CISO Express | A Security Professional’s Home Page

Tufin Demos

Forrester Analyst Insight: Top Cloud Security Challenges & Tips

- 10 days ago 14 Jan 21, 3:20pm -
IPAM Security Policy App

- 54 days ago 1 Dec 20, 1:57pm -
Are firewalls going away?

- 67 days ago 18 Nov 20, 1:09pm -
AWS Network Firewall Tufin Integration

- 68 days ago 18 Nov 20, 12:23am -
Defenders Think in Lists. Attackers Think in Graphs.

- 1 Sep 20, 5:20pm -
Vulnerability Mitigation App

- 21 Aug 20, 2:58pm -

Palo alto Networks

Fireeye

  • newProving Security Effectiveness to Your CISO, CFO and Board
    Investments in cyber security have rapidly increased in recent years, yet high-profile breaches continue to make headlines, and the economic and financial losses stemming from these breaches continue to grow. Combined with economic pressures and exte…
    - 18 days ago 11 Feb 21, 9:00pm -
  • newSupply Chain Attack – Campanha de Intrusão Global
    A FireEye descobriu uma ampla campanha que estamos rastreando como UNC2452. Os atores por trás dessa campanha tiveram acesso a inúmeras organizações públicas e privadas em todo o mundo através de atualizações trojanizadas do software Orion da…
    - 4 days ago 28 Jan 21, 6:00pm -
  • newThe Security Operations Center is Essential – But Is it Effective?
    From COVID to the cloud and from ransomware to work-from-home, everything changed, fast. The foundation of it all – the Security Operations Center, or SOC, played a critical role in supporting how enterprises tackled the pivot in how we work, commu…
    - 2 days ago 26 Jan 21, 6:00pm -

Informatica

  • Unlock the Full Power of Cloud Data Integration – Deep Dive and Demo
    Data integration is a core capability for delivering digital transformation and competitive analytics. Next-gen data integration enables you to combine data from various sources with ease of use and scalability. You may be already using many of th…
    - 12 Dec 19, 6:00pm -
  • Optimize Salesforce by Removing Data Barriers Between IT and Campus
    As the Director of Information Systems at Fresno Pacific University, Jeff Jones was charged with optimizing the student information system. Moving from the legacy student information system to Salesforce necessitated the integration of many differen…
    - 5 Dec 19, 6:00pm -
  • AI-Powered Streaming Analytics for Real-Time Customer Experience
    What’s the best way for businesses to differentiate themselves today? By delivering a unique, real-time customer experience across all touch points—one that is based on a solid, connected business strategy driven by data and analytics insights.…
    - 4 Dec 19, 6:00pm -

CA Technologies

  • newExplore Clarity Teams
    Working as a team is critical to any business success. Clarity lets you fund, staff, and manage work for your development and business teams, using staffing views for ad-hoc changes and capacity planning, scoreboards to manage team level to-do's, and…
    - 60 days ago 25 Mar 21, 5:00pm -
  • newWhat’s New in Clarity 15.9.1?
    Wow, another year has passed and 2021 is full of lots of enhancements. We changed our release cadence to February, May, August and November. Join us and learn what’s new!
    - 32 days ago 25 Feb 21, 6:00pm -
  • newLeveraging Queries and Filters in Rally
    Rally users have a universal need to get information from the platform and customize the data to provide the information to make informed decision. Join Sagi Gabay and Aaron Rusty Lloyd for an informative session on how you can leverage queries and f…
    - 18 days ago 11 Feb 21, 5:00pm -
  • newClarity Quick Tips & Tricks for Big Impact
    Text messaging was the unplanned killer app for the phone because it was simple and removed objective friction. Come learn what surprisingly simple Clarity capabilities and efforts are tipping user adoption and data accuracy from sporadic and forced…
    - 4 days ago 28 Jan 21, 6:00pm -
  • Linda's Corner: Resource Management
    This time Linda shows us how to get the right people on the right job. Juggling labor and non-labor resources can be challenging, so Linda takes extra care to explain how to simplify the process in Clarity.
    - 10 days ago 15 Jan 21, 5:00am -
  • Clarity Customers Talk: Managing Resource Capacity
    One of the toughest aspects of investment planning is scheduling the right people, for the right job, at the right time. Team versus individuals, hard or soft bookings, roles and locations – resource capacity planning is a juggling act that require…
    - 40 days ago 15 Dec 20, 4:00pm -
  • What’s New in Clarity 15.9?
    To stay ahead of the competition, it’s wise to not only to stay on top of the competitors in your market, but to stay on top of new capabilities in your software solutions. Clarity releases every quarter and includes numerous enhancements for Tran…
    - 45 days ago 10 Dec 20, 5:00pm -
  • Linda's Corner: Financial Management
    In this episode of Linda’s Corner, Linda Chase shows us how Broadcom’s Clarity platform supports the creation of powerful budgets and cost plans, while allowing for different views of the data for different users. She also shows the ease with…
    - 46 days ago 9 Dec 20, 4:15pm -
  • Digital Product Management
    One of the reasons projects have difficulties in retaining stakeholder engagement is that those stakeholders don’t think in terms of projects. The project is simply the vehicle the business uses to implement change. What stakeholders care about is…
    - 52 days ago 3 Dec 20, 5:00pm -
  • Driving Business Outcomes with Digital Product Management
    The way companies organize to bring products and solutions to market is being rewritten. Join this 30 minute webinar to learn about how organizations are shifting to a customer-centric view to deliver business outcomes.
    - 68 days ago 17 Nov 20, 5:00pm -
  • Kanban at Scale
    In a complex organization delivering value quickly and efficiently can be a challenge - especially at scale. The Kanban method provides a means of managing the flow of value while focusing on continuous improvement. It focuses on productivity and eff…
    - 72 days ago 13 Nov 20, 5:00pm -
  • Scheduling Options within Clarity
    This session will present a high-level comparison of various scheduling options within Clarity and firsthand experiences with Open Workbench (OWB), Microsoft Project Integration ( MSP) & built-in tools. Key areas will be discussed such as: Tool Comp…
    - 73 days ago 12 Nov 20, 5:00pm -
  • Linda's Corner: Working with Roadmaps
    Join Broadcom’s Linda Chase as she demonstrates the power and flexibility of Clarity roadmaps in this first episode of Linda’s Corner. Linda, and industry-expert Andy Jordan, explore how strategic roadmaps simplify and improve the planning proces…
    - 73 days ago 12 Nov 20, 2:15pm -
  • Are your OKRs just OK?
    OKRs (Objectives and Key Results) are just OK if used for topics that are known: goal setting, success metrics, status updates. OKRs become great when used for managing the unknown: strategy tied to execution, alignment around value, and feedback on…
    - 75 days ago 10 Nov 20, 4:00pm -
  • How we use SAFe® at Rally
    In our previous session, we discussed how we support SAFe ® within the Rally platform. Now we’d like to take things one step further and show you how we actually use the Scaled Agile Framework® at Rally to manage our Agile Release Train! Join Na…
    - 81 days ago 4 Nov 20, 5:00pm -
  • Clarity New UX Administration Key Features
    The Clarity administration capabilities can create magic. Well, almost. Learn how to use blueprints to build quickly and display only what's needed to get the job done. Organize investment hierarchies and name investment types any way you want. If yo…
    - 94 days ago 22 Oct 20, 4:00pm -
  • Scaling Agile in your Organization with Rally and the Scaled Agile Framework
    The Scaled Agile Framework (SAFe®) is the leading framework for scaling Agile to the Enterprise. Join Aaron Rusty Lloyd and Noel Rodriguez for an in depth discussion on the synergies between the Rally Software platform and the Scaled Agile Framework…
    - 1 Oct 20, 4:00pm -
  • Clarity Modern UX – Adoption Best Practices
    Adopting the Modern UX? Learn best practices from the experts at Broadcom – the Clarity Solution Engineering Team. Provide tools that work the way people do and you’ll get adoption and acceptance. Accuracy and transparency are outcomes of this a…
    - 24 Sep 20, 4:00pm -
  • Accelerating and Scaling Team Agility
    What does it look like to do Agile well at the team level? And what does it look like to do it for 100-1000 teams across your enterprise? In this webinar we will take a deep dive into the five dimensions of healthy Agile teams and explore how leaders…
    - 16 Sep 20, 4:00pm -
  • Cumulative Flow Diagrams: The Good, The Bad and The Ugly
    Broadcom's Jason Hill and Dan Green will have an in depth discussion of Cumulative Flow Diagrams (CFD).In the discussion we will: Discover the wealth of information found in a CFD Understand a CFD’s best uses Know which charts to u…
    - 3 Sep 20, 4:00pm -
  • Trends in Value-Based DevOps
    Looking at the ways companies try to maximize business value from their software development, Forrester surveys glean new insights into emerging trends, including greater attention to transparency and efficiency. Join Lisamarie Manso of Broadcom and…
    - 2 Sep 20, 5:00pm -
  • Ideation - Easy to Manage with Clarity!
    Generating ideas is an easy task, but prioritizing can take time and to get it right, you need Clarity. Don’t just prioritize your ideas, add supporting financials, tasks and involve other stakeholders. Manage your ideas as they move through the…
    - 27 Aug 20, 4:00pm -
  • Clarity Customers Talk: Adopting the New Clarity UX
    Discover how Clarity customers have planned and successfully migrated to the new user interface. Panel includes key industry organizations like Boeing, Michigan State University, Consorsbank and Government of British Columbia. Open discussion around…
    - 27 Aug 20, 3:00pm -
  • Agile Mythbusters - Busting common myths around agile
    There are plenty of prescriptive statements around Agile – but are they all true? Our panelists will talk about some of the myths around Agile – and break through some of the misconceptions.“Agile will solve all your problems.” “Agile is…
    - 11 Aug 20, 11:40pm -
  • Clarity Customers Talk: A New Clarity Experience
    Join power users from Michigan State University, Sky, AbbVie & TDS Telecom for a lively discussion on the benefits of the new Clarity experience, including strategic roadmapping, continuous planning and must-have prioritization. Hear how customers de…
    - 11 Aug 20, 3:00pm -
  • Keeping a Healthy Program Backlog in Rally (Part 2)
    In part two of the “Keeping a Healthy Program Backlog” series, our presenters will pick up where they left off, sharing what happens beginning in the fifth week after a Big Room Planning event. Now that you’ve created your Program backlog of Fe…
    - 6 Aug 20, 4:00pm -
  • 6 Rally Features You May Not Be Using But Should
    Join Rally's Rusty Lloyd as he discusses his 6 favorite features in Rally that can help reduce complexity in your Agile organization.
    - 30 Jul 20, 4:00pm -
  • Utilizando Clarity para Gestão de OKRs (Using Clarity for OKRs Management)
    Como os OKRs tem ajudado as empresas a prover dircionamento e alinhamento estratégico e tático e como o Clarity PPM pode ajudar a concretizar essa visão.Language: Portuguese
    - 28 Jul 20, 1:00pm -
  • What's New in Clarity 15.8.1
    New capabilities are on the horizon to keep you ahead of the competition via roadmap enhancements with a new set of import tools, configurable grids with benefit plans, field level security on custom investment types, branding that provides the abili…
    - 23 Jul 20, 4:00pm -
  • Rally Quality Management Integrations
    In the 5th and final webinar of the Rally Quality Management series, our presenters will share a number of existing integrations that Rally has with popular external testing tools. Additionally, you will learn how to create your own integrations usin…
    - 16 Jul 20, 4:00pm -
  • Dores e Remédios para Transformação Ágil (Agile Solutions for Enterprises)
    Dores e Remédios para Transformação Ágil em Grandes Empresas. Conheça quais são os desafios enfrentados pelas grandes corporações tradicionais na sua jornada para a agilidade e as diferentes abordagens para combate-los.Language: Portuguese
    - 14 Jul 20, 1:00pm -
  • Clarity: Product Financials Made Easy
    It's now easier than ever to manage product financials in Clarity. Use a familiar grid to fund ideas, work and custom investments. Set up and track both costs and benefits to gauge the ROI of your work. Enjoy a brand new financial management experien…
    - 9 Jul 20, 8:00pm -
  • ValueOps: A Solution Overview
    ValueOps from Broadcom combines our industry-leading Clarity and Rally products to form a powerful digital business and agile management solution. Breaking down the historic silos between business and IT, ValueOps gives companies superior transparenc…
    - 30 Jun 20, 5:05pm -
  • Clarity Strategic Roadmapping
    The fastest way to innovate, Clarity comes with strategic roadmaps that eliminate organizational fatigue, cutting annual planning from weeks to hours. With drag-and-drop speed you craft new ideas with your team. Then add budgets, resources and tasks…
    - 25 Jun 20, 4:00pm -
  • Keeping a Healthy Program Backlog in Rally (Part 1)
    Program Increment or Release big room planning is a critically important and highly visible event. In order to ensure its success, it all begins with creating and maintaining a healthy backlog of features. In part one of this 2-part series, our prese…
    - 24 Jun 20, 4:00pm -
  • Rally Quality Management Metrics
    In part 4 of the Rally Quality Management series, you’ll learn more about the types of metrics Rally has to help you in your Quality Management efforts. We’ll cover some additional applications you can use to track Test Cases, Test Sets and Defec…
    - 18 Jun 20, 5:00pm -
  • Five Things You Need to Know About ValueOps
    ValueOps is a powerful integration of Clarity and Rally software creating an industry-leading Digital Business & Agile Management Solution. Find out how ValueOps can have a substantial impact across your organization by removing the historic silos be…
    - 17 Jun 20, 5:00pm -
  • First Things First: Working with Must-Have Prioritization in Clarity
    With businesses fighting back, you have fewer resources to get the work done – not to mention all the new digital initiatives spawned from the pandemic. Ruthless prioritization is easier said than done when you’re not sure about objectives and ou…
    - 11 Jun 20, 5:00pm -
  • Is Remote Breaking Agile
    Our team of panelists will discuss how the COVID pandemic that scattered teams to home offices worldwide has impacted the effectiveness of agile. Co-location is a foundational agile characteristic – but how important is it when it’s impossible?…
    - 2 Jun 20, 9:00pm -
  • Clarity: Make Ideas Come Alive
    Add budgets and resources to your ideas in the ideation process. It all carries over as ideas turn into real work.
    - 1 Jun 20, 1:45pm -
  • Clarity: Roadmap Strategies to Business Objectives
    Understand how your products perform by aligning strategies to business objectives in Clarity.
    - 1 Jun 20, 1:15pm -
  • Clarity: Organize Your Investments in Hierarchies
    See how Clarity helps you organize investments the way your business actually runs.
    - 1 Jun 20, 12:45pm -
  • Industry Leading Financial Capabilities with Clarity
    Clarity’s financial and planning pages have been redesigned to mimic Microsoft Excel spreadsheets in both look and feel with powerful new capabilities within project cost plans & transactions. Track not only planned and actual costs but units and…
    - 28 May 20, 4:00pm -
  • How Rally is Bringing Industry-Leading Data Privacy to Customers
    Join Rally and IronCore Labs for a 30-minute webinar discussing how the two companies partnered to bring industry-leading data privacy to Rally’s customers. While there is an inherent risk in storing sensitive data in the cloud, Rally is the first…
    - 21 May 20, 4:00pm -
  • Boas práticas para planejamento remoto (Best practices for remote planning)
    Saiba mais sobre boas práticas para planejamento remoto em uso por nossos times de desenvolvimento, e ver como a gestão ágil da Broadcom pode tornar as cerimônias remotas mais colaborativas e eficientes.This is the Portuguese version from the W…
    - 20 May 20, 12:30pm -
  • Prácticas de agilidad para planeación remota- Best practices for remote planning
    Conozca más sobre buenas prácticas para planificación remota utilizadas por nuestros equipos de desarrollo.This is the Spanish version from the Webinar: Agile practices for remote workers.
    - 19 May 20, 5:00pm -
  • From Chaos to Clarity: How to re-plan your investments
    When you get back from the Covid-19 disruption, the first thing you should do is plan for the future. And this time you need a real plan – a plan that’s going to recover your business. That’s going to build resilience, re-engage and re-empower…
    - 14 May 20, 5:00pm -
  • Rally Quality Management: Defects and Defect Suites
    In part 3 of the Rally Quality Management series, you’ll learn how to create, edit, manage and delete Defects and Defect Suites. We’ll show you how to create a hierarchical display of defect suites and their related defects in your selected proje…
    - 14 May 20, 4:00pm -
  • Clarity: A Product Overview
    With Clarity from Broadcom, you can manage your enterprise investments in multi-dimensional hierarchies and name them whatever you want, like products, projects or platforms. Then allocate people, work and money on strategic roadmaps with drag-and-dr…
    - 13 May 20, 11:30pm -
  • Clarity: Digital Product Management in Four Steps
    Organize, map, prioritize and empower. Follow the four steps of Digital Product Management in Clarity.
    - 13 May 20, 11:15pm -
  • Virtual Agility: 24/7 practices for new ways of working
    Agile methods have never been friendly to the idea of distributed teams. Collaboration and face-to-face communication are core principles that date back to the Agile Manifesto, and many agile consultants have included ‘distributed teams’ in their…
    - 13 May 20, 7:30pm -
  • Virtual Agility: Leveraging Rally for New Ways of Working
    A 100% virtual world can seem chaotic at first. But being suddenly remote doesn’t mean that agile methods need to go to the wayside. With the right tools in place, you can enable your organization to adapt to rapid change and empower your employees…
    - 7 May 20, 8:00pm -
  • Prepare for Day One in the New Digital Business
    Because COVID-19 disrupted every aspect of our lives, we need to reassess the fundamentals of our business. There is a need to press the restart button, to create a Day One of the post COVID-19 world. But like a corporate merger, the first day back b…
    - 30 Apr 20, 5:00pm -

Tenable

  • Ready to Test Your Hacking Skills? Join Tenable’s First CTF Competition!

    Ready to Test Your Hacking Skills? Join Tenable’s First CTF Competition!

    Tenable launches new Capture the Flag event for the security community, running from February 18–22.Capture the Flag events are a tried and true way of testing your cybersecurity skills, practicing new ones and seeing how you measure up against ot…
    - 4 days ago 20 Jan 21, 7:24pm -
  • DNSpooq: Seven Vulnerabilities Identified in dnsmasq

    DNSpooq: Seven Vulnerabilities Identified in dnsmasq

    Researchers identify seven vulnerabilities in popular Domain Name System software.BackgroundOn January 19, researchers from the JSOF Research lab disclosed seven vulnerabilities in dnsmasq, a widely used open-source application for network infrastr…
    - 4 days ago 20 Jan 21, 5:50pm -
  • TL;DR: The Tenable Research 2020 Threat Landscape Retrospective

    TL;DR: The Tenable Research 2020 Threat Landscape Retrospective

    Tenable’s Security Response Team takes a look back at the major vulnerability and cybersecurity news of 2020 to develop insight and guidance for defenders.Søren Kierkegaard, the Danish philosopher, once wrote that “life can only be understood b…
    - 10 days ago 14 Jan 21, 2:00pm -
  • Microsoft’s January 2021 Patch Tuesday Addresses 83 CVEs

    Microsoft’s January 2021 Patch Tuesday Addresses 83 CVEs

    In its first Patch Tuesday of 2021, Microsoft patched 83 CVEs including 10 critical vulnerabilitiesMicrosoft patched 83 CVEs in the January 2021 Patch Tuesday release, including 10 CVEs rated as critical and 73 rated as important.Compared to Micro…
    - 12 days ago 12 Jan 21, 9:07pm -
  • 4 Ways to Improve Nessus Scans Through Firewalls

    4 Ways to Improve Nessus Scans Through Firewalls

    Establishing the right configurations and settings can improve Nessus scan results when scanning through firewalls.Of all the factors that can inhibit a successful Nessus scan — busy systems, congested networks, legacy systems, hosts with large am…
    - 37 days ago 18 Dec 20, 8:51pm -
  • Tenable's Commitment to Security in the Wake of Solorigate

    Tenable's Commitment to Security in the Wake of Solorigate

    As Tenable's chief security officer I'm simultaneously protecting our own systems while addressing the concerns of our customers around the world. Here's what I've learned so far.  The most profound fallout from the SolarWinds hack can't be measur…
    - 39 days ago 16 Dec 20, 3:09pm -
  • A Role-Based Look at How Splunk Mission Control and Tenable Can Streamline Your Risk-Based Vulnerability Management Program

    A Role-Based Look at How Splunk Mission Control and Tenable Can Streamline Your Risk-Based Vulnerability Management Program

    The new, exclusive integration between Tenable.io and Splunk Mission Control enables security teams to consolidate vulnerability insights and expedite their remediation efforts.It's no surprise that the attack surface becomes increasingly complex wh…
    - 39 days ago 16 Dec 20, 2:00pm -

RSA

  • Make Your Incident Response Program A Key Pillar of Your Security Defenses
    It is now well-accepted in security circles that preventive controls are no longer sufficient to defend your organization against today’s cybercriminal-, nation state-, and hacktivist-led attacks. This leaves monitoring and response teams to pick u…
    - 12 Feb 14, 4:00pm -
  • Executive Order 13636: Improving Critical Infrastructure Cyber security
    In the event of a full-scale cyber war, attacks on our critical information systems would pose the greatest risk of damage. The loss of capabilities in places like our banking, communications, and energy sectors would cripple our nation. It is for th…
    - 31 Oct 13, 3:00pm -
  • Maximum-Strength Threat Detection for Mid-Size Enterprises
    Advanced threats today do not discriminate – organizations of all sizes are at risk. The impact of an advanced threat can be as daunting to a smaller enterprise as it is to a larger one but with the additional challenges and constraints of budget a…
    - 1 Aug 13, 11:25am -
  • Improve Your Breach Readiness, Response and Resiliency
    Defending against today’s sophisticated attacks requires a shift in security investments from prevention to a balanced mix of prevention, detection, and response. The challenge is how to make this shift given limited resources and expertise. The…
    - 16 Jul 13, 3:00pm -
  • An Intelligence-Driven SOC: Hear it, See it, Build it
    Today’s IT security threats are multi-faceted, dynamic and stealthy, and who is the most likely target is very hard to predict. Actionable intelligence fed to an agile security operations center (SOC) is critical as many threats cannot be prevented…
    - 2 May 13, 6:00pm -
  • Fighting Advanced Threats with Big Data Analytics
    Organized criminals, nation-state groups, and hacktivists continue to wreak havoc with organizations of all sizes in spite of their security teams’ best efforts. The problem is an over-reliance on antiquated incident management processes, over-dep…
    - 14 Mar 13, 5:00pm -

Arbor Networks

NETSCOUT Arbor and Optical Networks Alliance for DDoS protection in Peru

- 6 Mar 18, 9:40pm -
Alianza NETSCOUT Arbor y Optical Networks para protección anti-DDoS en Peru

- 28 Feb 18, 9:54pm -
Aliança NETSCOUT Arbor e Optical Networks para proteção anti-DDoS no Peru.

- 28 Feb 18, 4:26pm -
A explosão dos ataques DDoS

- 25 Sep 17, 3:54pm -
Botnets de IoT e ataques DDoS: O jogo mudou

- 25 Sep 17, 3:50pm -
Don't Check The Box - Quando se trata de defesa contra DDoS, não basta marcar a caixa

- 25 Sep 17, 3:48pm -

Fortinet

  • Introducing the FortiAnalyzer BigData 4500F
    Learn more: https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/ko_kr/fortianalyzer-bd.pdfThe FortiAnalyzer BigData 4500F delivers high-performance big data network analytics for large andcomplex networks. It is designed for large-scal…
    - 39 days ago 16 Dec 20, 8:00am -
  • Introducing the FortiGate 40F
    Learn more: https://www.fortinet.com/content/dam/...The FortiGate/FortiWiFi 40F series provides a fast and secure SD-WAN solution in a compact fanless desktop form factor for enterprise branch offices and mid-sized businesses. Protects against cybe…
    - 44 days ago 11 Dec 20, 8:00am -
  • Leverage SAML to switch between two FortiGates
    In this video we will introduce a new feature, available in FortiOS 6.2.1.A new dropdown menu available in the FortiGate GUI header for all FortiGates participating in the Security Fabric.You can use the dropdown menu to easily switch between all d…
    - 52 days ago 3 Dec 20, 8:00am -

Logrhythm

  • new[EMEA] Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting
    Having a well-run, foundational SIEM for your security posture is a fantastic goal for most organisations, however that shouldn’t be where the drive to improve organisational security stops. In this webinar Jake Anthony, Enterprise Sales Engineer…
    - 32 days ago 25 Feb 21, 10:00am -
  • newDated Zero Trust in 2020? Make a Commitment in 2021!
    Ever since Forrester alum John Kindervag founded the concept of Zero Trust in 2009 , it’s intrigued those with its “Never trust, always verify” approach to security. Even so, many believed the framework to be out of their reach, often citing hi…
    - 17 days ago 10 Feb 21, 6:00pm -
  • new[APAC] Threat Hunting with ATT&CK Technique "X"
    Threat hunting with MITRE ATT&CK techniques can be approached in several ways. Join members of the LogRhythm Labs team as they take you on a journey of how to use MITRE ATT&CK techniques and LogRhythm to make your threat hunting activities more va…
    - 9 days ago 3 Feb 21, 2:00am -

Veracode

  • newGerman Webinar - State of Software Security v11: The Nature vs Nurture of AppSec
    Die meisten Applikationen haben Schwachstellen. Unsere Analyse für unseren jährlichen Bericht zum Stand der Software-Sicherheit ergab in diesem Jahr, dass 76 Prozent der 130.000 Apps mindestens eine Sicherheitslücke aufwiesen. Darüber hinaus ist…
    - 45 days ago 10 Mar 21, 9:00am -
  • newSo Many AppSec Testing Types, So Little Time
    There is no AppSec silver bullet; effective AppSec requires leveraging the strengths of multiple testing types across the software lifecycle. Depending on one testing type would be like only checking your blood pressure and declaring yourself complet…
    - 44 days ago 9 Mar 21, 11:00am -
  • newHow Are You Fixing the Security Flaws You Find?
    When it comes to software, developers are really the only ones in an organization who can fix the vulnerabilities in their code. Yet developers often don’t have the training they need to identify or remediate vulnerabilities and to code securely to…
    - 39 days ago 4 Mar 21, 2:00pm -

Whitehat Security

  • Women Building Careers in Cybersecurity
    Women make up only 24% of the security workforce. While this number has increased over the last three years, we are still not where we should be. The solution to filling the cybersecurity workforce gap seems simple – hire more women. Over the next…
    - 94 days ago 22 Oct 20, 5:45pm -
  • The DevSecOps Journey: How to Transform AppSec and Move Toward Secure DevOps
    Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and the…
    - 7 Oct 20, 7:00pm -
  • Reduce API Security Risks with Automated and Continuous API Scanning
    Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (P…
    - 15 Jul 20, 5:00pm -

ZScalar

  • Accelerate the Migration to Microsoft Azure with Zscaler Private Access
    Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends…
    - 5 Jun 18, 5:50pm -
  • Adopting A Zero-Trust Model. Google Did It, Can You?
    Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach…
    - 24 Apr 18, 7:45pm -
  • GDPR - are you ready? Key steps to getting GDPR right
    On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance wi…
    - 13 Mar 18, 9:20pm -

Tufin

  • newHow to Automate Security Policies to Further Accelerate CI/CD
    Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced mu…
    - 10 days ago 4 Feb 21, 6:00am -
  • newHow to Automate Security Policies to Further Accelerate CI/CD
    Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced mu…
    - 10 days ago 3 Feb 21, 4:00pm -
  • newTech Talk: Attaining Least Access and Zero Trust
    Join us on Friday, January 29 at 2 pm SGT for a tech-driven session packed with valuable security policy info and tips, as Blake Hutchins, Tufin’s senior security engineer reviews the practical steps Tufin’s customers are taking to achieve Zero T…
    - 4 days ago 29 Jan 21, 6:00am -

Akamai Technologies

Sid Pisharoti speaks to CNBC on the trends in Indian Gaming industry

- 12 days ago 12 Jan 21, 7:46pm -
What a Year: A Discussion with Martin McKeay & Steve Ragan

- 25 days ago 30 Dec 20, 8:36pm -
Detect and Manage Your Automated Traffic

- 34 days ago 21 Dec 20, 3:57pm -
A Discussion with Akamai's CSO Andy Ellis

- 39 days ago 16 Dec 20, 3:12pm -
Akamai on The Changemakers on CNBC-TV18

- 39 days ago 16 Dec 20, 2:08pm -
Learn how the Akamai Edge Platform Works

- 40 days ago 15 Dec 20, 10:48pm -

AllienVault

  • newThe Science of Cybersecurity: Best Practices in the New Normal
    As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. As you navigate this new workforce dynamic, how you help…
    - 10 days ago 3 Feb 21, 5:00pm -
  • AT&T Cybersecurity Insights Report™: 5G and the Journey to the Edge
    The tenth edition of the AT&T Cybersecurity Insights™ Report: Transitioning to 5G is here – the data is in, the analysis is complete, and we can’t wait to share this new report with you!The use cases for 5G are unlimited and only constrained b…
    - 11 days ago 13 Jan 21, 5:00pm -
  • The Science of Cybersecurity: Best Practices for Business in Asia Pacific
    As organizations across Asia Pacific continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protec…
    - 37 days ago 18 Dec 20, 5:00pm -

Bradford Networks

  • Reduce the Mean Time to Incident Response
    Incident Response has always been a complex and time consuming process. It requires Incident Responders to aggregate security, network and endpoint information to find the threat’s presence and reconstruct an accurate picture of its foothold. To mi…
    - 17 Jun 15, 4:00pm -
  • Network Access Control 101: Secure the Critical Edge of Your Network
    As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focu…
    - 2 Jun 15, 5:00pm -
  • Rapid Threat Response 101: An Introduction to Network Sentry/RTR
    Today’s cyber threats are targeted, difficult to detect, and require expertise to contain. They traverse various domains of IT management — making incident response a time consuming and cross-functional challenge. Silos of security and network i…
    - 20 May 15, 5:00pm -

Dell Sonicwall

  • Your Inbox Is For Sale: How Attackers Are Monetizing Your Email on the Dark Web
    You probably know there are attackers willing to pay for access to your inbox. But did you know there are groups so sure they can gain access to your accounts that they offer a money-back guarantee? Join SonicWall’s Ken Dang as he explores the so…
    - 20 Aug 20, 5:00pm -
  • Conversations with a Ransomware Developer
    The boundaries of your organization are borderless and expand to limitless endpoints and networks.Join us to get an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, e…
    - 12 May 20, 7:00pm -
  • Mindhunter: Confessions of a Ransomware Developer
    Join SonicWall security expert Brook Chelmo for an update on one of last year’s most popular cybersecurity stories, as he recaps his ongoing conversations with a Russian ransomware cell and details how it’s grown. You’ll get an inside look at t…
    - 5 May 20, 6:00pm -

Fortinet

  • Evolution of Fortinet's Architecture on AWS
    As Cloud adoption continues to accelerate, Amazon Web Services (AWS) continues to innovate to provide customers with scale and agility. As part of the Shared Responsibility Model, AWS is responsible for protecting the Cloud infrastructure and custome…
    - 52 days ago 3 Dec 20, 4:00pm -
  • Transforming the Retail Experience Securely—When Everything Has Changed
    Retailers of all sizes have been forced to change during the COVID-19 pandemic, and that shift includes security, user experience, and network performance.Join us for an exclusive fireside chat and Q&A with The Paper Store and Fortinet, and get fir…
    - 74 days ago 11 Nov 20, 6:00pm -
  • Spending Smarter to Secure Remote Learning
    Remote and hybrid learning in K-12 has rapidly accelerated in the past year. Join us for this special live webinar to learn what is required to build and secure your hybrid learning network for today and the future. Discover what funding resources ar…
    - 81 days ago 4 Nov 20, 6:10pm -
  • Self-Healing SD-WAN for Driving Digital Transformation at All Edges
    Gartner recently published the September 2020 Magic Quadrant and Critical Capabilities for WAN Edge Infrastructure reports, which we think validate Fortinet as a leader in SD-WAN. In this Fortinet webcast, learn how self-healing SD-WAN capabilities h…
    - 88 days ago 28 Oct 20, 5:00pm -
  • Security Posture and Reduced Latency Transforms Autodesk’s Cloud Environment
    Autodesk had a goal to build a virtual data center on the cloud for core and security services. Though its customer-facing business was moving towards the cloud, Autodesk was previously running business-critical, back-office applications on premises.…
    - 96 days ago 20 Oct 20, 4:00pm -
  • Securing Identity - 1 Year Check-In
    According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials.…
    - 14 Oct 20, 4:00pm -
  • Get Ready to SOAR Through Your SOC
    Empowering SOC teams to focus on only relevant threats can be the difference between being breached or being resilient. In this all-new webinar, we will explore how Incident Response can be simplified and accelerated using the power of SOC Automation…
    - 7 Oct 20, 4:55pm -
  • How to Boost Security for Microsoft 365
    Join Fortinet experts to hear best practices and actionable advice for securing Microsoft 365. Your investment in the industry's fastest-growing cloud-based business productivity suite gets a lot better when you have the right security in place. We'l…
    - 30 Sep 20, 5:55pm -
  • Defend Your High Performance Web Application with Amazon Cloudfront and Fortinet
    Today, you not only need to build applications that meet the global scale and performance requirements demanded by your customers, but also secure those applications against an ever expanding and evolving threat landscape. To help you keep pace with…
    - 29 Sep 20, 4:00pm -
  • Proudly Ushering in the Era of Hyperscale Security
    Discover how the growth of hybrid and hyperscale data center architecture and the dawn of 5G connectivity create unprecedented demand for speed, resiliency, and user experience at massive scale. Learn how to deliver effective security that reduces yo…
    - 23 Sep 20, 3:55pm -
  • Solving Secure Remote Work for Super Users
    Behind overall shifts in work culture accelerated by the COVID-19 pandemic, more companies are realizing that their remote work employees have different requirements. Learn the key differences in remote work needs among basic users, power users, and…
    - 9 Sep 20, 9:20pm -
  • Delivering and Securing the Most Demanding Web Applications
    Continent8 provides high availability network solutions for some of the most demanding web applications in use today, including applications used by the global gaming industry. Learn how Continent8 uses FortiWeb Cloud to expand its managed security s…
    - 31 Aug 20, 6:30pm -
  • 2020 Critical Security Threat Trends and What to Do About Them
    Organizations that are too reactive in their security can't keep up with an ever-evolving threat landscape. Learn from FortiGuard Labs, the threat intelligence unit at Fortinet, about the major threat trends from the 1st half of 2020, how to prepare…
    - 19 Aug 20, 9:05pm -
  • Secure SD-WAN and SASE: The Best of Both Worlds
    Join this special presentation to learn how Secure SD-WAN sets up organizations to fully embrace a SASE framework, and to hear more about Fortinet product and service innovations, from Secure SD-WAN to Zero-Trust Network Access, as part of the indust…
    - 12 Aug 20, 4:50pm -
  • 4 Key Ingredients for Endpoint Resilience
    Endpoint visibility alone isn't enough, and EDR solutions have needed to evolve dramatically to keep pace with an expanding threat landscape. Learn why FortiEDR helps you achieve true endpoint resilience, including: the critical combination of preven…
    - 29 Jul 20, 5:40pm -
  • Protecting Your APIs from Cyberthreats, Easily and Effectively
    Learn all about all about how to deliver security for APIs. The use of traditional web applications is declining, replaced by API-based applications that can provide a richer, more responsive user experience, especially for mobile device users. Come…
    - 22 Jul 20, 6:00pm -
  • A First-of-Its-Kind Secure SD-WAN Solution for Multi-Cloud Application Deploymen
    This era of Cloud, creates demand for networking and security teams to constantly balance security, complexity, and application performance. Learn how to design a Secure SD-WAN solution right for you, from optimizing CapEx and OpEx, to increasing ove…
    - 15 Jul 20, 8:10pm -
  • Revolutionize Your Security Operations with FortiAI
    Learn how ten years of ML and AI development has contributed to our self-learning Deep Neural Networks (DNN) based solution that will revolutionize your SOC and help your teams be at their best by assisting investigation, detection, and respond to se…
    - 8 Jul 20, 4:50pm -
  • Minimizing Risk: The ROI of Your Cybersecurity Investments
    Ready to keep the board from getting bored? Cybersecurity and OT are critical investments to get right. All security teams need a set of measures that give meaning to technology investment as a true solution, maximizing value and minimizing risk. Joi…
    - 1 Jul 20, 6:20pm -
  • Increase Efficiency and Effectiveness of Network Operations with Automation
    Networking teams want to solve for the ever-growing complexity of multiple solutions and get more out of their investments. Join our expert as we look into multiple use cases and look at how a single-console approach to management helps improve effic…
    - 24 Jun 20, 9:50pm -
  • Simplifying SOC Operations: Automate Response with SOAR Across the Security Fabr
    Most of today's SOCs are needlessly complex, with too many vendors, too many alerts, slow response times, and a lack of trained staff. Join this new webinar to learn how Fortinet can simplify security operations with the Fortinet Security Fabric and…
    - 19 Jun 20, 5:10pm -
  • Rollins' Secure SD-WAN Digital Transformation
    In this special presentation, Rollins CISO Kevin Morrison will share how Rollins tackles its hardest security and management challenges, keeps 2 million customers informed, and keeps services running smoothly—all with an anticipated ROI of $5 milli…
    - 17 Jun 20, 5:30pm -
  • Extending Your FortiGate Next-Gen Firewall to Kubernetes
    Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databas…
    - 17 Jun 20, 5:00pm -
  • Use a Zero-Trust Network Access Approach to Defend your Network
    Digital transformation is creating new threat edges. One threat edge is the number of IP-based devices that are coming onto networks that must be discovered, identified, and controlled. Additionally, network administrators need to identify and provi…
    - 5 Jun 20, 8:35pm -
  • SD-WAN Delivers Resiliency, Security & Unique Digital Experiences for Retailers
    Discover how to transform your retail network with the speed and security to support optimal eCommerce experiences with a joint Windstream Enterprise and Fortinet solution. Learn how Windstream Enterprise SD-WAN with Fortinet enhancements ensures upt…
    - 28 May 20, 8:30pm -
  • FortiOS 6.4 Launch Feature Overview
    Find out why we’re so excited about FortiOS 6.4.1! With too many new innovations to list, this FortiOS launch is here to empower your digital innovations across all four tenants of the Fortinet Security Fabric from security-driven networking to dyn…
    - 21 May 20, 5:30am -
  • Cybersecurity Strategy and Leadership for the SMB
    Smaller businesses have a common problem when it comes to cybersecurity - limited expertise, resources and budget. The board is asking for, clients are demanding to know whether the company is secure, IT team can't articulate the cybersecurity pro…
    - 20 May 20, 4:00pm -
  • Dynamic Network Security from On-prem to the Cloud
    Learn how you can easily protect the entire evolving attack surface while delivering secure remote access to critical applications and meeting compliance—all with a single pane of glass with the FortiGate-VM next-generation firewall which delivers…
    - 7 May 20, 5:00pm -
  • Enabling Enterprises with Secure, Agile and Intelligent Managed SD-WAN
    Join experts from Masergy and Fortinet to hear how this managed service works as well as customer success stories and actionable use cases. This joint discussion will dive into how Masergy Managed Secure SD-WAN services backed by Fortinet Secure SD-W…
    - 29 Apr 20, 9:55pm -
  • Best Practices for Teleworkers at Scale
    A sudden shift to a remote workforce presents new challenges for many networks. Organizations need to support their employees with VPN access at scale, all without sacrificing security. We will share some recent attack methods cybercriminals have bee…
    - 23 Apr 20, 7:20pm -
  • Defend Your High Performance Web Applications with Amazon CloudFront & Fortinet
    To help you keep pace with modern application deployments, Fortinet and Amazon CloudFront have partnered to deliver industry-leading performance and security on AWS. Learn how our integrated solutions from Fortinet and AWS secures your entire infrast…
    - 23 Apr 20, 4:55pm -
  • How the Threat Landscape Has Changed with COVID-19
    In the midst of an unforeseen influx of remote workers due to COVID-19, hackers and cybercriminals across the globe are quickly taking advantage of new vulnerabilities. Hear from Derek Manky, leader at the FortiGuard Labs threat research team, about…
    - 16 Apr 20, 3:20pm -
  • Securing Medical Devices - The Next Threat Vector
    Join this exclusive panel event to hear from healthcare security leaders with Fortinet, IDC and a customer in a medical office as they dive into the latest findings from a recent IDC report and discuss how they work to protect medical devices from th…
    - 14 Apr 20, 7:00pm -
  • 5 Key Factors to Automating Your Endpoint Protection
    Discover how an innovative approach to endpoint security that includes real-time threat detection and automated response capabilities can successfully and effectively combat the most sophisticated attacks seen today. Our experts will share five key f…
    - 24 Mar 20, 6:10pm -
  • Applying the Most Dynamic and Comprehensive AI to the Kill Chain
    Join our expert as we cover the ground-breaking work Fortinet is doing to go above and beyond industry standards by integrating AI into threat intelligence and several cybersecurity solutions to stop more threats, faster, and with fewer staff resourc…
    - 18 Mar 20, 5:00pm -
  • Zeroing in on Threat Trends Around Election Disruption, & Ripe Vulnerabilities
    Uncover the latest findings of the Fortinet Quarterly Threat Landscape Report as our security strategy expert dives into some of the top trends which include: APTs targeting elections, increasing IoT risks, and exploitation of old vulnerabilities. Pr…
    - 5 Mar 20, 5:35pm -
  • Soar Into Digital Innovation by Protecting Your Customers with Confidence
    Discover how to deliver long-lasting experiences for retail and hospitality customers with new digital technologies. Fortinet Secure SD-Branch not only supports secure, high-performance network capabilities, but can extend branch location’s network…
    - 27 Feb 20, 2:15am -
  • Simplify Management and Secure the Edges of Your Business Network with Secure SD
    Learn how to take branch locations to the next level with a truly Secure SD-Branch and a deeper understanding of how to extend edge security to branch locations while streamlining management. Plus, take a look at what an extended architecture that go…
    - 13 Feb 20, 1:45am -
  • Strategies for Leveraging E-rate to Strengthen Your Network
    Find out how to leverage the newest updates to the 2020 E-rate program for reduced or even zero-cost security solutions for your K-12 campuses. Gain an understanding of common security challenges schools face and learn which eligible E-rate products…
    - 5 Feb 20, 1:20am -
  • The Modern WAF: Machine Learning and Web Application and API Protection
    Gain and insightful look at how powerful machine learning (ML) can deliver an evolved web application firewall (WAF) that removes the tiring manual processes in protecting web application deployments. Learn how collaborative teams can ensure web appl…
    - 29 Jan 20, 12:35am -
  • Overcome WAN Challenges with Powerful and Dynamic Secure SD-WAN
    Discover how you can simplify complex environments while enabling a cloud-ready branch with Fortinet Secure SD-WAN. Plus, hear why we believe Fortinet Secure SD-WAN has contributed to our recognition in the 2019 Gartner Magic Quadrant for WAN Edge In…
    - 16 Jan 20, 10:35pm -
  • Enable Consistent Security for True SD-WAN Transformation
    Discover how transforming your network with next-generation technology can ensure proper protection and compliance of your data, increase network resiliency, and improve application performance and productivity, all while lowering your costs. Learn h…
    - 11 Dec 19, 9:25pm -
  • Report Findings—The Dangers Lurking Right Below the Surface with Insider Threats
    Join this panel of cybersecurity experts who will share their perspectives on the true risk of insider threats. Find out what types of threats are actually lurking within your organization and what to watch for to safeguard your critical data. Plus,…
    - 19 Nov 19, 5:45pm -
  • A Platform Approach to Security-Driven Networking
    Discover why we believe our platform-based approach, at Fortinet, has contributed to our recognition in the 2019 Gartner Magic Quadrant for Network Firewall. Fortinet CMO and EVP of Products, John Maddison will provide an animated overview of our uni…
    - 31 Oct 19, 10:10pm -
  • What Matters to the CIO When It Comes to Cybersecurity
    Join an engaging discussion among CIO experts about emerging industry trends and their impact on an organization. Learn about recent trends they have experienced and how they aim to reduce security risk across their organizations. Plus, gain more fro…
    - 16 Oct 19, 9:10pm -
  • 10 Best Practices for Improving Election Security
    Discover how to address some of the widespread concerns of electoral security. Join our expert as we unpack some of the challenges faced when protecting election systems, and gain valuable insights about how to develop an integrated security framewor…
    - 7 Oct 19, 1:05am -
  • Understanding the Current Threat Landscape - A Walk-through of the Latest Attack
    Join our FortiGuard Labs researcher, as he walks through some of the most disruptive findings from the latest edition of the Fortinet Quarterly Threat Landscape Report. Learn how to better meet the security needs of your evolving organizations and ho…
    - 25 Sep 19, 8:30pm -
  • Significantly Reduce Your Data Breach Risk Factor with FortiGuard Security Ratin
    Find out how security checks, actionable recommendations, and compliance reporting through FortiGuard Security Rating Service can help security teams to ensure their organization’s most critical assets are protected in real-time, all the time. This…
    - 19 Sep 19, 7:25pm -
  • IHS Report Findings on the New Dynamic Multi-Cloud Realities
    Learn about the latest findings from an IHS Markit report about customer approaches to cloud deployments. Don’t miss the chance to hear from both Fortinet and IHS Markit as they explain the report findings and some of the leading reasons that organ…
    - 21 Aug 19, 7:55pm -
  • Enhance Your WAN Edge Security Posture at Every Branch Location
    Learn why security is essential for a complete WAN Edge transformation from headquarters to the enterprise branch. Tune in for use cases and real-world examples of how organizations are using Secure SD-WAN to empower employees globally. Our Fortinet…
    - 14 Aug 19, 6:40pm -

Tripwire

  • Retail Security – Closing The Threat Gap
    Attendees will learn:•How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.•The importance of end point security across your business cr…
    - 12 Jun 14, 6:00pm -
  • How the 20 Controls Address Real Threats
    In this webcast, we will:•Discuss how to translate security information into specific and scalable action•Describe the remediation plan for the controls, starting with the Top 5 •Discuss how the Council on CyberSecurity uses a community app…
    - 11 Jun 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Recovery
    In this webcast we will show:The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organizationHow you can identify your business exposure and what systems are vulnerableHow Tripwire’s solutio…
    - 15 May 14, 9:00am -
  • Insider Threat Kill Chain: Detecting Human Indicators of Compromise
    In this webinar we will: • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem. • Identify risk indicators with employee attitudes and behavior and how it correlates to their…
    - 8 May 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Business Recovery
    In this webcast we will show:1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization2. How you can identify your business exposure and what systems are vulnerable3. How Tripwire’s…
    - 17 Apr 14, 6:00pm -
  • AAA: Getting Roadside Assistance from Tripwire
    Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.In this Q&A-style webcast you will learn:•How to move your PCI efforts from a small tactical implementation to a key critical component of your…
    - 2 Apr 14, 6:00pm -
  • How to Restore Trust After a Breach – Middle East
    Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of t…
    - 13 Mar 14, 8:00am -
  • How to Restore Trust After a Breach – DACH
    Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of…
    - 5 Mar 14, 9:00am -
  • How to Restore Trust After a Breach - UK
    In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you atta…
    - 4 Mar 14, 10:00am -
  • How to Restore Trust After a Breach
    In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How qui…
    - 12 Feb 14, 6:00pm -
  • Preparing for PCI DSS v3.0: Advice from the QSA
    As a former QSA and currently a security analyst at The 451 Research, Adrian Sanabria will share a frank viewpoint of how the new version of Payment Card Industry standard will affect your organization. Join us for this webcast and you will:•Ob…
    - 22 Jan 14, 6:00pm -
  • Vulnerability Voodoo: The Convergence of Foundational Security Controls
    Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire, will discuss:•Integrating Vulnerability Management with other security controls to improve compliance and secur…
    - 17 Dec 13, 6:00pm -
  • PCI DSS 3.0: Don't Shortchange Your PCI Readiness
    Join Jeff Hall, CISSP, CISM, CGEIT, PCI-QSA, PCIP and Senior Security Consultant at FishNet Security and Steve Hall, Director of PCI Solutions at Tripwire, to learn how PCI DSS 3.0 will impact your organization and what you need to do:• Understan…
    - 16 Dec 13, 7:00pm -
  • Reducing Risk Through Effective Vulnerability Management
    Gavin Millard, Tripwire's EMEA Technical Director, will discuss why effective vulnerability management is critical to measuring, managing and reducing your attack surface and how to gain insight from the information Tripwire can provide.Topics cover…
    - 16 Dec 13, 10:00am -
  • 2014 IT Security Budget Mistakes to Avoid
    Often during budget cycles, we’re handed a number – no choice or negotiation – this is just all you get. This year however, there are some positive trends in security budget research from Gartner, IDC, Ponemon, and CEB. This webcast will show…
    - 6 Nov 13, 6:00pm -
  • Avoiding Vulnerability Info Overload: How to Prioritize and Respond to Risk
    Lamar Bailey, Tripwire's Director of the Vulnerability & Exposure Research team will provide you with a better understanding of:- Why is the Tripwire Vulnerability scoring so granular?- How do we arrive at those scores and why not just use CVSS?-…
    - 16 Oct 13, 5:00pm -
  • Using the SANS Top 4 Controls to Measure and Reduce your Attack Surface
    Please accept our apologies for the technical difficulties encountered with this webinar on Monday. This is now due to take place on Friday 4th October.This hour-long webinar, hosted by Gavin Millard, Tripwire's EMEA Technical Director, will discu…
    - 4 Oct 13, 9:00am -
  • Strategic Vulnerability Management: Go Beyond Scanning
    Join Rick Holland, Forrester Senior Analyst, and Edward Smith, Product Marketing Manager at Tripwire, to learn how to go beyond scanning to a strategic vulnerability management program.In this webcast you’ll learn how a strategic VM program can he…
    - 23 Sep 13, 5:00pm -
  • CyberSecurity Awareness and the SANS 20 CSCs
    Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on Cybersecurity, as she shares her thoughts on the rapidly evolving world of cybersecurity.In this webinar, you will learn: * How the Council on CyberSe…
    - 12 Sep 13, 5:00pm -
  • TLC 7.0: Creating Confidence through Improved Log Intelligence
    As Security Management solutions evolve to address today’s environment of complex security threats, the need for a log intelligence layer has emerged to provide high speed analysis and filtering of log and event data.In this webcast, Steve Hall,…
    - 26 Aug 13, 8:00pm -
  • How to Communicate Security Imperatives to the Business
    Global IT executive Jitender Arora and Dwayne Melancon, Tripwire’s CTO, will demonstrate the pitfalls and offer tips and tricks for communicating security initiatives with executives and non-financial stakeholders. In this webcast, you will learn…
    - 7 Aug 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Bryce Schroeder,Systems Engineer Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding your…
    - 25 Jun 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Gavin Millard, EMEA Technical Systems Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding…
    - 18 Jun 13, 9:00am -
  • The Emergence of Enterprise Security Intelligence (AMER)
    Enterprise Security Intelligence (ESI) is defined as an emerging concept that is a comprehensive and holistic alternative to traditional disjointed security approaches that will enable stronger enterprise-wide security, optimal decision making and be…
    - 11 Apr 13, 5:00pm -
  • The Emergence of Enterprise Security Intelligence (EMEA)
    Tripwire’s CTO, Dwayne Melançon, will discuss:• Gartner’s Enterprise Security Intelligence concept and how to utilize it in your security efforts• Practical tips for leveraging security intelligence and how it fits with Tripwire's System…
    - 11 Apr 13, 2:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 27 Mar 13, 10:00am -
  • Tripwire Announcement
    Tripwire general announcement to customers
    - 20 Mar 13, 3:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 20 Feb 13, 6:00pm -
  • I Didn't Know Tripwire Could Do That--The Series Continues
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Bryce Schroeder, Tripwire's Director of Systems Engineering, who will…
    - 12 Feb 13, 6:00pm -
  • I Didnt Know Tripwire Could Do That - Part 2 (EMEA)
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Gavin Millard, EMEA Technical Director, who will walk you through ways…
    - 29 Jan 13, 10:00am -
  • 10 Steps to Risk-Based Security Management
    Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways that do not reflect this commitment. This dichotomy often leads to misplaced effort, spending and r…
    - 4 Dec 12, 3:00pm -
  • I Didnt Know Tripwire Could Do That - EMEA
    The last few releases, Tripwire has added some pretty groundbreaking features as part of the Tripwire VIA platform—the Event Integration Framework, Asset View and Data Mart. Even before that, we’d released our pre-packaged set of high-value secur…
    - 22 Nov 12, 10:00am -
  • "I Didn't Know Tripwire Could Do That!"
    Everyone knows that Tripwire solutions help customers meet compliance mandates and offer best-of-breed FIM. Lately, though, when we demonstrate features and capabilities our users exclaim, “I didn’t know Tripwire could do that!” In this webcast…
    - 14 Nov 12, 6:00pm -
  • 10 Steps to Risk-Based Security Management
    This webcast will provide a simple framework for executing a risk based security management program. This framework is based on some basic tenants about risk based security management:•It creates an environment of informed choice•It strives to…
    - 13 Nov 12, 6:00pm -
  • „Systemausfälle und Downtime reduzieren“
    Der häufigste Grund für Systemausfälle sind Fehlkonfigurationen. Das muss aber nicht so sein. So sagt z.B. ein führender Dienstleister der Automobilbranche: „Mit Tripwire haben wir unsere Downtime um ca. 80% reduziert.“ NTT DATA und Tripwire…
    - 8 Nov 12, 10:00am -
  • Own Your Own Network: Continuous Monitoring
    Continuous monitoring has been defined by NIST and the SANS 20 Critical Security Controls as key to reducing risk in IT environments. Under these definitions, continuous monitoring encompasses at lot of moving parts! Change management, configuration…
    - 19 Oct 12, 5:15pm -
  • Secure Configuration Management Demystified
    The SANS 20 Critical Security Controls recommends Secure Configuration for systems, servers and end points as a third critical control, and secure configuration for network and security devices as a tenth critical control. Tune in as SANS' configurat…
    - 16 Oct 12, 5:50pm -
  • IANS Webcast: Calculating Your Return on Security Investment with Tripwire
    In the world of security, you know first-hand how difficult it can be to quantify the advantages of solutions when there are so many variables at play. Join us and listen in to Diana Kelley, IANS faculty member and analyst and Tripwire customer, Fran…
    - 9 Oct 12, 5:00pm -
  • Connecting Security to the Business
    Information security has entered the boardroom. So, how can CISOs show value to their organization in meaningful ways? In this video we outline the growing problem and Tripwire's solution.
    - 14 Sep 12, 8:40pm -
  • Five Steps for Utilities to Reduce Risk Management Framework Fatigue
    Utilities fear the specter of the NERC auditor, new security legislation on the horizon, and cyber attacks that could shut down systems and services. But risk management framework fatigue has set in, and with so many approaches they don’t know wher…
    - 28 Aug 12, 5:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 27 Jun 12, 2:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 26 Jun 12, 5:00pm -
  • 10 Steps to Better Security Incident Detection
    Organisations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 22 May 12, 1:00pm -
  • Achieving Continuous Monitoring Easily with Security Automation
    With complex, distributed government information systems increasingly under attack from rogue nations, terrorists and cause-driven groups, IT security teams need to get a lead on the state of their systems. In this webcast, learn about an approach to…
    - 17 May 12, 5:00pm -
  • Get more out of SIEM with Change and Configuration Data
    The New 2012 Verizon Data Breach Investigation Report shows that 85% of breaches took weeks or more to discover which is an increase of 6% on last year. There is also an increase on the number of breaches that are being discovered by third parties a…
    - 3 May 12, 12:00pm -
  • 10 Steps to Better Security Incident Detection
    Organizations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 2 May 12, 5:00pm -
  • Reducing Federal Systems Risk with the SANS 20 Critical Controls
    The big news from RSA this year was the announcement out of the Department of Homeland Security (DHS) that U.S. and Canadian government agencies are adopting the SANS 20 Critical Security Controls as a standard. While the Federal Information Systems…
    - 20 Apr 12, 3:50am -
  • Get more out of SIEM with Change and Configuration Data
    Join us for this Lunch and Learn Webcast:Most organizations capture log data that could indicate a breach occurred. Yet not a single breach investigated in the Verizon Data Breach Investigation Report was detected through log analysis or review.…
    - 27 Mar 12, 11:30am -
  • The Metamorphosis: Extracting Business Intelligence from IT Security Data
    It’s been a long time coming: businesses really care about the organization’s state of security. But to make it relevant to business executives, they need up-leveled views of raw security data that don’t require a deep understanding of IT and s…
    - 15 Mar 12, 5:00pm -
  • IT-Security Controls in Deutschland 2011
    IT-Security-Verantwortliche in deutschen Unternehmen wissen, welche Daten sie schützen müssen und kennen die Folgen einer Datenschutzverletzung: Umsatzeinbußen, Reputations- und sogar Jobverlust. Dennoch sind die meisten der Meinung, irgendwann Op…
    - 14 Mar 12, 10:00am -
  • Needle in a Haystack – Getting to Attribution in Control Systems
    The nation’s control systems support critical infrastructure like water treatment plants and the bulk electricity system. When they are compromised, the stakes can be extremely high, potentially even including loss of life. In this webcast, SCADA s…
    - 22 Feb 12, 6:00pm -
  • Where, When and How to Use Real-Time Monitoring
    It's clear to most IT security practitioners that if you only monitor for change through periodic scans, you are probably missing changes that can introduce risk or cause non-compliance. Real-time monitoring seems to offer the panacea by allowing you…
    - 15 Dec 11, 11:00am -
  • GPG13 Compliance: More Than Log Collection and Monitoring
    There is widespread belief that GPG13 compliance can be met by simply logging and monitoring log files. Yet Protective Monitoring Control (PMC) 4 requires a GPG13 solution to detect change and determine its impact upon security. Is it practical to ac…
    - 7 Dec 11, 11:00am -

Bit9

    Guide Point Security

    • Enterprise Security Monitoring: Leaping From Legacy to Leadership
      Advanced cyberattacks are occurring at an astounding rate, with more industries and government entities becoming victims of massive data thefts, damaged brands, public trust issues, as well as billions in lost revenues. One of the primary problems is…
      - 8 Dec 15, 7:00pm -
    • PCI DSS v3.0 and the Evolution of the Self-Assessment Questionnaire
      When the PCI SSC published version 3.0 of the PCI DSS, they revised their complement of Self-Assessment Questionnaires (SAQs) to align with the new standard. Part of the release included three new SAQs that reflect their maturing perspective on the t…
      - 5 Feb 15, 7:00pm -
    • Detecting and Responding More Quickly to Advanced Cyber Attacks
      Most organizations realize it’s no longer a matter of ‘If’ their organization will be breached but ‘When’ (if it hasn’t already happened and they just don’t know it). The key question is ‘How can you gain better visibility, sooner to…
      - 24 Sep 14, 6:00pm -
    • 10 Questions CISOs Should Ask About Mobile Security
      Come join the interactive conversation about factors CISOs should be considering when implementing a mobile security solution. The mobile landscape is changing rapidly, creating new challenges and opportunities for CISOs tasked with balancing busine…
      - 24 Jun 14, 6:00pm -
    • Security Visibility in the Cloud - Logging and Monitoring in AWS
      Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field. Lear…
      - 1 May 14, 6:00pm -

    Kaspersky

    • Mobile Security: What Are The Real World Risks?
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware and malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable targets for mal…
      - 5 Dec 12, 5:00pm -

    Trend Micro

    • Go To The Cloud, Worry-Free
      As you take advantage of the operational and economic benefits of virtualization and the cloud, you need to demonstrate that you can strategize and implement an approach to security that matches the agility and performance they are seeking across the…
      - 24 Oct 18, 7:00pm -
    • Secure your customer’s Office 365 environment with leading security solutions
      Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their s…
      - 16 Aug 18, 6:00pm -
    • ESG Interview on Endpoint Detection Response (EDR)
      An ESG Interview with Steve Duncan, Trend Micro's Product Marketing Manager, on Endpoint Detection and Response (EDR).
      - 25 Jun 18, 7:45pm -
    • Advanced Endpoint Protection (AEP) 2.0 Group Test Results - Trend Micro
      Whether we are talking about the traditional desktop, laptop, or mobile device, the endpoint is always the target of cybercriminal activity. Advanced endpoint protection (AEP) is a disruptive new technology that focuses on preventing cybercriminals f…
      - 5 Jun 18, 3:00pm -
    • Going Beyond Next Generation Security
      The Endpoint Is Not The Battleground - We have seen extensive growth in protection capabilities at the endpoint but is that enough? In this webinar, we will discuss the terminology of “next generation” and explore true end-to-end threat intellige…
      - 30 May 18, 5:50pm -
    • Protecting Against Threats in Office 365
      Although you may not be aware, there are risks passing through your Office 365 environment. Join this webinar to learn more about the phishing, malware, and fraud risks affecting Office 365 email, OneDrive, and SharePoint users.You'll hear from Trend…
      - 17 May 18, 1:05pm -
    • Are You GDPR Compliant?
      GDPR is coming May 25, 2018. Learn what you need to do to prepareand get state-of-the-art security solutions to help with compliance. In this video you will learn:- What is GDPR and its implications- How you can become GDPR compliant- How Trend…
      - 15 May 18, 3:15pm -
    • Going Beyond Next-Gen Endpoint Security, powered by XGen
      Your users are a key source of risk in your organization – they want to work where and how they want. How do you ensure that your corporate information is free from prying eyes and that your users aren’t creating gaps in your security? Trend Mic…
      - 11 May 18, 4:10pm -
    • Go beyond next-gen with XGen Security Explainer Video
      Go beyond next-gen with XGen™ security, a new class of security software that addresses the full range of ever-changing threats—now and in the future. Instead of using separate, siloed security solutions that don’t share information, XGen™ se…
      - 11 May 18, 3:15pm -

    Sophos

    • Data Protection and Compliance: Where Encryption Applies
      Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data. Join Dave Shackleford, IT se…
      - 23 Apr 14, 3:00pm -

    Symantec Information Security

    • Cyber Security Brief: GDPR Special: The Impact of the Regulation One Year On
      In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsen…
      - 29 Aug 19, 8:00am -
    • After the Breach: How to Turn Disaster into Success
      Failure is an essential component of success. Ask any “successful” person and, assuming they’re being honest, they’ll tell you it’s what they learned when things went wrong that proved most valuable of all. That and the grit to pick themsel…
      - 28 Aug 19, 12:50pm -
    • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
      On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behin…
      - 27 Aug 19, 8:00am -
    • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
      On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that ha…
      - 22 Aug 19, 8:00am -
    • Explore the Benefits EDR tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 20 Aug 19, 2:00pm -
    • Cyber Security Brief: Waterbug, “Smart” TVs, and BEC Scam Hits Canadian City
      In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same w…
      - 20 Aug 19, 8:00am -
    • Mobile Security Strategy Best Practices
      As enterprises begin to recognize the need for greater visibility into mobile threats and are increasingly pressed to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify…
      - 15 Aug 19, 5:00pm -
    • Cyber Security Brief: Tube data collected, Baltimore ransomware & BlueKeep
      On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing re…
      - 15 Aug 19, 8:00am -
    • Cyber Security Brief: BlueKeep bug, ransomware “recovery” & GozNym network
      In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of…
      - 13 Aug 19, 8:00am -
    • Cyber Security Brief: Buckeye pre Shadow Brokers leak, IoT security & ransomware
      On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segur…
      - 8 Aug 19, 8:00am -
    • Cloud Workload Assurance: A Journey from visibility to compliance
      Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.In this webinar,…
      - 6 Aug 19, 1:00pm -
    • Cyber Security Brief: Beapy worm, Emotet’s hiding skill & set-top box dangers
      On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data br…
      - 6 Aug 19, 8:00am -
    • Integrating Security Across Your Cloud
      As companies move their applications and operations from on-prem data centers to the cloud, a variety of security concerns become more complex. Applying security controls to servers outside of the physical control of IT means depending on web servi…
      - 5 Aug 19, 1:00pm -
    • Identify, Prioritize, and Remediate Vulnerabilities
      The number of security vulnerabilities discovered over the last few years has rapidly increased. 2018 was a record setting year with a total of 14,760 – more than double the amount from just 2 years earlier. In addition, many of the recent breaches…
      - 1 Aug 19, 1:00pm -
    • Cyber Security Brief: Bayrob convictions, Silk Road 2.0, Alexa listening
      On this week’s Cyber Security Brief podcast, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the p…
      - 1 Aug 19, 8:00am -
    • How to Ensure Your Data is Secure in AWS
      Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations…
      - 31 Jul 19, 1:00pm -
    • How a Managed EDR Analyst Hunts, Investigates, and Remediates an Incident
      Demo Video (8 mins)In this demo, a Symantec Managed Endpoint Detection and Response (MEDR) analyst walks through an end-to-end example of how he:- Creates an automated investigation playbook and hunts for a threat- Demonstrates how he investi…
      - 30 Jul 19, 7:45pm -
    • Cyber Security Brief: Hotel booking privacy, dark marketplace & Mar-a-Lago
      On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an…
      - 29 Jul 19, 9:00am -
    • The Office 365 Dilemma – how secure is secure?
      Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisations race to the cloud they realise that solving the security challenges may not be as straig…
      - 29 Jul 19, 8:00am -
    • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends
      Is your perception of cloud security matching the reality? We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec. Join Clou…
      - 26 Jul 19, 10:00am -
    • Cyber Security Brief: Malware @ Mar-a-Lago, Albany ransomware & Tesla tricked
      On this week’s Cyber Security Brief podcast, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the…
      - 25 Jul 19, 9:00am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 25 Jul 19, 8:00am -
    • The perfect storm: the impact of fragmentation and complexity
      Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to…
      - 23 Jul 19, 1:00pm -
    • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
      On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week –…
      - 23 Jul 19, 8:00am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 22 Jul 19, 9:00pm -
    • Explore the Benefits of Endpoint Detection and Response Tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 18 Jul 19, 5:00pm -
    • Cyber Security Brief: Interview: Neil Jenkins, CAO, Cyber Threat Alliance
      In today’s Cyber Security Brief podcast, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect th…
      - 18 Jul 19, 8:00am -
    • Travel Bookings: Personal Data and Privacy at Risk
      A year has passed since the General Data Protection Regulation (GDPR) came into effect, but new research has found users’ personal data and privacy is still at risk. Symantec found that 67% of hotel and travel websites are leaking guests’ booking…
      - 17 Jul 19, 10:00am -
    • Cyber Security Brief: ISTR Special: Enterprise
      This week’s Cyber Security Brief podcast is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to brin…
      - 16 Jul 19, 8:00am -
    • Next Generation Network Forensics for the Cloud
      The average cost of a breach is US$4 million and continues to increase year on year. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?Join Kar…
      - 11 Jul 19, 5:00pm -
    • Cloud Storage Security Innovations Video
      CWP 4.0 and DLP Integration Video
      - 8 Jul 19, 9:55am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 20 Jun 19, 8:00am -
    • Symantec Cloud & Web Access Security
      As a leader in Cyber Security, Symantec has an integrated set of cloud-delivered gateway services for securing modern enterprise cloud and web access.
      - 13 Jun 19, 10:30pm -
    • Expert Guide to CASB Deployment Success
      There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. Join Steve Riley, a Gartner Senior Director Analyst who focuses on public cloud security, and Eric Andrews, Symantec’s Vice President of Cloud Security, a…
      - 6 Jun 19, 5:00pm -
    • Livestream Video - Proactive Data Privacy and Security
      How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.…
      - 6 Jun 19, 1:00pm -
    • Livestream Video - CISO Challenges and How to Solve Them
      Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking fo…
      - 5 Jun 19, 10:30am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 31 May 19, 12:35pm -
    • Is Your Network Safe From Cyber Threats?
      Do you know what’s lurking in your network? How strong are your defenses against today’s cyber threats? Nothing gives you a better understanding of your security posture than a deep analysis of your historical traffic. Using your own data, Sy…
      - 30 May 19, 5:00pm -
    • Gartner Recommendations for Modern Endpoint Security
      Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response…
      - 30 May 19, 3:20pm -
    • Cyber Security Solutions & Strategies for the Modern Organization
      Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. The old way of fighting cyber-attacks using fragmented tools no longer works. How do organizations adapt thei…
      - 30 May 19, 9:00am -
    • GDPR Turns 1: Is your organization compliant?
      There are countless organizations still working to get their digital houses in order to comply with GDPR and the rules that offer the promise of better governance and further transparency. Join Ramses Gallego, Giampiero Nanni, Damase Tricart, and I…
      - 28 May 19, 9:00am -
    • Il GDPR, un anno dopo...
      Temi del WebinarIl GDPR, il Regolamento Generale sulla Protezione dei Dati, è entrato in vigore un anno fa. Stabilisce una serie di obblighi di notifica che le aziende di tutta Europa devono rispettare in merito a sicurezza informatica e violazione…
      - 22 May 19, 9:00am -
    • RGPD: Panorama un año después
      El Reglamento General de Protección de Datos (RGPD) ya lleva un año en vigor. La nueva normativa impuso una serie de onerosas obligaciones de notificación de filtraciones de datos y de seguridad para organizaciones en toda Europa, así como fuerte…
      - 21 May 19, 1:00pm -
    • GDPR : le point un an après
      - 21 May 19, 9:00am -
    • Insider Threat - Who is the enemy within?
      Client data shared to a personal cloud account? Financial data on a USB drive? An unknowingly hacked password? People don’t generally mean harm. But under GDPR it’s the security breach that matters, not the motivation. See how Symantec Data Lo…
      - 20 May 19, 3:10pm -
    • How to Detect and Protect Sensitive Data
      Have you got the visibility and control you need to detect and protect your GDPR-regulated information? See how Symantec Data Loss Prevention (DLP) uses an information-centric approach to stop your data reaching places it shouldn’t. So you can sh…
      - 20 May 19, 3:05pm -
    • [PANEL] Ensuring Continued Compliance – Data Protection
      Since the rollout of The General Data Protection Regulation (GDPR) in 2018, companies worldwide have had to implement new policies and procedures to protect data. Join leading compliances and security experts as they discuss why data protection is at…
      - 20 May 19, 3:00pm -
    • GDPR: What’s happened in the last year
      The GDPR places a number of onerous cybersecurity and data breach notification obligations for organizations with strong enforcement powers for the data protection authorities. Compliance with GDPR remains as challenging with today’s threat landsca…
      - 20 May 19, 2:00pm -
    • CloudSoc + Cloud Workload Assurance
      The cloud makes your teams faster and more agile. But they’re leaning on infrastructure as a service faster than you can secure it. With Symantec’s Cloud Security you are able to see who is using the cloud, how they are using the cloud and if y…
      - 20 May 19, 12:45pm -
    • Cloud Workload Protection + Cloud Workload Assurance
      What if security was baked in to your development workflow in a way that didn’t slow you down? Symantec Cloud Workload Protection (CWP), integrates into your DevOps workflows, automating security so you don’t have to think about it. Watch this…
      - 20 May 19, 12:45pm -
    • Cloud Workload Assurance
      It’s no news flash that misconfigurations cause the majority of cloud security failures. But how do you prioritize security tasks with your limited resources? Symantec Cloud Workload Assurance minimizes misconfigurations through automated discove…
      - 20 May 19, 12:40pm -
    • How to Take Control of Sensitive Data in the Cloud
      Do you know how much of your sensitive data is being shared in the cloud? See how Symantec Cloud Access Security Broker (CASB) can help your teams benefit from today’s cloud-based productivity tools, while giving you the visibility and reassuranc…
      - 17 May 19, 4:30pm -
    • Strategies for Managing Compliance and Security in the Cloud
      With breaches on the rise, enterprises are looking to assess the security and compliance risks coming from the cloud. As more and more data is being stored in, and accesible from, cloud applications, how can organization better prepare should the unt…
      - 8 May 19, 12:00pm -

    Imperva

    • newSecurity Leaders Roundtable: Minimizing Supply Chain Attacks
      Recent news of the SolarWinds compromise has highlighted the risk we assume with third-party software supply chains. Attacks targeting accidental zero-day bugs or intentionally malicious backdoors like SUNBURST in our 3rd party code are the new norm.…
      - 11 days ago 4 Feb 21, 6:00pm -
    • newData Privacy: What you need to know in 2021
      Customers, governments, and enterprises have become more sensitive than ever about Personal Identification Information (PII) - where it resides, who has access to it, and what is done with it. As a result, regulatory bodies at all levels of governmen…
      - 4 days ago 28 Jan 21, 6:00pm -
    • newWhere Do We Go From Here? 2021 Security Predictions
      2020 proved to be a year of global disruption on a variety of levels. As a result, IT professionals were forced to quickly reprioritize their approach to cyber and data security. Now in 2021, security leaders must continue to adapt to the changing pu…
      - 2 days ago 26 Jan 21, 6:00pm -
    • Where Do We Go From Here? 2021 Security Predictions
      2020 proved to be a year of global disruption on a variety of levels. As a result, IT professionals were forced to quickly reprioritize their approach to cyber and data security. With 2021 fast approaching, security leaders must continue to adapt to…
      - 40 days ago 15 Dec 20, 6:00pm -
    • Data Breaches Coming Home to Roost in 2021
      Host and Data Security expert Terry Ray predicts that a sea of 2020 data breaches will come home to roost in 2021 due to the significant rise in cyber-attack activity amid the global pandemic.  Some we already know of while countless others have ye…
      - 46 days ago 9 Dec 20, 6:00pm -
    • Modern Applications and Creative Attackers: Application Security in Flux
      The rise of ransom DDoS attacks is just one indication that application security attacks are more complex and targeted than ever. Attacks are now targeting business logic via APIs and microservices, leveraging malicious bots to steal your customers'…
      - 66 days ago 19 Nov 20, 6:00pm -
    • DDoS Attacks: The New Normal, Not Just A Trend
      COVID-19 has made 2020 a year to remember.While the world has been changing around us adapting to the ‘new normal’, so too has the cyber security landscape. Organizations were abruptly forced to adapt to protecting remote workers on a massive…
      - 67 days ago 18 Nov 20, 6:00pm -
    • Virtual fireside chat: The state of data security
      Join us to hear a dynamic conversation between Kunal and Ron as they discuss what’s driving the data security market, give you practical steps to improve your security posture, and provide a peek into what Imperva is doing to help make it simpler f…
      - 74 days ago 11 Nov 20, 6:00pm -
    • Protecting Beyond the OWASP Top 10: Why Analysts Suggest a move to Cloud WAAP
      Application security that only protects against the OWASP top 10 attacks delivers insufficient protection in today’s threat landscape.Join Imperva’s Matt Hathaway, VP of Product Marketing, as we analyze the key insights from the new 2020 Gartner…
      - 75 days ago 10 Nov 20, 6:00pm -
    • Why NIST recognizes RASP to reduce software development risks
      The NIST Cybersecurity Framework standardizes the practices and controls that mitigate constantly evolving cyberthreats and adopted by both government entities as well as global businesses is increasingly becoming the basis of other key industry secu…
      - 95 days ago 21 Oct 20, 5:00pm -
    • Bad Bots are Striking Back and Ruining the Internet
      One in every four web requests is a bad bot looking to hurt your business. From price scraping to credential stuffing, bots are all over your website and mobile app. In today's environment, bad bots are also trying to legitimize their behavior. Data…
      - 30 Sep 20, 5:00pm -
    • Reduce risk and protect critical data to meet CCPA compliance
      The rapid growth of personal data and the simultaneous increase in cyberattacks and breaches is making data security a top priority for businesses around the world driving more stringent data privacy regulations.The California Consumer Privacy Act…
      - 27 Aug 20, 5:00pm -
    • See How Database Visibility and Compliance Can Happen in Minutes
      When it comes to data and databases, security and compliance are essential. Solutions like Amazon Relational Database Service (Amazon RDS) provide built-in security with features including network isolation, data encryption, and automated backups.H…
      - 5 Aug 20, 5:00pm -
    • How to Secure Data After It’s Moved to the Cloud Without You
      Your business is moving data to the cloud without all the security controls mandated for on-prem. After all, the promised economics and business agility are far too attractive for business leaders to ignore. But, attackers are after data, auditors de…
      - 30 Jul 20, 5:00pm -
    • Cybersecurity in healthcare and the impact on compliance
      Healthcare organizations have always been a target for cyberattackers who are out to get their hands on valuable PHI (Protected Health Information). In recent years a number of developments have made cybersecurity even more of a priority for healthca…
      - 22 Jul 20, 5:00pm -
    • Why NIST recognizes RASP to reduce software development risks
      The NIST Cybersecurity Framework standardizes the practices and controls that mitigate constantly evolving cyberthreats and adopted by both government entities as well as global businesses is increasingly becoming the basis of other key industry secu…
      - 1 Jul 20, 8:00pm -
    • Schützen Sie Ihr Unternehmen vor DDoS-Angriffen
      2019 wurde der größte jemals aufgezeichnete DDoS-Angriff verzeichnet. In diesem Webinar lernen Sie die verschiedenen Arten von DDoS-Angriffen kennen, auf welche Branchen und Regionen abgezielt wird und warum Beharrlichkeit zur neuen Norm wird. Ne…
      - 27 May 20, 8:00am -
    • Cloud Database Best Practices: Secure and Audit Ready
      Cloud providers streamline their database-as-a-service (DBaaS) offerings to make adoption as frictionless as possible. But for your programs operating under regulatory mandates, the challenge comes in protecting the privacy and clearing compliance a…
      - 20 May 20, 5:00pm -
    • FinServ Compliance: How to be compliant and resilient in times of disruption
      Disruption exposes vulnerabilities and increases the risk for businesses. COVID-19 is causing major disruption for organizations around the world, not least for financial institutions that are likely to have more at stake in terms of critical assets.…
      - 12 May 20, 2:00pm -
    • Bad Bots are Striking Back and Ruining the Internet
      One in every four web requests is a bad bot looking to hurt your business. From price scraping to credential stuffing, bots are all over your website and mobile app. In today's environment, bad bots are also trying to legitimize their behavior. Data…
      - 5 May 20, 5:00pm -
    • Financial Services: Actionable Practices to Ramp Up Security in Disruptive Times
      The COVID19 environment is causing business disruption on a global scale, forcing industries to quickly adapt to the changing market, which is creating a hotbed of opportunity for cybercrime. The Financial Services sector has always been a prime targ…
      - 28 Apr 20, 2:00pm -
    • Movement to the cloud and security attacks are on the rise
      Insights from the 2020 Cyberthreat Defense ReportEnterprises today are challenged with securing data and applications as they are migrating to the cloud. At the same time, attacks are increasing, IT is understaffed and they are looking for the tool…
      - 16 Apr 20, 5:00pm -
    • Global DDoS Threat Landscape
      2019 saw the biggest DDoS attack ever recorded. In this webinar you will learn about the different types of DDoS attacks, which industries and geographies are being targeted, and why persistence is becoming the new 'norm'.
      - 25 Mar 20, 5:00pm -
    • Top CISO Priorities for 2020
      What are the key areas CISOs are focusing on in 2020 and beyond? From identity management in a multi-cloud world, to protecting assets with encryption and zero trust, to educating DevOps and other teams on security rather than control, to dealing wi…
      - 26 Feb 20, 6:30pm -
    • How Security Enables Business Growth
      As more data is created and collected every day, more users within and outside of your organization are accessing it to create business value. Identifying the security risks without compromising the agility of your business is critical. Join this e…
      - 25 Feb 20, 4:30pm -
    • 2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 20 Feb 20, 7:00pm -
    • 2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 11 Dec 19, 6:00pm -
    • How RASP can easily secure your legacy apps
      While your enterprise is undergoing a digital transformation, your team’s still on the hook for securing legacy apps, as well as apps built with open source and third-party libraries and frameworks. But a problem arises when the resources who wrote…
      - 5 Dec 19, 6:00pm -
    • How RASP can save a struggling Secure SDLC
      Despite countless hours of effort and billions of dollars spent, companies are struggling mightily under their SDLC programs. Prioritizing ever increasing vulnerability backlogs and release delays due to critical security bugs found in the eleventh h…
      - 19 Nov 19, 6:00pm -
    • How FinServ can Balance Digital Transformation, Risk and Compliance
      Market fragmentation, the influx of modern digital solutions by fintechs, and the foray into the banking world by tech giants, are all intensifying competition for financial firms, placing them under immense pressure to adopt cloud technology and tra…
      - 14 Nov 19, 6:00pm -
    • Web Application Firewalls – Critical Trends and Requirements
      As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Join Terry Ray, SVP and Imperva Fellow, as we analyze the key insights from the new 2019 Gartner Magic Quadr…
      - 12 Nov 19, 9:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 5 Nov 19, 7:00pm -
    • Live DDoS Attack: Mitigate then Investigate
      Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live la…
      - 23 Oct 19, 5:00pm -
    • Gain rapid threat protection with automated DDoS and WAF solutions
      Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. A…
      - 9 Oct 19, 6:00pm -
    • Bad Bots, Big Business: The impact of malicious bots on e-commerce sites
      E-Commerce businesses are bombarded with specialized bot attacks—more often than you probably realize. Most IT pros have experienced the craziness and utter chaos that ensues as malicious bots attack with persistence. The lack of visibility, the t…
      - 1 Oct 19, 5:00pm -
    • API Security: Discover Complete Visibility Throughout Your API Endpoints
      Gartner predicts that by 2022, API abuse will become the most frequent attack vector resulting in data breaches for enterprise web applications. Join our API Security Principal Product Manager, Ziv Grinberg and Senior Product Marketing Manager Michae…
      - 18 Sep 19, 5:00pm -
    • Simple Security Licensing For The Cloud Era: Introducing Imperva FlexProtect
      FlexProtect is a simple and predictable way to secure your entire environment whether its on-premises, in the cloud or hybrid.
      - 9 Jul 19, 1:45am -
    • Security Analytics wird begehrteste Lösung (nur auf Englisch verfügbar)
      Wissen Sie, welche Sicherheitsansätze Ihre Peers beim exponentiellen Wachstum von Sicherheitsdaten verfolgen? Sie wissen, dass sich Bedrohungen ständig weiterentwickeln. Aber wissen Sie, wie sich Ihre aktuelle Aufstellung im Bereich der Cybersicher…
      - 20 Jun 19, 5:45pm -
    • Security Analytics(英語版のみ)が最も求められるソリューションに
      セキュリティデータの急増に伴い、同業者がどのようなセキュリティ対策を講じているかご存知ですか? サイバー脅威の環境は絶えず進化を遂げていますが、自社の現在のサイバーセキ…
      - 20 Jun 19, 5:40pm -
    • Die 5 besten Verfahrensweisen für mehrschichtige Verteidigung
      Anwendungen sind das Lebenselixier von Unternehmen, aber sie zu schützen, ist eine massive Herausforderung, die sich mit zunehmender Häufigkeit und Anzahl der Bedrohungen vervielfacht. Angesichts der Probleme, die mit dem Umzug von Anwendungen in d…
      - 18 Jun 19, 10:45pm -
    • アプリケーションを多層防御するための5つのベストプラクティス
      - 14 Jun 19, 5:50pm -
    • Exec Talk: Working With Security Leader, Imperva
      Imperva is evolving to continue to be the defender of your business growth.
      - 11 Jun 19, 5:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 4 Jun 19, 6:00pm -
    • Migrating to the Cloud Safely & Securely - Imperva Part 3
      Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven bus…
      - 23 May 19, 5:00pm -
    • Risk Buydown: Why Data Security is a Must
      With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well…
      - 1 May 19, 6:25pm -
    • Buying Down Risk in the New World of App Development - Imperva Part 2
      In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities…
      - 25 Apr 19, 5:00pm -
    • Security Analytics becomes Most-Wanted Solution
      With exponential growth of security data, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of y…
      - 10 Apr 19, 3:00pm -
    • Best Practices for Mitigating Data Breach Risk - Imperva Part 1
      Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data acce…
      - 28 Mar 19, 5:00pm -
    • Five Best Practices for Application Defense in Depth
      Applications are the lifeblood of enterprise, but protecting them is a massive challenge that multiplies as the rate and volume of threats increase. Layer in the issues associated with moving applications to the cloud, using open source code, impleme…
      - 27 Mar 19, 8:00pm -
    • Cyber Security Battles: How to Prepare and Win
      What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years. Join this interactive Q&…
      - 6 Mar 19, 5:30pm -
    • Top Cybersecurity Trends for 2019
      Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overridin…
      - 19 Dec 18, 6:00pm -
    • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
      Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack…
      - 15 Nov 18, 4:00pm -
    • Security Analytics: How to Identify True Risks to Your Data
      The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage b…
      - 8 Nov 18, 5:00pm -

    Juniper Networks

    Bluecoat

    Thales e-Security

    • The Changing Landscape of Data Security for U.S. Federal Agencies
      With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this…
      - 30 May 19, 6:00pm -
    • Proactive Data Defence for Digital Transformation
      In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.Digital transformation is business enhancing but fraught with danger. With servi…
      - 22 Nov 18, 10:00am -
    • Is Your Retail Data at Risk?
      The retail industry, already at intersection of online with brick-and-mortar, is one of the most heavily targeted for cyber-attacks, and encountering record levels of data breaches as a result. With digital transformation an imperative, dealing with…
      - 6 Nov 18, 7:00pm -
    • Ensuring Data Security in Hybrid and Multi-Cloud Environments
      Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on “cloud” - the biggest growth area of technology investment this year.Companies are increasingly reliant upon multi-cloud or hybrid cloud to meet speci…
      - 18 Oct 18, 9:00am -
    • Nutanix and Thales, Hyerconverged & Hypersecure
      The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements…
      - 26 Sep 18, 6:00pm -
    • Thales eSecurity - CipherTrust Cloud Key Manager
      For virtually every organization today, the adoption of multiple cloud services continues to expand. According to the AlphaWise/Morgan Stanley 2016 Annual CIO Survey of 100 CIOs, by 2020 over 46% of the application workload will move to the public cl…
      - 30 Aug 18, 8:00pm -
    • Tokenization: Ready for Prime Time
      The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats. Individuals and businesses need to combat these thre…
      - 15 Aug 18, 3:00pm -
    • 2018 Data threats - data breaches, digital transformation - and the way forward
      When 451 Research surveyed 1200 IT security professionals, including 400 across Europe, for the 2018 Thales Data Threat Report, we found that today’s threat environment, digital transformation initiatives and regulations are having a deep impact on…
      - 14 Jun 18, 3:00pm -
    • Proactive Data Defence for Digital Transformation
      Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking pl…
      - 23 Mar 18, 10:00am -
    • 2018 Data Threats - What will it take to stop the breaches?
      Digital transformation initiatives and increased threats have put enterprise data at risk more than ever, with 67% already experiencing a breach, and over half of those breaches in the last year. In this webinar Garrett Bekker, Principal Analyst for…
      - 15 Mar 18, 3:00pm -
    • Is Your Business Fit for GDPR?
      With the clock ticking towards May 2018, NOW is the time to ensure you are taking the right steps to protect your organization and your customers in order to be compliant with General Data Protection Regulation (GDPR).Less than a 1/3 companies are p…
      - 9 Jan 18, 7:00pm -
    • Best Practices for GDPR when hosting data off-premises
      GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises. But what does GD…
      - 17 Nov 17, 11:00am -
    • Cifrado transparente. Asegurando la transformación digital
      La nube, IoT, movilidad y big data están reinventando la forma en que operan y hacen negocios las organizaciones. Sin embargo, muchas empresas no han incluido la seguridad como pieza clave de la transformación digital. Conozca porque es necesario p…
      - 28 Sep 17, 3:00pm -
    • Data Security – Identifying Your Last Line of Defense
      Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.Sensitive data…
      - 13 Jul 17, 8:30am -
    • IT Sicherheitsbedrohungen in Deutschland 2017
      Datensicherheitsvorfälle. DSGVO Risiken. Daten in der Cloud, Big Data und das Internet der Dinge (IoT).95% aller deutschen Unternehmen glauben, dass sie nicht ausreichend gegen Cyberangriffe geschützt sindWas erleben Unternehmen in Deutschland…
      - 6 Jul 17, 12:00pm -
    • NY DFS Cybersecurity Regulations - Are You Prepared?
      New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the sec…
      - 15 Jun 17, 4:00pm -
    • Key Management in the world of Multiple Cloud providers
      Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud. Customers need to know if there is a consistent way to handle this across all their cloud services.…
      - 6 Jun 17, 6:00pm -
    • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
      Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of w…
      - 25 May 17, 3:00pm -
    • Data Encryption for the Cloud-First Era
      The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be r…
      - 18 May 17, 5:00pm -
    • Data Protection for IoT – Securing Enterprise Business Intelligence
      The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best…
      - 17 May 17, 3:00pm -
    • 2017 Data Threats – The Big Disconnect
      Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect. In this webinar Andy Kicklighter with Thales e-Security, and four time p…
      - 8 Feb 17, 4:00pm -
    • Protecting Data in line with the Australian Data Breach Notification
      Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities. With cybercrime and…
      - 15 Sep 16, 6:00am -
    • Virtualization Unwrapped – How to Scale While Remaining Secure
      There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/c…
      - 27 Jul 16, 5:00pm -
    • Scalability & Security – Will we always be playing catch-up?
      With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in mo…
      - 9 Jun 16, 4:00pm -
    • Cloud Based Payments: the future of Mobile Payments?
      In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (…
      - 19 May 16, 12:00pm -
    • The Eye of The Security Cyberstorm
      It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust mos…
      - 11 May 16, 5:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 11:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 2:00pm -
    • Making The Migration From EOPS to Vormetric Data Security
      RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
      - 11 Apr 16, 6:00pm -
    • Cloud Payments (HCE): A Simpler Step with Thales HSMs
      Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutio…
      - 13 Jan 16, 3:00pm -
    • How Hyperconverged, Hypersecure Is Your Organization?
      With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexib…
      - 3 Dec 15, 6:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 4:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 9:00am -
    • Applications that go bump in the night
      The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step fur…
      - 12 Mar 15, 5:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments”
      This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experien…
      - 22 Oct 14, 7:00am -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 4:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 1:00pm -
    • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia
      Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tor…
      - 23 Oct 13, 12:00pm -
    • Mobile payments- are you in control?
      Join Entrust and Thales e-Security as we share our practical knowledge of securing mobile payment solutions, underpinned by real-world use cases and proven technology. If mobile payments are important for your future company success please register b…
      - 17 Sep 13, 2:00pm -
    • Data Protection in the Cloud – Whose problem is it really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 12 Dec 12, 7:00pm -
    • Data Protection in the Cloud – Whose Problem Is It Really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 23 May 12, 5:00pm -

    Safenet

    More Product Demos