- Insider Threat Kill Chain: Detecting Human Indicators of Compromise
In this webinar we will: • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem. • Identify risk indicators with employee attitudes and behavior and how it correlates to their…
- 8 May 14, 6:00pm - - Heartbleed Outpatient Care: Steps for Secure Business Recovery
In this webcast we will show:1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization2. How you can identify your business exposure and what systems are vulnerable3. How Tripwire’s…
- 17 Apr 14, 6:00pm - - AAA: Getting Roadside Assistance from Tripwire
Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.In this Q&A-style webcast you will learn:•How to move your PCI efforts from a small tactical implementation to a key critical component of your…
- 2 Apr 14, 6:00pm - - How to Restore Trust After a Breach – Middle East
Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of t…
- 13 Mar 14, 8:00am - - How to Restore Trust After a Breach – DACH
Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of…
- 5 Mar 14, 9:00am - - How to Restore Trust After a Breach - UK
In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you atta…
- 4 Mar 14, 10:00am - - How to Restore Trust After a Breach
In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How qui…
- 12 Feb 14, 6:00pm - - Preparing for PCI DSS v3.0: Advice from the QSA
As a former QSA and currently a security analyst at The 451 Research, Adrian Sanabria will share a frank viewpoint of how the new version of Payment Card Industry standard will affect your organization. Join us for this webcast and you will:•Ob…
- 22 Jan 14, 6:00pm - - Vulnerability Voodoo: The Convergence of Foundational Security Controls
Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire, will discuss:•Integrating Vulnerability Management with other security controls to improve compliance and secur…
- 17 Dec 13, 6:00pm - - PCI DSS 3.0: Don't Shortchange Your PCI Readiness
Join Jeff Hall, CISSP, CISM, CGEIT, PCI-QSA, PCIP and Senior Security Consultant at FishNet Security and Steve Hall, Director of PCI Solutions at Tripwire, to learn how PCI DSS 3.0 will impact your organization and what you need to do:• Understan…
- 16 Dec 13, 7:00pm - - Reducing Risk Through Effective Vulnerability Management
Gavin Millard, Tripwire's EMEA Technical Director, will discuss why effective vulnerability management is critical to measuring, managing and reducing your attack surface and how to gain insight from the information Tripwire can provide.Topics cover…
- 16 Dec 13, 10:00am - - 2014 IT Security Budget Mistakes to Avoid
Often during budget cycles, we’re handed a number – no choice or negotiation – this is just all you get. This year however, there are some positive trends in security budget research from Gartner, IDC, Ponemon, and CEB. This webcast will show…
- 6 Nov 13, 6:00pm - - Avoiding Vulnerability Info Overload: How to Prioritize and Respond to Risk
Lamar Bailey, Tripwire's Director of the Vulnerability & Exposure Research team will provide you with a better understanding of:- Why is the Tripwire Vulnerability scoring so granular?- How do we arrive at those scores and why not just use CVSS?-…
- 16 Oct 13, 5:00pm - - Using the SANS Top 4 Controls to Measure and Reduce your Attack Surface
Please accept our apologies for the technical difficulties encountered with this webinar on Monday. This is now due to take place on Friday 4th October.This hour-long webinar, hosted by Gavin Millard, Tripwire's EMEA Technical Director, will discu…
- 4 Oct 13, 9:00am - - Strategic Vulnerability Management: Go Beyond Scanning
Join Rick Holland, Forrester Senior Analyst, and Edward Smith, Product Marketing Manager at Tripwire, to learn how to go beyond scanning to a strategic vulnerability management program.In this webcast you’ll learn how a strategic VM program can he…
- 23 Sep 13, 5:00pm - - CyberSecurity Awareness and the SANS 20 CSCs
Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on Cybersecurity, as she shares her thoughts on the rapidly evolving world of cybersecurity.In this webinar, you will learn: * How the Council on CyberSe…
- 12 Sep 13, 5:00pm - - TLC 7.0: Creating Confidence through Improved Log Intelligence
As Security Management solutions evolve to address today’s environment of complex security threats, the need for a log intelligence layer has emerged to provide high speed analysis and filtering of log and event data.In this webcast, Steve Hall,…
- 26 Aug 13, 8:00pm - - How to Communicate Security Imperatives to the Business
Global IT executive Jitender Arora and Dwayne Melancon, Tripwire’s CTO, will demonstrate the pitfalls and offer tips and tricks for communicating security initiatives with executives and non-financial stakeholders. In this webcast, you will learn…
- 7 Aug 13, 5:00pm - - I Didn't Know Tripwire Owned That!
Join Bryce Schroeder,Systems Engineer Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding your…
- 25 Jun 13, 5:00pm - - I Didn't Know Tripwire Owned That!
Join Gavin Millard, EMEA Technical Systems Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding…
- 18 Jun 13, 9:00am - - The Emergence of Enterprise Security Intelligence (AMER)
Enterprise Security Intelligence (ESI) is defined as an emerging concept that is a comprehensive and holistic alternative to traditional disjointed security approaches that will enable stronger enterprise-wide security, optimal decision making and be…
- 11 Apr 13, 5:00pm - - The Emergence of Enterprise Security Intelligence (EMEA)
Tripwire’s CTO, Dwayne Melançon, will discuss:• Gartner’s Enterprise Security Intelligence concept and how to utilize it in your security efforts• Practical tips for leveraging security intelligence and how it fits with Tripwire's System…
- 11 Apr 13, 2:00pm - - SCM for Dummies
Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
- 27 Mar 13, 10:00am - - Tripwire Announcement
Tripwire general announcement to customers
- 20 Mar 13, 3:00pm - - SCM for Dummies
Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
- 20 Feb 13, 6:00pm - - I Didn't Know Tripwire Could Do That--The Series Continues
After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Bryce Schroeder, Tripwire's Director of Systems Engineering, who will…
- 12 Feb 13, 6:00pm - - I Didnt Know Tripwire Could Do That - Part 2 (EMEA)
After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Gavin Millard, EMEA Technical Director, who will walk you through ways…
- 29 Jan 13, 10:00am - - 10 Steps to Risk-Based Security Management
Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways that do not reflect this commitment. This dichotomy often leads to misplaced effort, spending and r…
- 4 Dec 12, 3:00pm - - I Didnt Know Tripwire Could Do That - EMEA
The last few releases, Tripwire has added some pretty groundbreaking features as part of the Tripwire VIA platform—the Event Integration Framework, Asset View and Data Mart. Even before that, we’d released our pre-packaged set of high-value secur…
- 22 Nov 12, 10:00am - - "I Didn't Know Tripwire Could Do That!"
Everyone knows that Tripwire solutions help customers meet compliance mandates and offer best-of-breed FIM. Lately, though, when we demonstrate features and capabilities our users exclaim, “I didn’t know Tripwire could do that!” In this webcast…
- 14 Nov 12, 6:00pm - - 10 Steps to Risk-Based Security Management
This webcast will provide a simple framework for executing a risk based security management program. This framework is based on some basic tenants about risk based security management:•It creates an environment of informed choice•It strives to…
- 13 Nov 12, 6:00pm - - „Systemausfälle und Downtime reduzieren“
Der häufigste Grund für Systemausfälle sind Fehlkonfigurationen. Das muss aber nicht so sein. So sagt z.B. ein führender Dienstleister der Automobilbranche: „Mit Tripwire haben wir unsere Downtime um ca. 80% reduziert.“ NTT DATA und Tripwire…
- 8 Nov 12, 10:00am - - Own Your Own Network: Continuous Monitoring
Continuous monitoring has been defined by NIST and the SANS 20 Critical Security Controls as key to reducing risk in IT environments. Under these definitions, continuous monitoring encompasses at lot of moving parts! Change management, configuration…
- 19 Oct 12, 5:15pm - - Secure Configuration Management Demystified
The SANS 20 Critical Security Controls recommends Secure Configuration for systems, servers and end points as a third critical control, and secure configuration for network and security devices as a tenth critical control. Tune in as SANS' configurat…
- 16 Oct 12, 5:50pm - - IANS Webcast: Calculating Your Return on Security Investment with Tripwire
In the world of security, you know first-hand how difficult it can be to quantify the advantages of solutions when there are so many variables at play. Join us and listen in to Diana Kelley, IANS faculty member and analyst and Tripwire customer, Fran…
- 9 Oct 12, 5:00pm - - Connecting Security to the Business
Information security has entered the boardroom. So, how can CISOs show value to their organization in meaningful ways? In this video we outline the growing problem and Tripwire's solution.
- 14 Sep 12, 8:40pm - - Five Steps for Utilities to Reduce Risk Management Framework Fatigue
Utilities fear the specter of the NERC auditor, new security legislation on the horizon, and cyber attacks that could shut down systems and services. But risk management framework fatigue has set in, and with so many approaches they don’t know wher…
- 28 Aug 12, 5:00pm - - 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
- 27 Jun 12, 2:00pm - - 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
- 26 Jun 12, 5:00pm - - 10 Steps to Better Security Incident Detection
Organisations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
- 22 May 12, 1:00pm - - Achieving Continuous Monitoring Easily with Security Automation
With complex, distributed government information systems increasingly under attack from rogue nations, terrorists and cause-driven groups, IT security teams need to get a lead on the state of their systems. In this webcast, learn about an approach to…
- 17 May 12, 5:00pm - - Get more out of SIEM with Change and Configuration Data
The New 2012 Verizon Data Breach Investigation Report shows that 85% of breaches took weeks or more to discover which is an increase of 6% on last year. There is also an increase on the number of breaches that are being discovered by third parties a…
- 3 May 12, 12:00pm - - 10 Steps to Better Security Incident Detection
Organizations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
- 2 May 12, 5:00pm - - Reducing Federal Systems Risk with the SANS 20 Critical Controls
The big news from RSA this year was the announcement out of the Department of Homeland Security (DHS) that U.S. and Canadian government agencies are adopting the SANS 20 Critical Security Controls as a standard. While the Federal Information Systems…
- 20 Apr 12, 3:50am - - Get more out of SIEM with Change and Configuration Data
Join us for this Lunch and Learn Webcast:Most organizations capture log data that could indicate a breach occurred. Yet not a single breach investigated in the Verizon Data Breach Investigation Report was detected through log analysis or review.…
- 27 Mar 12, 11:30am - - The Metamorphosis: Extracting Business Intelligence from IT Security Data
It’s been a long time coming: businesses really care about the organization’s state of security. But to make it relevant to business executives, they need up-leveled views of raw security data that don’t require a deep understanding of IT and s…
- 15 Mar 12, 5:00pm - - IT-Security Controls in Deutschland 2011
IT-Security-Verantwortliche in deutschen Unternehmen wissen, welche Daten sie schützen müssen und kennen die Folgen einer Datenschutzverletzung: Umsatzeinbußen, Reputations- und sogar Jobverlust. Dennoch sind die meisten der Meinung, irgendwann Op…
- 14 Mar 12, 10:00am - - Needle in a Haystack – Getting to Attribution in Control Systems
The nation’s control systems support critical infrastructure like water treatment plants and the bulk electricity system. When they are compromised, the stakes can be extremely high, potentially even including loss of life. In this webcast, SCADA s…
- 22 Feb 12, 6:00pm - - Where, When and How to Use Real-Time Monitoring
It's clear to most IT security practitioners that if you only monitor for change through periodic scans, you are probably missing changes that can introduce risk or cause non-compliance. Real-time monitoring seems to offer the panacea by allowing you…
- 15 Dec 11, 11:00am - - GPG13 Compliance: More Than Log Collection and Monitoring
There is widespread belief that GPG13 compliance can be met by simply logging and monitoring log files. Yet Protective Monitoring Control (PMC) 4 requires a GPG13 solution to detect change and determine its impact upon security. Is it practical to ac…
- 7 Dec 11, 11:00am -