Are in Use By Cyber Attackers - NSS Labs Readout on Q116 Exploit Activity

Join our webinar to get a full review of exploits that were used so far in the first half of 2016 by cyber attackers.

x

What Guns Are in Use By Cyber Attackers - NSS Labs Readout on Q116 Exploit Activity

It’s common knowledge that there over 1 million new forms of malware being introduced per day. Security practitioners know that on a given day, an enterprise class network can have thousands of vulnerabilities.  And yet, security teams are MASH units at best.  But, there is a better way.  Cyber Advanced Warning SystemTM (CAWS) identifies active exploits, their application targets and whether or not specific security products can stop them.  

Join our webinar to get a full review of exploits that were used so far in the first half of 2016 by cyber attackers.  Details on what assets they have in the cross hairs and how security product categories have fared against them.  You might be surprised at where your security teams should be focused. 

More Info

Sponsored by: NSS Labs

Vendor Webcast

Managing Privileged Access Security In A Hybrid IT World

With many new identities to account for, decision-makers must properly designate privileged access while still taking advantage of the efficiencies of the cloud...

x

Managing Privileged Access Security In A Hybrid IT World

Business success today increasingly means leveraging digital technology to win, serve, and retain customers. Indeed, decision-makers are investing in cloud technologies, allowing remote access for employees, and employing more outsourced services in order to drive efficiency. Although these actions are increasingly necessary to increase competitive advantage, they also increase the size of a firm's attack surface. With many new identities to account for, decision-makers must properly designate privileged access while still taking advantage of the efficiencies of the cloud and outsourcing more than ever.

In November 2015, Centrify commissioned Forrester Consulting to examine how IT decision-makers both secure and grant privilege to identities in cloud-based environments. Centrify has invited Andras Cser, Principal Analyst and VP at Forrester, to comment on the results and discuss:

• How firms are employing cloud services to store sensitive data and drive vital workloads
• The extent to which firms are engaging in outsourcing and allowing remote access to employees
• How privileged identity management (PIM) is more important than ever in this environment
• The benefits gained by a selection of firms who have chosen PIM-as-a-service to manage identify

More Info

Sponsored by: Centrify

Vendor Webcast

Testing NGFW: Three Points of Value Critical to Your Enterprise

In this data-rich webcast, NSS Labs, the world’s leading security insight company, shares its methodology for testing NGFW capabilities, including key features...

x

Testing NGFW: Three Points of Value Critical to Your Enterprise

Three drivers that are key to the success of your NGFW solution deployment include: Integration with security workflow, low total cost of ownership, and security effectiveness in your increasingly complex threat landscape. How do you know which solution will work best for your distributed enterprise environment?

In this data-rich webcast, NSS Labs, the world’s leading security insight company, shares its methodology for testing NGFW capabilities, including key features to consider when selecting a network security solution. Forcepoint Stonesoft shares its insights on the NGFW testing process and how its products align with the needs of your enterprise.

More Info

Sponsored by: Forcepoint

20/20 Webcast

The SMB conundrum with information security

What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches?...

x

The SMB conundrum with information security

SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? (This question can be addressed either by security consultants that specialize in SMB markets or by Secure Web Gateway vendors)

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Are ransomware attacks holding your industry hostage?

Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks.

x

Are ransomware attacks holding your industry hostage?

Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more. 

Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.

But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.

Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:

  • Reduce ransomware infections across your organization
  • Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
  • Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps

Register now to learn how to start covering your healthcare security gaps.
More Info

Sponsored by: OpenDNS

Vendor Webcast

PKI: Essential Security and Enablement for Today’s Digital Business

The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.

x

PKI: Essential Security and Enablement for Today’s Digital Business

In Digital Business today, with traditional barriers falling away, trust in every entity on your network becomes crucial. Cyber threats are at an all-time high and all cyber threats are fundamentally an attack on identity, whether that be an individual, a device or an application. All need to be strongly identified and differentiated in in terms of privilege and permissions.  PKI is the ideal vehicle for this,  enabling strong identity across the enterprise. In this session, Todd Landry, PKI Senior Product Manager at Entrust Datacard, will look at the drivers and challenges of today’s digital business and discuss how PKI can build a profoundly secure architecture for the digital enterprise. The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.
More Info

Sponsored by: Entrust

Vendor Webcast

Staying relevant in a HybridIT world: Secure Access is now about IT saying “yes” to the next generation of workers, apps, networks and things

We are at a turning point where IT teams must say “yes” to remain relevant, and intelligently select security solutions that will still allow for compliance.

x

Staying relevant in a HybridIT world: Secure Access is now about IT saying “yes” to the next generation of workers, apps, networks and things

We are at a turning point where IT teams must say “yes” to remain relevant, and intelligently select security solutions that will still allow for compliance. For far too long, IT have been getting away with being inflexible to the requests of their workforce.  

 

The reason was simple – they set the rules and workers followed them with data security being the key justification, like it or not.  But to harness the productivity of the new breed of tech savvy workers along with cloud services, personal devices and internet enabled things, traditional IT has to transform into HybridIT, they must be flexible yet retain a level or risk comfort.

Can we switch the tone here to be more positive?  How does IT Security adapt to this new world, and bring the paradigms of strong auth and device compliance that the enterprise needs to manage risk to the new Hybrid IT architectures of Mobile and Cloud while making apps easy to use and respecting employee privacy?

More Info

Sponsored by: Pulse Secure

Vendor Webcast

“Where Is My Data?” And Other Terrifying Questions Facing IT/Security Professionals

Attend this webinar and see the latest international research of executive IT and security professionals, and what they actually know about their sensitive data...

x

“Where Is My Data?” And Other Terrifying Questions Facing IT/Security Professionals

While the sensitive information of an organization IS its value, most struggle knowing where it is and it’s risk of its misuse or breach.  And denial is common in many organizations, as they don’t know what they do not know.  

Attend this webinar and see the latest international research of executive IT and security professionals, and what they actually know about their sensitive data.  Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute and Bill Burns, CISO and Interim CIO of Informatica will join together to explore how you can tackle this daunting problem and gain support for data security intelligence across your enterprise.

Specifically, you will:

1.      Learn about the dangerous knowledge gap of sensitive data

2.      Hear what keeps your IT and security peers up at night

3.      Get in the trenches advice on how to tackle data security intelligencec

More Info

Sponsored by: Informatica

Vendor Webcast

Welcome to the next phase of endpoint management

Join us to explore the benefits of this new endpoint management and security solution—and learn how it can help improve your organization.

x

Welcome to the next phase of endpoint management

Automate your endpoint management and security
An influx in workstations, servers, laptops, smartphones and tablets has made it increasingly difficult for corporations and government agencies to effectively manage their computing endpoints. 

Tasks that used to be simple—such as determining how many laptops exist within an organization—can now take days to complete with conventional management methods, and there’s no guarantee those answers will be accurate. Fortunately, there are other options.

In IBM’s upcoming webinar, Welcome to the next phase of endpoint management,  John Beal, Endpoint Security and SaaS Leader, IBM Canada, will discuss IBM BigFix—a smarter, faster endpoint management and security solution. This new solution enables IT to see and manage physical and virtual endpoints—including point-of-sale devices, ATMs and self-service kiosks—and rapidly remediate threats, protect endpoints and submit security reports in real time.

By automating time-intensive tasks across complex networks, organizations can:

  • effectively reduce risk and support compliance
  • better manage distributed endpoints, both on- and off-network
  • deliver necessary IT services and support with minimal disruption
  • reduce the labour and processes required to manage and secure endpoints

Join us on May 25, 2:00 pm EDT to explore the benefits of this new endpoint management and security solution—and learn how it can help improve your organization.

More Info

Sponsored by: IBM

Vendor Webcast

Bridging Network & Endpoint Security

In this session we will examine workflows used by mature SOC and IRT practices to efficiently resolve security investigations.

x

Bridging Network & Endpoint Security

Security Operators detect and respond to threats by examining data generated by network and endpoint monitoring tools. One of the biggest challenges is bridging these two different types of tools. In this session we will examine workflows used by mature SOC and IRT practices to efficiently resolve security investigations.
More Info

Sponsored by: Lancope

20/20 Webcast

Overcoming ransomware

Today’s 20/20 webcast looks at some of the ways ransomware attacks are conducted, why they can be so devastating, and how to defend against those attacks.

x

Overcoming ransomware

Ransomware is hardly new but it has evolved into a very dangerous trend. A recent Flash alert from the FBI that raised concern about a new breed of ransomware is in the wild and attacking US corporations is just the latest in a series of warnings and advisories from the Dept. of Justice.

Today’s 20/20 webcast looks at some of the ways ransomware attacks are conducted, why they can be so devastating, and how to defend against those attacks.

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Selecting An Application Security Testing Vendor

Finding an appropriate security testing vendor or technology becomes a critical step toward securing our business applications.

x

Selecting An Application Security Testing Vendor

We have to accept and deal with the fact that our applications with be attacked by hackers. Therefore, before being moved into production and exposed to such attacks, our applications should be tested for possible security vulnerabilities. Finding an appropriate security testing vendor or technology becomes a critical step toward securing  our business applications. In this session Joseph Feiman, Chief Innovation Office at Veracode will discuss the following key issues:
 
  • What technology and business criteria your application security testing (AST) vendor should satisfy?
  • What AST technologies you should adopt?
  • What technologies should complement your AST choice? 
  • How to optimize your AST choice?
More Info

Sponsored by: Veracode

Vendor Webcast

Helping the C-Suite Define Cyber Risk Appetite

Join RSA for this informative session as we discuss practical steps for identifying and categorizing cyber risk with your key business stakeholders and technical...

x

Helping the C-Suite Define Cyber Risk Appetite

In the constantly changing landscape and myriad of sources behind cyber risk, executives and board members are increasingly forced to take ownership and accountability. Yet many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies that are ineffective and reactionary.

The success and failure of modern enterprises is dependent on the ability to quantify cyber risk and make informed decisions within an organizations cyber risk appetite. Those who do so effectively will be better positioned to enable continued growth and those who do not, will expose their organization to risks with potential calamitous implications. Without having a foundational, solid understanding, determining how and where to allocate human, financial, and technology resources is a complicated calculus. 

Join RSA for this informative session as we discuss practical steps for identifying and categorizing cyber risk with your key business stakeholders and technical owners of risk. Attend this session to calculate your own organizations cyber risk appetite.

More Info

Sponsored by: RSA

Vendor Webcast

Do You Really Know Your Users? How User Behavior Analytics Can Help You Detect User Threats

As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re...

x

Do You Really Know Your Users? How User Behavior Analytics Can Help You Detect User Threats

As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.
 
Many companies are confronting this challenge with User Behavior Analytics (UBA). This solution can help you detect and respond to user threats, including when:
 
  • An insider turns against your organization
  • A cyber-attacker steals a user’s credentials
  • An administrator abuses account privileges
 
If you’re focused on addressing user threats, UBA can be a powerful tool in your kit. Join David Gorton and Mark Settle from LogRhythm, as they discuss the elements of an effective user threat detection program. You’ll learn:
 
  1. Why detecting user threats is so important—and so difficult
  2. Different approaches to UBA
  3. The value of data from across your enterprise
  4. How to maximize the efficiency of your analysts
More Info

Sponsored by: LogRhythm

Vendor Webcast

Evaluating New Technologies – TIP, Endpoint Solutions and More!

Latest security technologies to hit the marketplace including: endpoint detection and response solutions, malware analysis, insider threat and threat intelligence...

x

Evaluating New Technologies – TIP, Endpoint Solutions and More!

Breaches disclosed in the media foster conversations within organizations on how to protect critical assets and enterprise infrastructure.  Loss of intellectual property, financial data and customer confidence have produced tangible evidence of an evolving threat landscape that, in turn, has elevated the conversation to the board room.  This cyber awakening has many organizations evaluating current security measures including tools and technology – and the options available in the market are endless!    

 As Chief Technologist for Lockheed Martin’s commercial cyber business, Aaron Shafer is responsible for leading technical innovation with a focus on evaluating the latest cyber technology available in the market and advancing the Intelligence Driven Defense® tradecraft.  In this session, Aaron will share his point of view on the latest security technologies to hit the marketplace including: endpoint detection and response solutions, malware analysis, insider threat and threat intelligence platforms. 

More Info

Sponsored by: Lockheed Martin

Vendor Webcast

Flying Blind – How encrypted traffic is changing enterprise security strategies.

Effective strategies that can help you identify and stop security risks caused by encrypted network traffic

x

Flying Blind – How encrypted traffic is changing enterprise security strategies.

All the analysts agree: encrypted network traffic is wreaking havoc on enterprise security.  Most next generation firewalls, intrusion prevention, anti-malware sandboxes and other advanced threat defense solutions are blind to SSL/TLS traffic. The rise of cloud and mobile applications drives network encryption, meaning most organizations cannot see or protect a significant portion of their own network traffic. And according to Gartner, 50 percent of all attacks will happen through encrypted traffic by 2017.
Join this informative webinar to learn:
  • The impact of rapid SSL/TLS adoption by cloud-based applications
  • The implications of decryption – do your Legal and HR teams approve?
  • The challenges and benefits of implementing a holistic encrypted traffic management solution
  • Strategies you can deploy immediately to reduce your risk and prepare for the day when 100% of your network traffic is encrypted
More Info

Sponsored by: Blue Coat

Vendor Webcast

Revealing ransomware secrets with threat intelligence

Threat intelligence can help you defend against the two key attack vectors used by ransomware — malicious emails and malvertising.

x

Revealing ransomware secrets with threat intelligence

Threat intelligence can help you defend against the two key attack vectors used by ransomware — malicious emails and malvertising.

In this webinar, you will learn:

 

  • The four recent vulnerabilities in Adobe Flash Player and Microsoft SilverLight which allow exploit kits such as Angler to deliver ransomware in malvertising campaigns.
  • How threat intelligence enables faster verdicts on key technical indicators associated with malicious emails with ransomware such as Locky.
  • The rising popularity of ransomware over the past four years and top ransomware families as shown by trend analysis.
  • Best practices on applying threat intelligence to help prevent ransomware infections.

 

More Info

Sponsored by: Recorded Future

Vendor Webcast

CASBs and The Treacherous 12 Top Cloud Threats

The CSA concludes that although cloud services deliver business-supporting technology more efficiently than ever before, they also bring significant risk

x

CASBs and The Treacherous 12 Top Cloud Threats

On February 29, 2016 the Cloud Security Alliance (CSA) Top Threats Working Group released a report titled, “The Treacherous 12: Cloud Computing Top Threats in 2016.” In this report, the CSA concludes that although cloud services deliver business-supporting technology more efficiently than ever before, they also bring significant risk. 

 

Regardless of whether the IT department sanctions new cloud services or not, the door is wide open for the Treacherous 12. The CSA report points out that businesses need to take security policies, processes, and best practices into account. 

 

At the same time, Gartner predicts that through 2020, 95 percent of cloud security failures will be the customer’s fault. This does not mean that customers lack security expertise. It does mean, however, that it is no longer sufficient to know how to make decisions about risk mitigation in the cloud. Automation is the key. 

 

Cloud security automation is where Cloud Access Security Brokers (CASBs) come into play. A CASB helps automate visibility, compliance, data security, and threat protection for cloud services. 

 

In this free, live webinar you will learn about:

  • ·        The CSA Working Group's definition of the top cloud computing threats in 2016
  • ·        The role of CASBs in protecting you from the Treacherous 12
More Info

Sponsored by: Palerra

Vendor Webcast

Resiliency and survivability: 2016 Global Threat Intelligence Report

Far too many organizations fall into the “what can I buy with my budget” approach to security as opposed to taking a real hard look at tactical and strategic approaches...

x

Resiliency and survivability: 2016 Global Threat Intelligence Report

Far too many organizations fall into the “what can I buy with my budget” approach to security as opposed to taking a real hard look at tactical and strategic approaches. The annual Global Threat Intelligence Report (GTIR) from NTT Group offers a different approach, hoping to persuade readers into mitigating attacks by providing a roadmap to address threats.

This webinar will review the following from the 2016 GTIR:

 

  • Global Data Analysis Findings from 2015
  • Threat Intelligence – Attribution and Source Confidence
  • Vulnerabilities, Attacks and Exploitations
  • How to Use the 7 Steps of the Kill Chain and Critical Security Controls 

 

More Info

Sponsored by: Solutionary

20/20 Webcast

Rightsizing Your SIEM

This 20/20 webcast looks at some of the issues companies face as they embrace SIEM for the first time.

x

Rightsizing Your SIEM

SIEM might be old hat for large enterprises, but the explosion of threat intelligence technology is fueling the SIEM market -- even for companies that might not have considered it essential in the past. This can be a challenge, especially for companies without the financial and personnel resources. This 20/20 webcast looks at some of the issues companies face as they embrace SIEM for the first time.

More Info

Sponsored by: LogRhythm

Vendor Webcast

A Day Inside a Security Operations Center

In this webinar you’ll get to know what SOC analysts actually do on a daily basis when they aren’t browsing Reddit or cursing the existence of Flash.

x

A Day Inside a Security Operations Center

SOCs, or Security Operations Centers,; You’ve seen them in the news, the movies, even on TV.  But what really happens on the inside? What are they showing on those screens when the cameras aren’t rolling? If you think it’s all about the screens and even more screens you only know half the story. In this webinar you’ll get to know what SOC analysts actually do on a daily basis when they aren’t browsing Reddit or cursing the existence of Flash.

Join this webinar to learn:

 

  • What happens in a SOC on a typical day, when there aren’t “incidents”
  • Roles, responsibilities and skillsets of successful SOC teams
  • Why teamwork is essential to a SOC

 

We'll finish up with a demo of AlienVault USM to show how it can help SOC analysts speed up threat detection and incident response.

More Info

Sponsored by: AlienVault

Vendor Webcast

Securing the Identity Perimeter: Defeat cloud and mobile threats with enlightened cloud security

In this webinar, we discuss the importance of securing the identity perimeter and gathering deep insights into authentication activity

x

Securing the Identity Perimeter: Defeat cloud and mobile threats with enlightened cloud security

Today, cloud and mobile computing has changed the nature of the network perimeter. The threat of a data breach has grown. CISOs are faced with a monumental challenge: Securing information wherever it resides, without interfering with the productivity of the mobile, connected workforce.

In this webinar, we discuss the importance of securing the identity perimeter and gathering deep insights into authentication activity. Accurately tracking the who, what, where, when, and why (along with how and how much) of data access can mean the difference between shutting your entire network down, or just shutting a hacker out.

Key takeaways:

 

  • How adopting cloud solutions improves your security posture
  • Why effective security measures start with a great user experience
  • Why contextual user access data is the key to unlocking smarter security policies

 

More Info

Sponsored by: Okta

Vendor Webcast

Go ahead: make my day!  Secrets to resolving the daily demands on IT Admins and CISO’s

Join Thycotic as we walk through a day in the life of an IT Admin and CISO.

x

Go ahead: make my day! Secrets to resolving the daily demands on IT Admins and CISO’s

IT Administrators and CISO’s have to juggle tons of tasks every day while balancing security policies with productivity goals in order to keep our systems running, updated, and secure---and make sure users have what they need to get their jobs done.  From needing an admin password to fix an employee’s workstation or managing employee turnover, to scanning the network for vulnerabilities, how your privileged credentials are managed by these teams can enable instantaneous action or create bottlenecks that hamper both security and productivity.

Join Thycotic as we walk through a day in the life of an IT Admin and CISO, where we demonstrate how many of the most demanding IT challenges can be solved in minutes with the proper tools to automate privileged account management and security.

More Info

Sponsored by: Thycotic

Vendor Webcast

Getting scammed: A security CEO’s firsthand encounter

Join Tom Kemp, CEO of Centrify, as he shares his firsthand account as a target of this scam and tips to avoid becoming a victim of a BEC scam.

x

Getting scammed: A security CEO’s firsthand encounter

It’s a business’s worst nightmare. Hundreds of thousands, or even millions, of dollars have been transferred out of company accounts and into a scammer’s hands.

Business email compromise (BEC) also known as “CEO fraud,” attempts to trick employees into carrying out large wire transfer payments by impersonating upper management. These types of scams are becoming extremely sophisticated through usage of social engineering or computer intrusion techniques and are an emerging global threat. The FBI reports that over 12,000 victims have lost $2 billion in the last two years.

Join Tom Kemp, CEO of Centrify, as he shares his firsthand account as a target of this scam and tips to avoid becoming a victim of a BEC scam.

More Info

Sponsored by: Centrify

Vendor Webcast

Network + Endpoints: Unifying Visibility, Capabilities and Intelligence for Action

Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence.

x

Network + Endpoints: Unifying Visibility, Capabilities and Intelligence for Action

Advanced and evasive threats are growing exponentially and getting harder to detect. Adversaries are continuing to get more sophisticated and targeted in their attacks even sometimes gaining access to your company’s network by “living off the land” and using little to no malware at all. Unified visibility and interpretation of all of the data across your network and endpoints has never been so valuable to ensure that your team is able to accurately detect and quickly respond threats to your organization. 

Attend this webinar to learn more about the benefits of unifying visibility across your network and endpoint with the right intelligence, people and processes to enable you to reduce the time to detect and effort to respond by answering the following questions:

•        Is there an advanced threat actor present on my network or endpoints?
•        Who is behind the attack?
•        How did they get in? 
•        What did they take?
•        Which systems have been compromised?
•        How do I best repair the damage quickly and get them out?

In addition, we’ll go over analyst insights and predictions about industry trends as well as specific use cases examples from the SecureWorks Counter Threat UnitTM research team that showcase how our clients are leveraging endpoint and network visibility to significantly reduce their risk as well as costs to respond to identified threats.

More Info

Sponsored by: Dell SecureWorks

Vendor Webcast

Not your father’s tokenization solution: Recent Innovations are driving use cases beyond PCI

In this webinar we will discuss how format preserving encryption is the engine behind seismic shifts in performance and scale required when moving and processing...

x

Not your father’s tokenization solution: Recent Innovations are driving use cases beyond PCI

Tokenization is changing how we solve security problems. Long considered a stop-gap security measure for PCI compliance, recent innovations of vaultless tokenization help solve emerging use cases for desensitizing sensitive data at scale. 

 

In this webinar we will discuss how format preserving encryption is the engine behind seismic shifts in performance and scale required when moving and processing large amounts of data in complex IT environments. Join us to learn how these new algorithms are driving a new era in vaultless tokenization, and the new data protection use cases for cloud and big data environments—including supporting PCI DSS, ePHI and GDPR compliance. 
More Info

Sponsored by: Vormetric

Vendor Webcast

State-of-the-Hack: The Top 10 Security Predictions for 2016

As the new year begins, we can expect the size, severity and complexity of cyber threats to continue to increase in 2016.

x

State-of-the-Hack: The Top 10 Security Predictions for 2016

As the new year begins, we can expect the size, severity and complexity of cyber threats to continue to increase in 2016. Attacks will continue to evolve, forcing organizations to expand their focus and be flexible to withstand unexpected, high impact events. Some of the notable predictions include cyber criminals leveraging personally identifiable information (PII), trusted partner networks, hacktivism, ransomware for corporations, and many more.

 

What are the top 10 security predictions for 2016 that you should care about?

 

Join Michael Sutton, CISO, Zscaler, Inc., for a comprehensive overview of what to expect in 2016, including:

 

  • The top 10 security predictions for 2016
  • How these key trends will impact your organization
  • Critical takeaways for a comprehensive security strategy in 2016

 

More Info

Sponsored by: Zscaler

Vendor Webcast

2016 Cyber-Security Trends and Predictions – Behavioural Analytics is the game change

With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared as they head into 2016...

x

2016 Cyber-Security Trends and Predictions – Behavioural Analytics is the game change

As we see more and more media coverage of data breaches and security incidents, the inevitable question becomes, “What are we doing to make sure that doesn't happen to us?” In 2015 there were numerous high-profile breaches include; insurance companies, government organizations, kid’s internet gaming, power utilities and dating sites.  With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared as they head into 2016.

Enter machine learning and behavioral analytics – a technology that is at the top of most everyone’s hot new technologies for 2016, but can this technology detect and help stop cyber-attacks?

Listen to Joseph Blankenship, Senior Security & Risk Analyst at Forrester Research, and Stephan Jou, CTO at Interset, discuss what you need to know for the coming year and predict how behavioral analytics will play in the fight to stop cyber-attacks. Topics will include:
  • Key strategies for taking a proactive stance against advanced attacks
  • How behavioral analytics effectively detects and surfaces targeted attacks
  • Addressing the inside threat – compromised accounts and malicious employees
  • How analytics can be successfully operationalized in an information-protection program
More Info

Sponsored by: Interset

Vendor Webcast

Go Beyond the Firewall with DNS

Today’s security appliances and agents have to wait until malware reaches the perimeter or endpoint before they can detect or prevent it. That’s not the case with...

x

Go Beyond the Firewall with DNS

Nothing stops threats earlier than DNS-layer network security. Today’s security appliances and agents have to wait until malware reaches the perimeter or endpoint before they can detect or prevent it. That’s not the case with OpenDNS.

DNS is known for being a fundamental component in how we connect to the Internet, but it’s also a revolutionary way of providing security visibility and enforcement—whether users are on or off the corporate network. 

Join this webcast and learn:
• How DNS can be used for security beyond the firewall
• How easy it is for enterprises to deploy this additional layer of network security worldwide

More Info

Sponsored by: OpenDNS

20/20 Webcast

Harnessing Big Data Security

This 20/20 webcast takes a dive into what big data really means and how companies can harness the potential of big data analytics.

x

Harnessing Big Data Security

We hear a lot about big data and how it is going to change the way enterprises will manage network security? But what does that really mean? Today’s 20/20 webcast takes a dive into what big data really means and how companies can harness the potential of big data analytics.
More Info

Sponsored by: SAS

Vendor Webcast

Latest Trends in Web Application Security

Join John Graham-Cumming, CTO of CloudFlare, as he shares the latest trends and changes in Web Application Security

x

Latest Trends in Web Application Security

Web Application Firewall security is evolving. Join John Graham-Cumming, CTO of CloudFlare, as he shares the latest trends and changes in Web Application Security. This talk will give details of the big trends in web application security seen in 2015, and how to defend against these threats and talk about the evolving web application security landscape. 

More Info

Sponsored by: CloudFlare

20/20 Webcast

Defending against insider threats - Malicious and benign

This 20/20 webcast will look at the challenge of a variety of insider threats and what you can do about it.

x

Defending against insider threats - Malicious and benign

How safe are you from an insider attack? Despite the numerous press reports of devastating outsider attacks, insider attacks, deliberate or accidental, put a lot of corporate data at risk. Often companies don’t even know how much data they have at risk. This 20/20 webcast will look at the challenge of a variety of insider threats and what you can do about it.

More Info

Sponsored by: LogRhythm

Vendor Webcast

Defending Your Organization Against Ransomware

In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat.

x

Defending Your Organization Against Ransomware

It’s 2:00 p.m. on a Friday afternoon and you get that fateful call. An employee’s laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link he/she thought might help, a message appears indicating that his files have been encrypted and that a ransom fee must be paid to get them back.
 
Not knowing what to do, the user called your SOC. Unfortunately, it wasn’t just a single laptop, but the file shares that it was connected to were encrypted beyond reach. Other callers start coming in. Files in various department shares are “corrupted” and things are grinding to a halt. Another ruined weekend for the SOC and IT—and likely another payday for the bad guys.
 
In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You’ll also be given a framework that you can work through to better protect your organization in the face of this looming menace.
 
Join this webinar to learn:
  • The early indicators of Ransomware
  • Automated defenses that you can put in place to thwart the attack
  • The steps that must be followed (with robotic precision) to make a mole hill out of the possible mountain
More Info

Sponsored by: LogRhythm

Vendor Webcast

 Top 10 Best Practices for Privileged Identity Management

This webcast explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud

x

Top 10 Best Practices for Privileged Identity Management

Data breaches continue to be top of mind for organizations large and small. Three key dynamics are making that challenge much harder — the cloud, the growing sophistication of attackers and dramatic growth in outsourced services. This webcast explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and outsourced administrators. 
Watch this webcast to learn about:
  • Trends impacting data security and increasing identity-related risks
  • How to reduce the risk of security breach by minimizing your attack surface & stopping in-progress attacks
  • Best practices for managing and governing privileged identities in the modern enterprise
More Info

Sponsored by: Centrify

Vendor Webcast

Make Security Great Again: What works in practice? Examples from the real world

In this webinar, A.N. Ananth, co-founder and CEO of industry award-winning EventTracker, shows you how a blend of technology, experts and process simplify your...

x

Make Security Great Again: What works in practice? Examples from the real world

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2016 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins are so busy managing operations and ensuring the company's ongoing security efforts that "detection deficit" sets in and they miss key indicators that their network has been compromised.

 In this webinar, A.N. Ananth, co-founder and CEO of industry award-winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex life. See practical examples from a team that reviews more than a billion logs daily.

More Info

Sponsored by: EventTracker

Vendor Webcast

Forget the SIEM. What you need is a SOC!

This webinar will cover the following topics to help mid-market companies understand what the best approach may be for their unique security and operational requirements...

x

Forget the SIEM. What you need is a SOC!

Hackers love mid-market companies.  
  • They have less robust cybersecurity and limited staff
  • Lack budget and resources for a comprehensive cybersecurity plan
  • Lack access to advanced security tools and best practices

This webinar will cover the following topics to help mid-market companies understand what the best approach may be for their unique security and operational requirements. 
  • Cyber attack detection and prevention data showing that most companies do not even know they have been breached
  • Security monitoring options for mid-market companies ranging from SIEMs to managed security service providers
  • Overview of the differences between traditional managed security services and a SOC-as-a-service

More Info

Sponsored by: Arctic Wolf Networks

Vendor Webcast

Recognizing the Collective Risk, HPE 2016 Cyber Risk Report

This session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected...

x

Recognizing the Collective Risk, HPE 2016 Cyber Risk Report

In a world where all devices now have global reach, risk is no longer contained to just one organization. Breaches now have collateral damage and legislation threatens security practitioners in unintended ways. Just as attackers continue to evolve their techniques, defenders must accelerate their approach to detection, protection, response, and recovery as we move into the concept of the digital enterprise. Jewel Timpe, Senior Manager at HPE Security Research, will highlight our unique perspective on the attack surface. Drawing from the latest findings from the 2016 Cyber Risk Report, this session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected world.
More Info

Sponsored by: HPE

Vendor Webcast

15 Years of Web Security: The Rebellious Teenage Years

Fifteen years ago, Jeremiah Grossman founded WhiteHat Security to help secure the web by enabling organizations to find and fix application vulnerabilities before...

x

15 Years of Web Security: The Rebellious Teenage Years

Fifteen years ago, Jeremiah Grossman founded WhiteHat Security to help secure the web by enabling organizations to find and fix application vulnerabilities before the bad guys could exploit them. With the knowledge and perspective that comes from being an application security leader for a decade and a half, Jeremiah will provide perspectives on:

  • How the types of threat actors have changed and what they now target
  • The intersection of security guarantees and cyber-insurance
  • Easing the burden of vulnerability remediation
  • Measuring the impact of SDLC security controls
  • Addressing the application security skill shortage
More Info

Sponsored by: WhiteHat

Vendor Webcast

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. The challenge posed by this new mobile world is security.

x

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. Your employees are only going to use them more and more in their jobs — and customer service levels, enterprise agility, and overall profitability will improve because of it. The challenge posed by this new mobile world is security. Traditional identity and access controls built around desktops and laptops won’t work. Passwords are too vulnerable, hardware tokens are too cumbersome, smart cards don’t fit and any approach that causes most employees trouble will lead them to circumvent friction.

More Info

Sponsored by: Entrust

Vendor Webcast

Top 5 Ways Next-Generation Data Masking Is Changing How Businesses Prevent Breach

With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data.

x

Top 5 Ways Next-Generation Data Masking Is Changing How Businesses Prevent Breach

With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach.

Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data — without the slowdown caused by traditional methods. Join this webinar to learn:

  • The key reasons why next-generation data masking reduces risk of breach
  • How masking compares to other security approaches such as encryption
  • Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX
More Info

Sponsored by: Delphix

Vendor Webcast

Why wait for malware to reach your perimeter or endpoint when you can block it on the Internet

Learn why companies are shifting security to the cloud. And why it takes only 30 minutes to protect any device, anywhere.

x

Why wait for malware to reach your perimeter or endpoint when you can block it on the Internet

There are two dilemmas with your security stack. First, your threat protections must wait until malware reaches your perimeter or endpoint before they can detect and prevent. Second, your mobile employees must keep their VPN always on for your full security stack to have control and visibility. 

Malware as well as command & control servers and phishing sites reside on the Internet. OpenDNS leverages the Internet’s existing infrastructure—the Domain Name System—to block these threats. Blocking threats on the Internet results in a 2-10X reduction in break-fix busy work and security alert noise.

Your mobile employees get work done using Office 365, Salesforce, Box, and other cloud-hosted business apps, which means they don’t turn the VPN on. OpenDNS’s cloud-delivered network security service is a new layer of breach protection and Internet-wide visibility on and off the corporate network. You can even extend existing threat protections beyond your perimeter using our API-based integrations.

Learn why companies are shifting security to the cloud. And why it takes only 30 minutes to protect any device, anywhere.

More Info

Sponsored by: OpenDNS

Vendor Webcast

Best Practices: Server Configuration

We will discuss how secure server configuration for SSL protects your sites from online threats

x

Best Practices: Server Configuration

The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement.
 

We will discuss how secure server configuration for SSL protects your sites from online threats and: 

  • Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems 
  • Enhanced Security Features: Discuss enhanced security features and the benefits they provide 
  • Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server

 



 

More Info

Sponsored by: Entrust

Vendor Webcast

Endpoint Threats: How to Understand the Full Scope of an Attack

Join this webinar to hear an update from one of RSA's Incident Responders, Jared Myers, discuss how RSA’s endpoint threat detection and blocking solution helps...

x

Endpoint Threats: How to Understand the Full Scope of an Attack

Adversaries and their tactics and procedures continue to become more targeted, dynamic, and sophisticated. Much of the advanced malware and activity is geared toward the endpoint. Why? It's the most human interactive system in a network, making it a prime target. Therefore, organizations need an effective endpoint security strategy that helps security teams expose, analyze and respond to advanced threats faster. 

Join this webinar to hear an update from one of RSA's Incident Responders, Jared Myers, discuss how RSA’s endpoint threat detection and blocking solution helps security teams understand the full scope of an attack.

You will also learn how to address endpoint threats by:
  • Detecting malware leveraging behavioral techniques rather than signatures
  • Linking low confidence events to correlate high confidence events
  • Achieving deep endpoint visibility and real-time alerting
  • Using intelligent, risk-level scoring system to prioritize threats
  • Confirming infections quickly and blocking with precision in real time
  • Gathering relevant investigation data quickly

More Info

Sponsored by: RSA

Vendor Webcast

How to Leverage Threat Intelligence for Every Day Defense

For IT security teams considering integrating threat intelligence, what are the first steps to get started?

x

How to Leverage Threat Intelligence for Every Day Defense

As malware becomes more commercialized, attackers are leveraging the same attack kits again and again. Threat intelligence offers the ability to detect attacks carried out using methods previously reported by others. But,only if it can be effectively integrated into security controls & processes. For IT security teams considering integrating threat intelligence, what are the first steps to get started?

Join AlienVault for this practical session covering:

  • How to evaluate threat intelligence sources
  • How to get started with threat intelligence
  • How to simplify the integration of threat intelligence into your daily operations
  • Practical use cases for mid-market organizations

 

More Info

Sponsored by: AlienVault

Vendor Webcast

Successfully Securing the Cloud: A Primer for Success at Blue Cross and Blue Shield of Minneapolis

In this webinar, Jeremie Kass will share his experience of rolling out a comprehensive security framework to monitor and protect critical Cloud services including...

x

Successfully Securing the Cloud: A Primer for Success at Blue Cross and Blue Shield of Minneapolis

Like many leading enterprises today, Blue Cross and Blue Shield of Minneapolis has embraced the Cloud services as critical enablers for their business. In this webinar, Jeremie Kass (Cloud Security Architect at Blue Cross Blue Shield of Minneapolis) will share his experience of rolling out a comprehensive security framework to monitor and protect critical Cloud services including Microsoft Office365, Salesforce and ServiceNow. 

During this webinar, Jeremie Kass will cover:
  • Key considerations and requirements for securing enterprise Cloud applications.
  • How to lay a foundation to monitor the entire Cloud environment, from IaaS to SaaS.
  • Best practices for monitoring and securing users, data and workloads in the Cloud.

This webinar is sponsored by Palerra, the industry leader in Cloud Security Automation.  Palerra enables organizations to protect business-critical cloud infrastructure, data and applications with LORIC™, the cloud security automation platform.  

More Info

Sponsored by: Palerra

Vendor Webcast

Why You Should Take DNS as a Threat Vector Seriously

Taking a DNS-centric approach to security can help address the variety and sophistication of threats aimed at taking down network infrastructure and stealing data...

x

Why You Should Take DNS as a Threat Vector Seriously

According to the Infoblox DNS Threat Index Q3 Report, the creation of Domain Name System (DNS) infrastructure for exploit kits soared a whopping 75% over a year prior, with Angler being the most widely used exploit kit. Recently, Cisco's Talos security group reported disrupting a major part of the Angler network infrastructure, some of which incorporated infected servers of a targeted service provider. Before Cisco took action, this malicious operation had been generating an estimated $30 million annually for the perpetrators—proof that cybercrime pays. 

It’s also a good example of why networking and security teams need to go beyond traditional perimeter defenses to address what happens once malware gets inside the network. Taking a DNS-centric approach to security can help address the variety and sophistication of threats aimed at taking down network infrastructure and stealing data. 

 Attend this webinar to learn about:

  • The latest Infoblox DNS Threat Index, and what it has revealed about the threats to your critical infrastructure and data
  • The top DNS threats
  • Best practices for improving security through DNS

 



 

More Info

Sponsored by: Infoblox

Vendor Webcast

Combating Insider Threats – Protecting Your Agency from the Inside Out

Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.

x

Combating Insider Threats – Protecting Your Agency from the Inside Out

When Edward Snowden leaked classified information to the mainstream media, it brought the dangers posed by insider threats to the forefront of public consciousness, and not without reason.  Today’s agencies are drowning in fears surrounding sophisticated cyber-attacks but perhaps the most concerning type of attack out there – the insider threat.   According to Forrester, abuse by malicious insiders makes up 25% of data breaches.  Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.  

•         Become aware of the different types of insider threats, including their motives and methods of attack
•         Understand why conventional security tools like firewalls, antivirus and IDS/IPS are powerless in the face of the insider threat
•         Gain clarity on the various technologies, policies and best practices that should be put in place to help detect and thwart insider threats
•         Discover how network logs, particularly NetFlow, can be used to cost-effectively monitor for suspicious insider behaviors that could indicate an attack
•         Know about emerging attack methods such as muleware that could further escalate insider threats in the coming years



 

More Info

Sponsored by: Lancope

MarketFocus Webcast

Cyber Threat Intelligence Demystified

We were able to take the mystery out of how organizations are using threat intelligence and how ThreatStream can help solve the pain points enterprises face today...

x

Cyber Threat Intelligence Demystified

Cyber threat intelligence is one of the hottest, most talked about topics in security today.  Security teams are trying to get a handle on whether their intelligence programs are on target with the latest advances.  What does it all mean? What are the best practices that enterprises are leveraging?  Am I getting value out of my current security investment?

In an extensive survey, we were able to take the mystery out of how organizations are using threat intelligence and how ThreatStream can help solve the pain points enterprises face today.  

More Info

Sponsored by: ThreatStream

Vendor Webcast

5 top security issues enterprises should prepare for in 2016

Join for a special online discussion with Chief Technology Officer, Amrit Williams and CMO Mitch Bishop as they discuss what are expected to be some of the most...

x

5 top security issues enterprises should prepare for in 2016

The cybersecurity landscape is changing fast and security teams need to keep up. As we all prepare for 2016, there are critical forces at work that should influence our planning on both technology and business fronts.
Join for a special online discussion with Chief Technology Officer, Amrit Williams and CMO Mitch Bishop as they discuss what are expected to be some of the most pressing security issues in 2016, and advice on how to plan ahead.

 Tune into this informative webinar to learn:

  • What security issues will be at the forefront in the coming year?
  • How the vendor landscape is changing and the impact to your security strategy.
  • Best practices to help your organization future-proof your security investments.

 

More Info

Sponsored by: CloudPassage

Vendor Webcast

Don’t Let Docker Containers Set Sail Unprotected

Join Vormetric’s Chief Security Officer, Sol Cates, to explore Docker’s architecture, and how organizations are shoring up the gaps that this amazing new model...

x

Don’t Let Docker Containers Set Sail Unprotected

The world of containers and micro services is very exciting as it is disrupting the way we all develop and deploy software at an amazing pace.  However, many like you are trying to get to the bottom of what security in Docker means, and how you will operationalize security with containers.  Security professionals must be ready to protect their companies that are rushing to optimize their development and resource utilization with containers. 

 

Join Vormetric’s Chief Security Officer, Sol Cates, to explore Docker’s architecture, and how organizations are shoring up the gaps that this amazing new model is presenting.

More Info

Sponsored by: Vormetric

Vendor Webcast

Smart Authentication Can Stop Data Breaches

This webinar shows you what Okta Adaptive MFA brings to your security plan.

x

Smart Authentication Can Stop Data Breaches

Every IT professional¹s nightmare. One breach can damage your brand and costs a fortune. It¹s your job to stop it. But you¹ve been fighting an army of hackers with underpowered tools. Until now. Okta Adaptive Multi-factor Authentication (MFA) is smarter. Use it to set up robust authentication policies. It works with second factors like Okta Verify with Push, SMS verification, and YubiKey. And it integrates easily with your apps and VPNs. This webinar shows you what Okta Adaptive MFA brings to your security plan.

In this webinar you will learn how Okta Adaptive Multi-factor Authentication
  • Provides a rich set of contextual access policies to protect access to your applications
  • Offers a comprehensive set of second factors to secure access for all your users
  • Integrates with all your apps and VPNs to eliminate coverage gaps
More Info

Sponsored by: Okta

20/20 Webcast

Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks.

x

Rapid Threat Containment: Detect & Respond Quickly to High-Impact Threats

“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research.

This shift in investment highlights the fact that organizations require a new security model designed to rapidly detect and neutralize cyber-threats that have penetrated the enterprise perimeter or originated from within.

In this webcast, LogRhythm and Cisco will share some of the latest techniques used by attackers to penetrate networks. The webinar will also cover how you can use next-generation security solutions to detect, respond to and neutralize these threats to reduce the risk of a material breach or cyber incident.

You will learn how machine data generated across your network—including contextual identity and access telemetry from the Cisco Identity Services Engine (ISE)—can be leveraged by LogRhythm’s security intelligence and analytics platform to provide organizations with highly corroborated risk-based alerts and enable immediate automated response to contain threats by interfacing with Cisco pxGrid to take protective action.  

Join this webinar to learn:

 

  • Common ways hackers get into your network
  • How threat actors attempt to avoid detection
  • Tips on finding the hacker trail: how to look in the right place
  • How to expand and accelerate your organization’s mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR)

 

More Info

Sponsored by: LogRhythm

Vendor Webcast

The Good, the Bad and the Secure of Mobile Identities

This webinar will help you understand how mobile incorporated into your existing enterprise environment.

x

The Good, the Bad and the Secure of Mobile Identities

Take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.

 

This webinar will help you understand how mobile incorporated into your existing enterprise environment. Entrust Datacard’s Jason Soroko will take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.

 

Key Benefits:

·         What Makes Mobile Different — Define the major differences between mobile architecture and that of a desktop.

·         Applications for an Enterprise Environment — Probe into mobile applications and their uses in a modern mobile business environment.

·         Staying Ahead of Threats — Uncover the threats to mobile that may affect your business environment.

·         Best Practices – Find out how to securely develop mobile applications.

·         Look to the Future — Get an outlook on the capabilities of mobile technology in the pipeline.

More Info

Sponsored by: Entrust

Vendor Webcast

Defend Your Network Now: The Top 5 Things You Need to Know

In this webinar, A.N. Ananth, CEO of industry award winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex...

x

Defend Your Network Now: The Top 5 Things You Need to Know

Bad guys are lurking in your network neighborhood, kicking doors and testing entry points, all the time. Threatscape 2015 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins  are so busy managing operations and ensuring the company's ongoing security efforts that "detection deficit" sets in and they miss key indicators that their network has been compromised. 

 In this webinar, A.N. Ananth, CEO of industry award winning EventTracker, shows you how a blend of technology, experts and process  simplify your already complex life.  Learn about:

  • Rogue process detection
  • Evidence of persistence
  • Suspicious traffic
  • Unknown processes
  • Unusual OS artifacts

Protect your network now.

More Info

Sponsored by: EventTracker

20/20 Webcast

A Vision of Vulnerabilities

Today’s 20/20 webcast will address how companies can increase the visibility of potential vulnerabilities through better use of tools, intelligence and analytics...

x

A Vision of Vulnerabilities

According to the Verizon Data Breach Report, “97% of breaches are avoidable through standard controls.” If the key to eliminating APTs and other high-cost, high-profile breaches is implementing common-sense, standardized controls, what should CISOs do to bring their risk management to the next level? What trends can we expect to see in 2016 that will address the vulnerabilities that have led to major breaches over the past few years? Today’s 20/20 webcast will address how companies can increase the visibility of potential vulnerabilities through better use of tools, intelligence and analytics.

More Info

Sponsored by: Skybox

Vendor Webcast

Why manufacturers are using the cloud to deliver infosec

Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

x

Why manufacturers are using the cloud to deliver infosec

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

 

Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team.

 

They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

 

Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:

 

  •  why they use a layered approach to security
  • how his security analyst, Kevin Merolla, quickly responds to incidents or false positives 
More Info

Sponsored by: OpenDNS

Vendor Webcast

Turning Tables On Cybercriminals

Attendees of this webcast will get recommendations on building the kind of security architecture that shifts the power balance toward defenders.

x

Turning Tables On Cybercriminals

The attacker defender asymmetry is well known. While it’s impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint. Doing so requires a focus on the inside of networks and all the data that passes back and forth there. With the security architecture to continuously monitor and analyze network data, organizations can uncover the patterns of that telegraph attacker lateral movement and malicious communication before data is stolen or lost. Attendees of this webcast will get recommendations on building the kind of security architecture that shifts the power balance toward defenders.

 

They will get practical advice for:

  • Security architecture re-design
  • Leverage of network-wide visibility for attack detection
  • Sustaining and scaling multi-tiered security environments
More Info

Sponsored by: Gigamon

20/20 Webcast

SIEMs Like Old Times

This 20/20 looks at various approaches on how to ensure your SIEM is working at top efficiency, regardless of the vendor that supplies the application.

x

SIEMs Like Old Times

Just about every major enterprise employs a SIEM. However, if your SIEM isn’t tuned correctly, you might not be able to get the most out of this extremely complex and expensive piece of software. This 20/20 looks at various approaches on how to ensure your SIEM is working at top efficiency, regardless of the vendor that supplies the application.
More Info

Sponsored by: LogRhythm

Vendor Webcast

Six Steps to SIEM Success

Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

x

Six Steps to SIEM Success

The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can:

    • Identify exposures
    • Investigate incidents
    • Manage compliance
    • Measure your information security program

 

However, going from installation to insight with a SIEM can be a challenge. Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

More Info

Sponsored by: AlienVault USM

Vendor Webcast

How to Build a World-Class Threat Intelligence Capability From Scratch

This webinar will reveal critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

x

How to Build a World-Class Threat Intelligence Capability From Scratch

Threat intelligence is a broad subject and the natural tendency is to produce intelligence on any topic or event regardless of its applicability to the company. True success in threat intelligence depends on focusing intelligence efforts to very specific business objectives, which removes the large surface area and leaves only a challenging sliver of ultra-high value to pursue. This webinar will reveal critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.

More Info

Sponsored by: Recorded Future

Vendor Webcast

Keeping Compromises from Becoming Breaches

In this webinar we will explore how unified security intelligence is empowering organizations to accelerate their mean-time-to-detect (MTTD) and mean-time-to-respond...

x

Keeping Compromises from Becoming Breaches

The stakes have never been higher as businesses attempt to protect their assets from a barrage of threats that continue to grow in frequency and sophistication.

 

However, even the most advanced cyber security teams acknowledge that user accounts, systems and networks WILL be compromised, regardless of the prevention measure in place.  It’s amidst this reality that organizations are exploring new, more effective ways to detect and respond when the inevitable occurs. 

 

In this webinar we will explore how unified security intelligence is empowering organizations to accelerate their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to compromises and avoid material breaches.  

 

Chris Kissel, industry analyst from Frost & Sullivan will start with a quick update on the state of SIEM and how next-gen SIEM has evolved to deliver true security intelligence through a number of new capabilities including behavioral analytics, network and endpoint monitoring and analytics, as well as advanced search capabilities.

 

Attend this webinar if you:

  • Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
  • Struggle to find the needle in the haystack of security events
  • Believe your current incident response process lacks adequate automation and efficiency
  • You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots
More Info

Sponsored by: LogRhythm

Vendor Webcast

Visual hacking high-risk areas in vertical industries

While visual hacking is a threat to any industry, it can be especially dangerous in healthcare and financial industries, where some of the most sensitive personal...

x

Visual hacking high-risk areas in vertical industries

While visual hacking is a threat to any industry, it can be especially dangerous in healthcare and financial industries, where some of the most sensitive personal and financial information is routinely accessed and displayed. But even with passwords, firewalls and Secure IDs, a simple glance may compromise your organization’s privacy – no matter the industry. Learn about the unique visual privacy approaches to consider in different high-risk industries including healthcare, finance and education, help educate your organization on the issue of visual privacy and discover potential actions to implement in preventing sensitive data from being compromised due to visual hacking.
More Info

Sponsored by: 3M

Vendor Webcast

Cover your “What happens off-network, stays off-network” security gap

We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these...

x

Cover your “What happens off-network, stays off-network” security gap

We know that “What happens in Vegas, stays in Vegas” is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network? If you’re thinking VPN? Think again. Why would employees VPN when they’re working in Office 365 or Google Docs?

 

We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these days, now that employees work anywhere, anytime.

 

Learn how...

 

●      Unlike VPN’ing, we do not add latency, hog memory, or burden the end-user.

●      Unlike endpoint protections, we block threats before the first victim is hit.

More Info

Sponsored by: OpenDNS

Vendor Webcast

Behavioral Analytics: How one company used it to change data protection forever

Discuss the specific challenges facing organizations today, and why behavioral analytics is the first step in helping achieve information protection.

x

Behavioral Analytics: How one company used it to change data protection forever

The rate at which new data breaches are announced in the headlines should alarm every company with sensitive data to protect. From OPM to Ashley Madison to Machine Zone video games, data breaches are going undetected by existing security technologies and processes.

It is time to look for new approaches in the fight to protect sensitive data.  In this case the new ally is data science and the new approach is behavioral analytics.  Learn how combining math with big data will compress millions of events (most normal, some bad, some very bad) down to an accurate and prioritized short list of true threats that your security team can actually deal with in a timely manner.  See  how one company put this new and innovative technology into practice to protect their critical R&D project plans, test data, process methodologies and proprietary formulas from both insider and targeted outside attack.

Join Paul Calatayud, CISO at Surescripts, and Stephan Jou, CTO at Interset for a discussion on how behavioral analytics effectively detects and surfaces targeted attacks and how it can be successfully operationalized in an information protection program.

Sign up for our upcoming webinar where we will discuss how behavioral analytics:

  • Accurately detects and surfaces advanced attacks while they are happening
  • Reduces noise and false positives through advanced  analytics enabling your security team to focus on true threats
  • Uses machine learning and advanced statistical analysis to find employees, contractors, and compromised accounts that are attempting to steal sensitive data
  • Integrates with and greatly improves the performance of your existing security tools, and

Discuss the specific challenges facing organizations today, and why behavioral analytics is the first step in helping achieve information protection.

More Info

Sponsored by: Interset

Vendor Webcast

Don’t Let Sensitive Data Hitch a Ride out of Your Network

Attend this webinar and learn how you can use it as an optimal detection and enforcement point to strengthen your network security.

x

Don’t Let Sensitive Data Hitch a Ride out of Your Network

Data is at the core of every business, and data theft is one of the most potent risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences of customer defection.

Hackers often use DNS as a pathway for exfiltrating data to avoid detection by standard security controls that primarily focus on Web and email. They can accomplish this using off-the-shelf DNS tunneling toolkits—or custom techniques that are far more sophisticated and harder to detect. Mitigating these threats effectively requires applying the right technique based on the exfiltration method used.

Join this webinar to learn about:

 

  • Various ways data can be stolen over DNS  
  • Signature-based techniques for mitigating DNS tunneling
  • The use of query analytics to stop data exfiltration over DNS queries

 

Traditional security controls don’t effectively secure DNS, and closing this critical gap is key to protecting your data. DNS is ubiquitous, and it is close to your endpoints. Attend this webinar and learn how you can use it as an optimal detection and enforcement point to strengthen your network security.

More Info

Sponsored by: Infoblox

Vendor Webcast

Breach Prevention: Hunting for Signs of Compromise

How effective is your security strategy at hunting and detecting signs of compromise?

x

Breach Prevention: Hunting for Signs of Compromise

Data Breaches in 2015 are on pace to break all records. 2014 saw a record 783 breaches with over 85 million records compromised. So far in 2015, there have been 551 confirmed breaches, with over 150 million compromised records, with the “detection-deficit” between the good and bad guys is growing.  In 60% of cases, attackers are able to compromise within minutes, while organizations take days or months to detect these breaches. Traditional methods of detecting breaches only enable enterprises to react once an alert indicates that an attacker is in the network. A proactive strategy is needed to eradicate an attacker early in their mission to prevent exfiltration of data.

How effective is your security strategy at hunting and detecting signs of compromise?

A new approach is needed – one that turns defense into offense. Join Dan Maier, Sr. Director Product Management, Zscaler, for a thought provoking webcast addressing;

 

  • Best practices hunting and detecting the signs of compromise
  • Why the vast majority of targeted attacks aren’t ever uncovered by the victim enterprise
  • Tools and processes needed to identify and mitigate such threats before any real damage is done
  • Insights into the mindset of today’s cyber criminals, who continuously manage to adapt their defenses as quickly as organizations deploy them

 

More Info

Sponsored by: Zscaler

Vendor Webcast

Strategies for effectively Protecting Intellectual Property

Join our webinar "Strategies for Effectively Protecting Intellectual Property" on October 1st at 2PM ET. In this session, experts from Dell, 451 Research and TITUS...

x

Strategies for effectively Protecting Intellectual Property

When it comes to protecting your organization’s intellectual property (IP), a single click by an end-user can either lead to a disastrous result (a data breach) or a great result (data protection). 

Organizations need to educate and utilize employees to assist in the protection of IP and other sensitive information. By providing your users with tools for identifying and classifying data, your organization can effectively protect high-value, high-risk assets. 

Join our webinar "Strategies for Effectively Protecting Intellectual Property" on October 1st at 2PM ET. In this session, experts from Dell451 Research and TITUS will discuss use cases and share best practices. Key takeaways:

  • Understand the challenges of protecting IP
  • Learn how organizations can educate and use their own employees to assist with IP protection
  • Hear how automating security policies can help to prevent data breaches
  • Case study and practical advice from Dell
More Info

Sponsored by: Titus

Vendor Webcast

Lessons learned from building and running MHN, the world's largest crowdsourced honeynet

Honeypots are really useful for collecting security data for research, especially around botnets, scanning hosts, password brute forcers, and other misbehaving...

x

Lessons learned from building and running MHN, the world's largest crowdsourced honeynet

Honeypots are really useful for collecting security data for research, especially around botnets, scanning hosts, password brute forcers, and other misbehaving systems. They are also the cheapest way collect this data at scale. Deploying many types of honeypots across geo-diverse locations of the Internet improves the aggregate data quality and provides a holistic view. This provides insight into both global trends of attacks and network activity as well as the behaviors of individual malicious systems. For these reasons, we started the Modern Honey Network, which is both an open source (GPLv3) project and a community of hundreds of MHN servers that manage and aggregate data from thousands of heterogeneous honeypots (Dionaea, Kippo, Amun, Conpot, Wordpot, Shockpot, and Glastopf) and network sensors (Snort, Suricata, p0f) deployed by different individuals and organizations as a distributed sensor network. The project has turned into the largest crowdsourced honeynet in the world consisting of thousands of diverse sensors deployed across 45 countries and 6 continents worldwide.  Sensors are operated by all sorts of people from hobbyists, to academic researchers, to Fortune 1000 companies. In this talk we will discuss our experience in starting this project, analyzing the data, and building a crowdsourced global sensor network for tracking security threats and gathering interesting data for research. We've found that lots of people like honeypots, especially if you give them a cool realtime visualization of their data and make it easy to setup; lots of organizations will share their data with you if it is part of a community; and lots of companies will deploy honeypots as additional network sensors, especially if you make it easy to deploy/manage/integrate with their existing security tools.

More Info

Sponsored by: ThreatStream

Vendor Webcast

Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics

This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization...

x

Defeating cyber attackers: Best practices for leveraging adversary & threat intelligence with security analytics

This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization one of them?

With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.

In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm’s Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.

Key themes to be covered include:

·         Emerging attack motives and strategies

·         Maximizing prevention, detection, and incident response

·         Corroborating external threat intelligence with behavioral changes on the network

·         Prioritizing threats to prevent attack propagation  

More Info

Sponsored by: LogRhythm

Vendor Webcast

Securing your website to protect brand reputation

This webinar will explore protecting your business and your reputation from website security hiccups.

x

Securing your website to protect brand reputation

Customers are doing more and more business online. Nearly 80% of the U.S. population shops online and half bank online. However, websites are constantly under attack. 71% of consumers feel it is up to the online stores to ensure the protection of their information, making website security a top priority for many businesses.  In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information. This webinar will explore protecting your business and your reputation from website security hiccups.

 

Learn how website security contributes your overall brand reputation, how to properly secure your online applications/ servers and discuss:

 

  • SSL/TLS best practices and certificate suggestions for secure domains
  • Secure server communication and encryptions
  • Using SSL/TLS to mitigate against malware, attacks and vulnerabilities
  • The importance of vulnerability identification and management
  • Adoption of preventive technology solutions to block attacks
More Info

Sponsored by: Entrust

Vendor Webcast

Creating an encryption strategy for modern risks mitigation

David Shackleford, IANS faculty member, will share his research results, recommendations and answer questions on the insight he gained in writing his recent report...

x

Creating an encryption strategy for modern risks mitigation

Every company has a data security risk mitigation strategy.  However, the continuous news cycle on data breaches is proof that it is time to augment that strategy.  David Shackleford, IANS faculty member, will share his research results, recommendations and answer questions on the insight he gained in writing his recent report, “Encryption as an Enterprise Strategy.” You’ll leave this webinar understanding how an encrypt everything security architecture could significantly reduce risk of sensitive data theft and exposure of your company’s data.   
More Info

Sponsored by: Vormetric

Vendor Webcast

The five capabilities that define your organization’s secure file transfer effectiveness

The webinar will reveal the results of a recent survey of IT professionals globally of how organizations rate their own existing capability against the new Capabilities...

x

The five capabilities that define your organization’s secure file transfer effectiveness

This webinar will examine the business risks and regulatory compliance requirements associated with file transfers.  We’ll show how to effectively manage the broad range of compliance requirements by focusing on standard IT controls and how that approach can be used to select appropriate security technology, such as Managed File Transfer service to ensure your organization is protected and in compliance.   

The webinar introduces a new Capability Maturity Model to enable organizations to position their own capability against the critical success factors and best practices presented in the webinar, including:

 

  • Policy
  • Risk Mitigation
  • Automation
  • Agility

 

The webinar will reveal the results of a recent survey of IT professionals globally of how organizations rate their own existing capability against the new Capabilities Maturity Model.

More Info

Sponsored by: Ipswitch

20/20 Webcast

The new mindset for building secure services in the cloud

This 20/20 webcast looks at some of the best practices for creating a secure, cloud-based infrastructure for your enterprise workloads.

x

The new mindset for building secure services in the cloud

Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when a CISO is trying to secure an infrastructure over which he or she has no physical access. But despite the challenges, it is possible to build a secure network environment that includes cloud-based applications and storage. This 20/20 webcast looks at some of the best practices for creating a secure, cloud-based infrastructure for your enterprise workloads. 
More Info

Sponsored by: SumoLogic

Vendor Webcast

Best way to operationalize threat intelligence is enforcing it at the DNS layer

Based on our research, it takes 100-200 days for most organizations just to detect a new threat—before any action can be taken. How many more days go by before...

x

Best way to operationalize threat intelligence is enforcing it at the DNS layer

Based on our research, it takes 100-200 days for most organizations just to detect a new threat—before any action can be taken. How many more days go by before new threat intelligence is enforced? 

Where are you gathering this intelligence from? Where and how are you enforcing it? Feed providers, network appliances, endpoint agents, or everywhere? 

In this webinar, you'll learn how...

  • Both time-to-detection and attack dwell time is reduced by orders of magnitude through security automation.
  • Integrating threat analytics in your security stack creates intelligence specific to your organization.
  • A turn-key integration between AMP Threat Grid and OpenDNS automatically blocks newly discovered malicious domains at the DNS layer, both on and off the corporate network.
  • You'll prioritize investigating malicious domains and files involved with severe threats compromising critical systems.

OpenDNS is now part of Cisco, and together, our cloud-delivered, API-based services enforce security everywhere. The Threat Grid integration is the first of many upcoming innovations that enables you to stay ahead of attacks. 

More Info

Sponsored by: OpenDNS

Vendor Webcast

Understanding the FFIEC Cybersecurity Assessment tool

Join us for an informative webinar as Jennifer Allen, InfoSec Compliance Specialist, digs into what you need to know about the CAT.

x

Understanding the FFIEC Cybersecurity Assessment tool

The Federal Financial Institutions Examination Council (FFIEC) recently released the Cybersecurity Assessment Tool (CAT) to help financial institutions identify their risks and determine their cybersecurity preparedness. The CAT will no doubt be relied on by examiners from the OCC, FDIC and other agencies as they assess banking institutions’ cybersecurity readiness.

Join us for an informative webinar as Jennifer Allen, InfoSec Compliance Specialist, digs into what you need to know about the CAT. Jennifer will explore the key components of the tool using the inherent risk profile and the 5 cyber security assessment maturity domains, and highlight the key takeaways from each. She’ll then detail a case study based on real-world data which compares a national bank’s preparedness profile based on different technology approaches.

More Info

Sponsored by: Bit9 + Carbon Black

Vendor Webcast

Peeling back the layers - does security still have a chewy center?

This presentation will share some positive trends we're seeing in the security marketplace that are finally addressing challenges as old as the security discipline...

x

Peeling back the layers - does security still have a chewy center?

Security practitioners might not like to admit it, but they've been playing games with adversaries for years. Whether it's whack-a-mole, cat-and-mouse or chutes and ladders, the security game has always been reactive in nature or one that has us alternating between steps forward and steps back. A market full of point products with steep learning curves have left many security organizations feel like they can never hire enough staff. There is good news, however! This presentation will share some positive trends we're seeing in the security marketplace that are finally addressing challenges as old as the security discipline itself.

More Info

Sponsored by: ThreatTrack

MarketFocus Webcast

IT security managers speak out

What do IT security managers want from the IT security products that they own? What are they actually getting?

x

IT security managers speak out

What do IT security managers want from the IT security products that they own?  What are they actually getting?  Listen to the results of market research commissioned by ForeScout and distributed on the company's behalf to the readers of SC Magazine, that shows a huge gap between what IT security managers want and what they are actually getting from their IT security products. The survey explored the ability of IT security products to work together by sharing information and automating incident response.

More Info

Sponsored by: ForeScout

Vendor Webcast

Proven approaches for securing enterprise applications; An inside look at deploying Office 365 and SFDC

Put experience and innovation to work for you – register now to get ahead of cloud challenges and simplify deployment of Office 365, Salesforce and other cloud...

x

Proven approaches for securing enterprise applications; An inside look at deploying Office 365 and SFDC

As cloud apps and mobile devices move your data and systems access outside the firewall, how secure are you from cyber threats? While reliance on cloud apps like Office 365 and Salesforce is growing, breaches from compromised identities are in the news regularly. Do users have to deal with yet another username and password for each app and more restrictive policies? How will IT support provisioning, de-provisioning and even more forgotten password calls?

 

Get an inside perspective on proven approaches for improving user productivity and satisfaction, while simplifying and automating identity management. Learn how cloud-based identity management with full featured enterprise mobility management enables enterprises to:

  • Drive cloud app adoption, eliminate password sprawl, and close security holes
  • Centralize, standardize and automate access management – across apps and devices
  • Simplify with a Microsoft-validated alternative to AD FS, DirSync, and Azure Active Directory

 

Put experience and innovation to work for you – register now to get ahead of cloud challenges and simplify deployment of Office 365, Salesforce and other cloud applications.

More Info

Sponsored by: Centrify

Vendor Webcast

Stamping out fraud with governance

Learn how governance technologies are becoming a primary weapon in the war against fraud, while providing the foundation for simplified data management.

x

Stamping out fraud with governance

The overwhelming volume and complexity of data is creating widespread opportunity for fraudsters. Organizations in the healthcare industry, financial services and even government departments have fallen victim as they've been unable to get a clear understanding of patients, customers or citizens. Learn how governance technologies are becoming a primary weapon in the war against fraud, while providing the foundation for simplified data management.

 
More Info

Sponsored by: IBM

Vendor Webcast

Cyber security is now a boardroom agenda

How prepared is your organization to handle a security breach and discuss this in the boardroom?

x

Cyber security is now a boardroom agenda

Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. KPMG states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to Gartner, any lapses will cost executives their job. The stakes are very high and getting it wrong has significant consequences, including:

 

  • Brand damage due to customer loss
  • Loss of competitive advantage due to corporate espionage
  • Cost of responding to breach

 

How prepared is your organization to handle a security breach and discuss this in the boardroom?

Join Kevin Peterson, CISSP, Director, Security & Network Transformation, Zscaler, for a compelling webcast that will address cyber-security priorities being discussed at the boardroom level, including:

 

  • Managing security risk in today’s digital world
  • Securely leveraging key technologies such as cloud, mobile and analytics
  • Addressing security gaps across the ecosystem of customers and suppliers
  • Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities

 

Don’t miss this event. Register today!

More Info

Sponsored by: Zscaler

20/20 Webcast

Keeping critical data secure in the cloud

Getting visibility into cloud infrastructure to keep critical data secure is the topic of this 20/20.

x

Keeping critical data secure in the cloud

Companies of all sizes are realizing the benefits of moving to private, public and hybrid clouds, but traditional security tools simply aren’t working well in these environments. The fact is traditional solutions don’t scale well or deploy automatically on systems that are spun up. Many organizations focus on securing their corporate networks, and hope cloud providers have security covered. Or they end up picking and choosing which servers receive a full set of security tools. This leaves the majority of their cloud servers vulnerable to attack with no way to see it coming. Getting visibility into cloud infrastructure to keep critical data secure is the topic of this 20/20. 

More Info

Sponsored by: CloudPassage

Vendor Webcast

Detect ransomware before its too late with AlienVault USM

Join us for a live demo that will show how AlienVault USM detects threats quickly, saving you valuable clean up time by limiting the damage from the attack.

x

Detect ransomware before its too late with AlienVault USM

By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

You'll learn:

 

  • How AlienVault USM detects communications with the command and control server
  • How the behavior is correlated with other signs of trouble to alert you of the threat
  • Immediate steps you need to take to stop the threat and limit the damage

 

More Info

Sponsored by: AlienVault USM

Vendor Webcast

How to simplify PCI DSS compliance with AlienVault USM

Demonstrating compliance with PCI DSS is far from a trivial exercise. Are you sure you can document your organization's compliance with the new 3.0 standards?

x

How to simplify PCI DSS compliance with AlienVault USM

Demonstrating compliance with PCI DSS is far from a trivial exercise. Are you sure you can document your organization's compliance with the new 3.0 standards? Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
We'll review:
  • Common PCI DSS compliance challenges
  • Questions to ask as you plan and prepare
  • Core capabilities needed to demonstrate compliance
  • How to simplify compliance with a unified approach to security

 

More Info

Sponsored by: AlienVault USM

Vendor Webcast

Cloud-managed IT security — Simple. Complete. Powerful.

Join us for a live webcast featuring Sophos Cloud SVP and GM Bill Lucchini as he demonstrates how cloud-managed security offers simpler, better protection for your...

x

Cloud-managed IT security — Simple. Complete. Powerful.

IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies. 

Join us for a live webcast featuring Sophos Cloud SVP and GM Bill Lucchini as he demonstrates how cloud-managed security offers simpler, better protection for your organization.  

  • Simple, user-centric management
  • Complete endpoint, mobile and web security
  • Powerful next-generation protection
More Info

Sponsored by: Sophos

Vendor Webcast

What’s missing in your network security stack? DNS

DNS is used by every device on your network. But are you leveraging it in your security stack?

x

What’s missing in your network security stack? DNS

DNS is used by every device on your network. But are you leveraging it in your security stack? DNS can see every connection destined to anywhere on the internet, whether on or off the corporate network. In fact, Verizon’s highly regarded Data Breach Investigation Report stated that “[DNS is] among the single best sources of data within your organization.”

OpenDNS provides a network security service that can deliver you the quickest “WIN” to improve your security stack. From small businesses without dedicated security professionals to multinational enterprises with complex environments, it takes mere minutes to gain a new layer of breach protection and Internet-wide visibility on and off your network.

OpenDNS’s CEO, David Ulevitch, will discuss:

  • Where you have compromised systems and data exfiltration blind spots today.
  • Why signature-based antivirus, firewalls, and proxy gateways miss most command & control (C2) callbacks.
  • How we prevent (vs. detect) threats with a painless deployment and transparent experience.
More Info

Sponsored by: OpenDNS

Vendor Webcast

Intrusion vs. breach:  How security analytics & automated response can improve your chances of avoiding a breach

60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds...

x

Intrusion vs. breach: How security analytics & automated response can improve your chances of avoiding a breach

60% of breached organizations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organizations it took hundreds of days to detect the intruders.  Fortunately, an intrusion does not equal a breach.  In fact, there are usually several steps that typically follow an initial compromise before the bad guys get away with the goods or disrupt a critical service.   Detecting early warning signs such as an initial system compromise, command and control activity or suspicious lateral movement of intruders can provide the necessary lead time to respond and neutralize a threat before the intrusion leads to a material breach.     

In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization’s risk of experiencing a material breach or cyber incident. 

Attend this webinar if you:
  • Are seeking to reduce your organizations meantime-to-detect (MTTR) and meantime-to-respond (MTTR) to cyber threats
  • Struggle to find the needle in the haystack of security events
  • Believe your current incident response process lacks adequate automation and efficiency
  • You have a first-gen SIEM platform deployed and are frustrated by its complexity or feel that you still have significant blind spots

More Info

Sponsored by: LogRhythm

Vendor Webcast

Preparing for the holiday breach season

The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales. ...

x

Preparing for the holiday breach season

The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales.

Unfortunately, cyber criminals are also gearing up for the holiday rush, as they know that the IT team is often too busy keeping Point of Sale systems and servers running smoothly to be on the lookout for signs of attack. They also know that many organizations enter a "code freeze" period, when no new security patches are introduced lest they disrupt transaction speed. What’s more, according to our recent survey, nearly 20% of businesses actually turn off antivirus during rush periods to avoid slowdowns.

Intensifying the pressure this holiday season are a number of distractions:

  • The October deadline to migrate to EMV-enabled technology or face increased liability
  • PCI DSS 11.3 (penetration testing methodology) is now a requirement instead of a “best practice”
  • More POS systems than ever before now rely on end-of-life systems, including Windows XP and Windows Server 2003

During the high-volume, highly-critical holiday period retailers can't afford to let down their guard. Attend our webinar, featuring Chris Strand, PCIP, and an industry expert from Coalfire, to learn about the potential cyber threats facing your organization this holiday season and what you can do about it.

More Info

Sponsored by: Bit9 + Carbon Black

Vendor Webcast

21st century defense-in-depth involves more than 2 AVs

In this webinar, we’ll explore the hows, whys and wherefores of layered defense, and suggest how you can implement a practical defense-in-depth strategy for your...

x

21st century defense-in-depth involves more than 2 AVs

If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That’s the way we used to do it back in the ‘80s and ‘90s, but does this approach still work? Is this what is meant by “defense-in-depth”? This question was recently posted in a popular IT community forum, and elicited a rash of responses.

In this webinar, we’ll explore the hows, whys and wherefores of layered defense, and suggest how you can implement a practical defense-in-depth strategy for your endpoints. Come with your questions, and we’ll arm you with ways to improve endpoint defenses and performance, and overall business resilience.  

More Info

Sponsored by: Lumension

Vendor Webcast

Before the kill chain: what attackers are doing and how you can spot them

What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?

x

Before the kill chain: what attackers are doing and how you can spot them

Attackers can’t hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers.

What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?

Join our webcast on July 30th with Guest Speaker, Forrester Research, Inc. Principal Analyst, Rick Holland and Dan Hubbard, OpenDNS Chief Technology Officer, to hear more about:

  • What attackers do before the kill chain
  • How you can spot their activity
  • How you can leverage this information to stay ahead of attacks

More Info

Sponsored by: OpenDNS

Vendor Webcast

Reinventing security in a feudal world

Feudal Security, a concept popularized by cyber security guru Bruce Schneier, requires organizations to entrust the security of their data and infrastructure to...

x

Reinventing security in a feudal world

Feudal Security, a concept popularized by cyber security guru Bruce Schneier, requires organizations to entrust the security of their data and infrastructure to cloud providers. However, security is a shared responsibility and organizations are expected to safeguard their assets in a manner similar to on-premise but with much less control. Martin Giles, the former San Francisco-based technology writer of The Economist Newspaper, and Tim O’Brien, Director of Threat Research at Palerra, will sit down to discuss:

 

  • The state of the Union on cyber security
  • The risks of entrusting security to the feudal lords (cloud providers)
  • The challenges of a status quo approach to security
  • Innovative approaches to regain control

 



 

More Info

Sponsored by: Palerra

20/20 Webcast

Plan Ahead for the Top 2015 Trends in Email

Attend the webinar and position yourself to capitalize on today’s email trends and find out how to boost your marketing ROI this year.

x

Plan Ahead for the Top 2015 Trends in Email

Wow! 2014 was a busy year in the email marketing space. Increased reliance on data-driven marketing, the emergence of Google Inbox, and the implementation of the Canadian Anti-Spam Legislation (CASL) was enough to challenge even the most seasoned email professionals.

So what practices will continue to be impactful in 2015? And what should marketers prepare for in the New Year?

Attend the webinar and position yourself to capitalize on today’s email trends and find out how to boost your marketing ROI this year. Join Ryan Phelan, named one of the top 30 digital strategists by the Online Marketing Institute, as he shares what impacted email last year, as well as his predictions for 2015.

Walk away with insight, including:

  • Digital marketing trends to be on the lookout for in 2015
  • How to make conversations with your customers even more personal
  • The true value of the “always addressable” customer
  • How to prep for the next big thing in email marketing
More Info

Sponsored by: Message Systems