The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Discover a hidden gem for your digital content delivery. If you’re using or considering a Content Delivery Network (CDN), you’ve probably heard of origin storage. But you may not know much about it.
Done right, CDN origin storage doesn’t take a lot of your team’s time, dramatically improves user experience, and can even save you money.
Done wrong, it can waste valuable resources, time, effort and money, only to deliver bad user experience -- and you might not even know it.
Whether you’re delivering online video, files, websites, gaming or e-commerce, this webinar can provide valuable perspective and opportunities for improvement.
We will explore:
• What CDN origin storage is, and why you should care about it
• 7 qualities that are revolutionizing CDN origin storage
• Just released capabilities in Limelight Origin Storage that make it a game changer for your team, your audience and your bottom line
Then we’ll open up the floor to an “Ask the Expert” session with Solutions Engineer Kerrion Burton Evans.
Register now for this informative session and submit questions for Kerrion!
Many look at their Service Desk mainly as a means to means to manage incoming requests. In this webinar, we will discuss how to configure your service desk to provide you with an ongoing means to increase your service efficiency.
We will review:
•What types of information you need to look at within your systems
•Setting up a regular cadence for review
•What to do with the data you find
Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.
As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.
However, cyber defences are beginning to catch up.
This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.
With the recent changes to Keeping Children Safe in Education, it is clear that ICT are playing a key role in safeguarding children within the school setting.
At SonicWall we are very familiar with the challenges now faced by the education sector and are working with schools and colleges across the UK to ensure they remain compliant.
Luton Sixth Form College is one such school. They needed a system that was powerful enough to keep its student’s work safe at all times. It also needed to be able to carry out more granular content filtering and reporting so that its Safeguarding Team could closely monitor user activity and easily detect any concerning patterns of behavior at a detailed level.
Attend our live webcast to learn more about how SonicWall helped Luton Sixth Form College to:
•Achieve a far deeper level of security, reducing complaints of malware traffic from 10 a month to about 3 a year
•Increase visibility and monitoring of all web user activity
•Make reporting more accessible and no longer confined to IT staff
•Remain compliant with Keeping Children Safe in Education (KCSiE) statutory guidance
The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
to political power, control and mass surveillance.
Audience learning:
A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc
Audience takeaways:
The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.
------------------
Indy possesses over 14 years’ experience, having worked in both
operational and consulting positions at FTSE100 and Fortune 500
organisations including AXA, Deutsche Bank, PwC, Accenture,
Mercedes-Benz, Jaguar Land Rover and many other world leading
organisations.
His experience includes leadership positions in information/
cybersecurity transformation, risk assurance, crisis management
(pre and post incident), assurance, audit, governance, risk and
compliance programmes.
BrightTALK caught up with Titania's Ian Whiting for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- How to run a comprehensive pentest to protect your business
- How to get the most from your cyber security budget
- AI & Machine learning and the influence it'll have on the security industry
- The explosion of connected devices on the IoT and where networks are especially vulnerable
This presentation goes into details of BlackEnergy3+ and SocialBots attacks and how we use forensics and CyberNSight to reduce Risks based on Data Breach exposure and analysis. This presentation discusses the differences in Threat and Risk Intelligence and how Hakdefnet has changed security by creating a unique Actionable Risk Intelligence platform / solution.
---------------
Hakdefnet is a cyber-security Start-up company that gives customers the opportunity to protect themselves more comprehensively, cheaper and easier than ever before. We analyze security gaps, find stolen data - including the Darknet, and can individually protect Critical Infrastructure, VIPs and Enterprises globally. Based on CyberNSight, VCISO and our RIP (Risk Intelligence Platform) Subscriptions, our customers not only know if but also how they were attacked, and what happened with their data. This (we believe) is the only way to really minimize the damage caused by cyber attacks and avoid them in the future.
Michael Goedeker is an author and researcher at the front end of cyber warfare, espionage and crime, and he researches for academia, press and security professionals globally.
Michael A. Goedeker is a German American researcher, born in 1971 in New York City. He has worked in the IT Security field for over 16 years, training and consulting for fortune 500 companies. He has worked on worldwide security projects for Accenture, Avande, Microsoft, IBM, Symantec and Sophos.
Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.
Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:
• What are your options if you’re a victim of ransomware
• Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
• How Symantec technologies work together for maximum protection
Join the smartest minds working with PCI DSS compliance and find the answer to your toughest and most vexing PCI questions. With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.
Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.
Moderator:
- Ben Rothke, Senior Security Consultant - Nettitude Ltd.
Panelists:
- David Mundhenk, CISSP, PCIP, QSA (P2PE), PA-QSA (P2PE), Senior Security Consultant, Herjavec Group
- Arthur Cooper "Coop", Senior Security Consultant - NuArx Inc.
- Jeff Hall, the "PCI Guru", Principal Security Consultant, Optiv Security
Why the same old things don’t work, and how to build in a strategic advantage that will provide early warning to security teams, while also deceiving and delaying attackers who have already penetrated existing defenses.
About the Presenter:
Regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry, Chris Roberts is the chief security architect for Acalvio Technologies, helping to drive technology innovation and product leadership. Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients. In addition, Roberts works to shape the next generation of deception platforms and helps companies with their maturity modeling and overall security solutions.
Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.
Speakers:
Jonathan Jew, J&M Consultants
Glenn Sexton, President and Principal Consultant, NIS
1 BICSI CEC
About TR-42 Telecommunications Cabling Systems Committee:
The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.
The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.
Part of the Industrial Internet Consortium's Webinar Series on Securing the Industrial IoT, this session will feature Protecting Your Industrial Control System from Digital Threats.
Industrial Control Systems are everywhere. They’re running power grids, regulating data center energy use in large buildings, or managing production processes in at your favorite snack food manufacturer. What makes Industrial Control Systems so important, yet so difficult to secure? Learn about types of security challenges that operators of industrial control systems face and the tools available to help alleviate risk.
Data security has a tendency to be intimidating for organizations, users and implementers. Organizations see the value but the challenges of applying a data security solution. Wouldn’t it be great if there were solutions that took the guesswork out of data protection and key management?
In today’s data driven environment, there are strategies and technologies to protect data that do not have to be the high-risk propositions feared by organizations, users and implementers - IT professionals. By thinking of data security and key management as data t protection enablers instead of obstacles, you can easily protect data across the infrastructure and beyond. Data security and key management need to interact with the data and the users in a seamless way that doesn’t disrupt their processes or destroy the characteristics of the data.
During this webcast we will discuss some of the findings from the CSA Security Guidance v4 report and how data-centric security can help mitigate and manage many of the risks. Think of security as an enabler instead of an obstacle for cloud adoption.
Fintech may still be in its early stages, but it's seen tremendous growth and is expected to see global investments exceed $150 billion in 2017. With the proliferation of mobile apps, cybersecurity is extremely important. Trust is a key difference maker for customers, so fintech companies need to ensure that their sensitive client information stays secure.
Join this panel roundtable of cyber security experts as they discuss:
- The top cyber threats financial institutions are facing
- Ransomware, data loss & BCDR
- Mobile banking apps and security vulnerabilities
- Recommendations on improving security and establishing consumer trust
Speakers:
- JP Bourget, CSO of Syncurity
- Ted Eull, VP Privacy and Risk at NowSecure
- RJ Gazarek, Product Manager at Thycotic
- Jason Kent, CTO of AsTech Consulting
Implementation of the EU General Data Protection Regulation Act (GDPR) is fast approaching. The GDPR’s tough privacy rules and financial penalties are big enough challenges for organizations like yours. But rising email-borne threats like ransomware make compliance even more difficult.
This webinar explores:
- Steps to minimize GDPR risk even in the face of spiraling email-borne attacks
- How the GDPR’s Data Breach Notification requirement changes everything
- Why it’s vital to secure a budget for GDPR compliance and third-party assessment
About the presenters:
Achmad Chadran, Mimecast Archiving Specialist:
Achmad Chadran is an archiving product marketing manager at Mimecast. Prior to joining Mimecast, Achmad held marketing and product management positions at the Intronis MSP Solutions arm of Barracuda Networks, Dell’s Large Enterprise Business Unit, and Siemens. He has a bachelor’s degree from the University of Virginia and a master’s degree from Ohio University.
Enza Iannopollo, Forrester Research Analyst
Enza is an analyst on the Security & Risk team and a Certified Information Privacy Professional (CIPP/E). Her research focuses on the impact of internet regulations and data privacy issues on digital business models, as well as the technologies that underpin them. Her research coverage includes data protection, privacy in the context of cloud computing, analytics, and the internet of things. Enza also helps Security & Risk Professionals build and execute data and privacy protection strategies in line with the requirements of the business technology (BT) agenda.
On Friday the news broke: a massive ransomware attack which started in the UK NHS immediately spread to global proportions. By Sunday, the attack had impacted over 200,000 organizations in 150 countries. Listen to Phil Richards, CSO of Ivanti and a panel of security experts discuss how to recover from the WanaCrypt Ransomware attack and safeguard your environment against the evolving threats that are likely to come.
Presenters:
• Phil Richards, CISO
• Chris Goettl, Manager of Product Management, Security
About Phil Richards:
Phil Richards is the Chief Information Security Officer (CISO) for Ivanti. He has held other senior security positions including the head of operational security for Varian Medical Systems, Chief Security Officer for Fundtech Corporation and Business Security Director for Fidelity Investments.
Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.
Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.
• Learn new trends in machine data analytics from 451 Research
• Pinpoint cybersecurity attacks and unusual behavior
• Visualize an attack graph
• Detect intruder paths and potential vulnerabilities
• Leverage a single source of truth
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Carl Leonard, Principal Security Analyst at Forcepoint, examines the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.
During the session, Carl will discuss the latest on WannaCry, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:
- Which ransomware should you defend against?
- Should you pay the ransom?
- What can you do to protect your data and network? (research-based)
- How is your organization using the Cloud in a risky way, putting your data more at risk?
About the Presenter:
Carl Leonard is a Principal Security Analyst within Forcepoint’s Security Labs team. He is responsible for enhancing threat protection and threat monitoring technologies at Forcepoint, in collaboration with the company’s global Security Labs teams. Focusing on protecting companies against the latest cyberattacks that can lead to data theft, Carl advises customers on the state of the threat landscape and how to enhance their security posture. Carl is an active international spokesperson and an expert speaker, regularly contributing to externally-facing blogs and research papers. Carl has over 10 years of experience in the security research arena.
Come join a discussion with two industry leaders in the converging worlds of Dark Web Scanning and Artificial Intelligence. Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
As cyber threats have developed in recent years, no industry has been more targeted by threat actors than healthcare, with attacks increasing by 63% in 2016. With the tremendous uptick in attacks coupled with the growing complexity of networks, healthcare organizations are turning toward new technologies to defend themselves from this new generation of cyber-threats.
Join Brian Thomas, CIO of Swope Health Services, and Parker Ashley, Account Manager for Darktrace, to learn how the threat landscape is evolving in healthcare, and how the Enterprise Immune System helps healthcare organizations across the world defend themselves from cyber attacks.
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.
This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.
About the Presenter:
John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response
Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.
Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?
Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:
•How EDR is used to improve security
•Why integrations are important
•Why Symantec Endpoint Protection and ATP beat the competition
•Future plans EDR
Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.
Register Today
Watch On-Demand:
• Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
• Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
• Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
• Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
Agencies are complex and need to focus on day-to-day activities in order to work towards their missions and goals. Yet, the data stored at agencies may provide solutions on how to effectively minimize risks, lower costs and provide insights.
How long does it take you to retrieve relevant data in your agency? Do you know where to look to find and compile it? Or do you struggle with a data management strategy and how communicate this effectively to your teams?
You've got questions, we have answers. Hundreds of federal managers were recently surveyed on their top takeaways for their agencies' data management solutions.
In early 2017 Siemplify embarked on research with 150 security leaders across industry groups to better understand these challenges and priorities to improve Security Operations.
Did you know…
•Organizations are forced to knowingly ignore alerts - despite increased spending on security tools and personnel, nearly half of respondents have no choice but to ignore alerts that they believe SHOULD BE investigated due to the sheer volume of incoming threats. An additional 20% of organizations admit to ignoring over 50% of critical alerts.
•More than 80% of organizations said they persistently lack adequate staff to meet the demands of their security operations.
•Security operations must be centralized, orchestrated, and automated - A staggering 96% of respondents highlighted the need to take action in orchestrating their incident response processes and over 90% said they needed to explore varying degrees of automation to improve their response.
Security Orchestration is looked to as the answer
Security orchestration bridges the gap between alert overload and analyst capacity. Executed effectively, an orchestration platform creates the integrated fabric across the security footprint bringing simplicity, context, and efficiency throughout security operations and incident response.
In this webinar we will explore these findings, how orchestration is helping organizations respond to these challenges, and what are the critical capabilities (building blocks) of an effective orchestration platform.
With WannaCry, Ransomware has once again burst onto the scene, reminding us of the need to stay vigilant. Ransomware attacks have continued to grow with security experts estimating that criminals will collect around $1 billion this year.
Join us for this webinar as we discuss WannaCry, its variants and other Ransomware and how you can ensure your people, data and brand are protected.
- The latest attacks, including WannaCry and its variants
- The challenges in combating Ransomware
- Tips and suggestions to mitigate WannaCry and other Ransomware attacks
Ransomware campaigns continue to evolve. Organizations can defend their business with intelligence that uncovers the tactics attackers are leveraging to inflict harm. At the same time, your employees are a valuable resource in defending against ransomware and provide security teams with useful information to take proactive measures. Security leaders and their teams are challenged with doing more with less. Integrated solutions and automation to fight ransomware enables analysts to be more efficient and accurate in the operation.
Join PhishMe and Recorded Future as they uncover the latest ransomware campaigns and how employees and analysts play an important role in defending the enterprise.
Agenda:
• What are researchers and other companies seeing as part of the threat landscape?
• What can teams do to protect and respond and what resources do you need to prepare?
• What are the benefits of integrating tools together and how can this help you?
By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.
You’ll learn about:
- Why exploit kits are increasing in popularity
- The process for launching exploit kit campaigns
- How to defend your organization from exploits
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention.