CISO Express | A Security Professional’s Home Page

Tufin Demos

Palo alto Networks

  • newURL Filtering Best Practices - Las Políticas de Seguridad Web a tu Servicio
    A medida que los atacantes evolucionan, las organizaciones requieren una mayor flexibilidad que va más allá de la categorización binaria tradicional y las políticas para URL. Con el lanzamiento de PanOS 9.0, hemos agregado nuevas y potentes capa…
    - 37 days ago 25 Mar 20, 10:00am -
  • newURL Filtreleme ile İlgili En İyi Uygulamalar
    Saldırganlar yöntemlerini geliştirip ilerledikçe kuruluşlar, URL'ler için geleneksel ikili sınıflandırma ve kuralların ötesinde daha fazla esnekliğe ihtiyaç duyar hale geldi. PanOS'in son sürümü (9.0) ile URL Filtreleme hizmetimize, g…
    - 32 days ago 20 Mar 20, 8:00am -
  • newURL Filtering Best Practice - Come Creare Web Security Policy Funzionali
    Data la rapida evoluzione degli hacker, le aziende necessitano di una maggiore flessibilità che va oltre la tradizionale categorizzazione e policy per URL. Con il rilascio di PanOS 9.0, abbiamo aggiunto nuove capacità potenziate al nostro servizio…
    - 30 days ago 18 Mar 20, 10:00am -

Fireeye

  • newM-Trends 2020: Insights into Today’s Cyber Attacks
    Protect your organization against today’s most dangerous attackers.Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from the M-Trends 2020 Report - our annual publication based on FireEye Ma…
    - 24 days ago 12 Mar 20, 3:00pm -
  • newCloud Security | Tips for Securing the Cloud‎
    For the last several years, organizations across the globe have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their di…
    - 21 days ago 9 Mar 20, 5:00pm -
  • Operationalizing Cyber Threat Intel for Computer Network Defense: Focus on Iran
    Operationalizing Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity matters. Above all, it allows organizations to take a more proactive, structured, and holistic approach to secur…
    - 7 days ago 10 Feb 20, 4:00pm -

Informatica

  • Unlock the Full Power of Cloud Data Integration – Deep Dive and Demo
    Data integration is a core capability for delivering digital transformation and competitive analytics. Next-gen data integration enables you to combine data from various sources with ease of use and scalability. You may be already using many of th…
    - 67 days ago 12 Dec 19, 6:00pm -
  • Optimize Salesforce by Removing Data Barriers Between IT and Campus
    As the Director of Information Systems at Fresno Pacific University, Jeff Jones was charged with optimizing the student information system. Moving from the legacy student information system to Salesforce necessitated the integration of many differen…
    - 74 days ago 5 Dec 19, 6:00pm -
  • AI-Powered Streaming Analytics for Real-Time Customer Experience
    What’s the best way for businesses to differentiate themselves today? By delivering a unique, real-time customer experience across all touch points—one that is based on a solid, connected business strategy driven by data and analytics insights.…
    - 75 days ago 4 Dec 19, 6:00pm -

CA Technologies

  • newWhat's new in Clarity 15.8?
    Stay on top of ways to be innovative and productive with the new capabilities including investment hierarchy enhancements, draw down funding, configurable project cost plans and continued timesheet enhancements
    - 66 days ago 23 Apr 20, 4:00pm -
  • newLow Touch Time Tracking
    Check out the new time tracking in Clarity, which shaves hours of your administrative chores. Easily manage team members' time by quickly reviewing detailed summaries. Add, adjust and approve work on the fly. Use the virtual timesheet to search for t…
    - 38 days ago 26 Mar 20, 4:00pm -
  • newEnhance your Reporting Strategy and take Analysis to the Next Level
    Find out how to jazz up your reports in Clarity PPM with the addition of real-time data charting. Within the Modern UX grids, create your report in a graphical format that enables your audience to visualize relationships between the data.Let the p…
    - 10 days ago 27 Feb 20, 5:00pm -
  • From Projects to Products: A new way to manage business outcomes
    Under pressure by disruptive competitors and discerning customers, more companies are focused on delivering tangible business outcomes. To effectively manage business outcomes, organizations need to transition from traditional project management to p…
    - 88 days ago 21 Nov 19, 6:00pm -
  • Roadmapping Digital Business Outcomes with Clarity PPM
    It’s time to change how we plan in the enterprise. Join this 30-minute demonstration of roadmaps in Clarity PPM to see how they end your organizational fatigue with drag-and-drop planning speed, real-time insight and easy adjustments on the fly.
    - 24 Oct 19, 5:00pm -
  • Why Digital Businesses Require Agile Financial Planning
    Disruptive competitors and discerning customers have companies shifting to agile development practices in order to deliver better customer experiences -- fast and effectively. However, many organizations are finding that traditional planning and exec…
    - 19 Sep 19, 5:00pm -
  • Become a Purpose-Driven Organization
    In today’s fast-paced, disruption-prone markets, it’s not enough to simply optimize for feature delivery. Your entire organization must be aligned around the right outcomes and empowered to achieve them, because velocity and throughput count for…
    - 5 Dec 18, 6:00pm -
  • The State of the Modern PMO 2018
    How well are businesses operating in 2018? Are we delivering on time, on budget? Are we optimizing resources, reducing obstacles? In a recent survey, ProjectManagement.com found that the State of the Modern PMO isn't that modern.Join us to hear the…
    - 29 Nov 18, 6:00pm -
  • How to Use Agile to Engage Employees
    Creating an organization focused on employee happiness is a major step to retaining your employee base, motivating them, and increasing engagement (saving money!). To do this, many organizations are implementing agile across the business and creating…
    - 1 Nov 18, 5:00pm -
  • Managing Resources Across Multiple Projects Made Easy
    Resource management - ensuring projects are given the right people, with the right skills and the right availability to do the job. This is often easier said than done when you lack a single view of what people are doing today and what’s planned f…
    - 30 Oct 18, 10:00am -
  • Portfolio Manager Perfection – is there such a thing?
    At a time when effective portfolio management can make or break an organization’s ability to deliver on strategy, it is vital to understand the different aspects for Portfolio Management. Please join us on September 12th to discuss:•What to loo…
    - 25 Oct 18, 1:00pm -
  • Ask an Agile Expert: Let's Talk Modern Business Management
    Here's your opportunity to Ask the Agile Expert, Laureen Knudsen. Join us for our webinar, "Connect Strategic Planning to Agile Team Execution", on Tuesday, October 9, 10am PT / 1pm ET, and then bring your questions here. During this session, Lau…
    - 17 Oct 18, 5:00pm -
  • Secret to a Successful Digital Transformation
    As digital transformation continues to disrupt businesses, and in particular IT, CIOs are finding themselves having to adapt every element of their portfolios. Whether it’s the internal products and services that support the core business customer…
    - 16 Oct 18, 5:00pm -
  • Virtual Discussion: Ask an Agile Expert
    Here's your opportunity to ask an agile expert! Every organization undergoes different pain points during their agile transformation. We've been a part of many of those transformations, and our experts can offer insights and best practices for your…
    - 16 Oct 18, 9:00am -
  • Connect Strategic Planning to Agile Team Execution
    The most successful companies are closing the chasm between strategy and delivery. To do this, you have to make enterprise-wide visibility the norm, consolidating relevant project data, and linking investments to customer value. You have to serve u…
    - 11 Oct 18, 2:00pm -
  • Building for Portfolio Success
    Today’s organizations are subjected to constant pressure to change. From customer demands to threats from competitors to new technology realities, the only constant is the demand to do more. In this environment organizations can’t just work to…
    - 10 Oct 18, 1:00pm -
  • Connect Strategic Planning to Agile Team Execution
    The most successful companies are closing the chasm between strategy and delivery. To do this, you have to make enterprise-wide visibility the norm, consolidating relevant project data, and linking investments to customer value. You have to serve u…
    - 9 Oct 18, 5:00pm -
  • How to Unlock your Data to Empower your Organization
    The pace of business is accelerating and the difference between market leaders and everyone chasing them is often their ability to make decisions faster than their competition.Integrating a modern BI tool, like Microsoft Power BI, with a market lea…
    - 3 Oct 18, 9:00am -
  • Agile for Happy Organizations
    Are your employees happy? Have you asked them recently? You should. People who are happy at work are more productive. When rolling out agile in an organization, one of the key metrics our agile consultants and coaches encourage companies to measure i…
    - 27 Sep 18, 5:00pm -
  • Project Finances Made Easy
    Finance managers are rarely included in project planning, and if they are involved in the project tracking it is usually in a passive way. At the same time, all stakeholders expect to have the latest project financial situation available on demand an…
    - 25 Sep 18, 4:00pm -
  • Portfolio Manager Perfection – is there such a thing?
    At a time when effective portfolio management can make or break an organization’s ability to deliver on strategy, it is vital to understand the different aspects for Portfolio Management. Please join us on September 12th to discuss:•What to loo…
    - 12 Sep 18, 5:00pm -
  • Managing Resources Across Multiple Projects Made Easy
    Resource management - ensuring projects are given the right people, with the right skills and the right availability to do the job. This is often easier said than done when you lack a single view of what people are doing today and what’s planned f…
    - 6 Sep 18, 5:00pm -
  • Ask an Agile Expert Virtual Discussion
    Here's your opportunity to ask an agile expert. Every organization undergoes different pain points during their agile transformation. We've been a part of many of those transformations, and our experts can offer insights and best practices for your o…
    - 28 Aug 18, 5:00pm -
  • Project Management Made Easy
    Delivering projects on time, under or on budget with the limited resources can be challenging. Often, there are multiple tools to juggle – project management, time management and resource allocation and finally financials. What about those global…
    - 16 Aug 18, 5:00pm -
  • Building for Portfolio Success
    Today’s organizations are subjected to constant pressure to change. From customer demands to threats from competitors to new technology realities, the only constant is the demand to do more. In this environment organizations can’t just work to…
    - 8 Aug 18, 5:00pm -
  • Skalierte Agilität und agile Value Streams mit CA Agile Central
    Mit CA Agile Central kann Ihr gesamtes Unternehmen wie ein leistungsstarkes Team arbeiten. Verknüpfen Sie Strategie und Umsetzung.CA Agile Central zeigt Ihnen, wie Strategie einerseits und Umsetzung und Bereitstellung andererseits zusammenhängen,…
    - 26 Jul 18, 9:00am -
  • The Portfolio Driven Organization
    Portfolio management has become more important in recent years, but for most organizations it’s still a tool they use to support other strategic processes. Industry expert Andy Jordan doesn’t think that’s enough, and in this webinar he explain…
    - 24 Jul 18, 5:00pm -
  • 3 Challenges of Distributed Agile Retrospectives & How to Solve Them
    Of all the Agile practices, none is more foundational than the inspect & adapt cycle of the retrospective. Even if you struggle with every other aspect of Agile, if you consistently engage in productive retrospectives, you will get better. Industry…
    - 19 Jul 18, 5:00pm -
  • CA Agile Central + CA PPM: Linking Investment Planning to Work Orchestration
    As a CA PPM customer, you have a good handle on the work across your portfolio, but what about your agile work specifically? Agile work, and how that work connects to the overall business strategy is extremely important in understanding the value you…
    - 17 Jul 18, 5:00pm -
  • How to Unlock your Data to Empower your Organization
    The pace of business is accelerating and the difference between market leaders and everyone chasing them is often their ability to make decisions faster than their competition.Integrating a modern BI tool, like Microsoft Power BI, with a market lea…
    - 17 Jul 18, 1:30pm -
  • Business Outcome Management – The Undervalued Business Priority
    It’s not enough to say you are focused on achieving business outcomes, you have to actually run your business that wayThere has been a lot of focus recently on shifting the focus of portfolio management from project outputs to business outcomes.…
    - 14 Jun 18, 5:00pm -
  • Time Management for Better Cost Oversight
    Often, time management is seen as “big brother” to individual contributors. However, the information gathered from time entry provides valuable cost oversight to an organization. Not only can accurate time capture help to ensure accurate cost tra…
    - 14 Jun 18, 12:45am -
  • PPM Community Webcast Team Work on Task Boards
    CA PPM Task Boards enable you to create a visual task list in minutes. For each project, set your own process flow, assign staff to tasks and prioritize work. Keep all team members in synch and share your plans with other groups and executives.
    - 13 Jun 18, 11:30pm -
  • Community Webcast Run Eye Opening Reports
    Learn about advanced reporting in CA PPM, including sharing reports, mixing formats and customizing dashboards. Make better decisions with your data.
    - 13 Jun 18, 10:55pm -
  • Webinar Project Management Your Way A New Role Based Experience
    Come and see how the new project manager experience in CA PPM helps you keep team members informed, track down people and remove obstacles to ensure project confidence. Get an up-close view of the new project management capabilities in CA PPM.
    - 13 Jun 18, 10:30pm -
  • PPM Webinar - Modern Resource Mgmt
    Many PPM apps force resource managers to navigate through multiple screens or create workflows just to see what people are working on—rendering the data unreliable. The new CA PPM lets you optimize staff utilization across the entire company with a…
    - 13 Jun 18, 10:10pm -
  • Ask an Agile Expert Virtual Discussion
    Here's your opportunity to ask an agile expert. Every organization undergoes different pain points during their agile transformation. We've been a part of many of those transformations, and our experts can offer insights and best practices for your o…
    - 12 Jun 18, 5:00pm -
  • Certain Uncertainty
    The world is changing more rapidly than ever before and organizations of every size are struggling to remain relevant in the eyes of their customers. The simple fact that the average lifespan of a company has decreased by more than 50 years in the la…
    - 17 May 18, 7:30pm -
  • How Will Future Technologies Like Automation & Blockchain Disrupt PPM Workflows?
    An accessible mobile internet and the app economy changed the way we work over the last decade. Since then we have seen a fast progress in the world of automation, machine learning and data sciences. These new improvements in technology have mobilize…
    - 17 May 18, 7:30pm -
  • Fostering Innovation with Lean Startup and SAFe
    The marketplace is changing so quickly that we need a paradigm shift in how we enable innovation in the large enterprise. When an innovation culture is relegated exclusively to the startup, our biggest brands—those who employ most of the people and…
    - 17 May 18, 6:30pm -
  • Roadmapping: Accelerate Your Innovation
    Most of us are stuck building roadmaps from the ground up, filling out hundreds of required fields just to get started. But there’s a better way. Join Linda Chase, CA PPM Product Manager, to learn how to get alignment between your business goals an…
    - 17 May 18, 6:30pm -
  • How to Keep Robbie the Robot from Taking Your Job
    There are three things that are certain about the future:1) IT has embraced Scrum/Agile as the primary approach to software development2) AI will impact all jobs that have significant reporting and process compliance functions3) Creative human be…
    - 17 May 18, 5:30pm -
  • Agile Portfolio Management: Where Worlds Meet
    In today’s business world the ability to consistently deliver against strategic goals is critical to success. That’s the role of portfolio management, but with strategies continuously evolving in response to new challenges and opportunities, bu…
    - 17 May 18, 5:30pm -
  • A CIO’s Secret Weapon To Building A Customer-Centric Organization
    Join major industry analysts, practitioners, customers, and industry leaders as they explore how CIOs of modern organizations are turning to Agile practices as their digital transformation backbone and operational guide.
Business leaders everywhe…
    - 17 May 18, 4:30pm -
  • The Over-Commitment Trap: Failure Without Even Trying
    Your organization is over committed, Andy Jordan guarantees it. Andy, a globally recognized expert of strategic project delivery discusses this problem with Jim Tisch from CA. He’ll explain why organizations struggle to focus on the key business…
    - 17 May 18, 4:30pm -
  • Agile Business Planning: The New Reality
    Business planning isn’t only occurring more frequently, it’s fundamentally changing. CA’s Jim Tisch is joined by Agile and business performance expert Jesse Fewell to discuss the new realities of business planning. Among the topics they’ll c…
    - 17 May 18, 3:30pm -
  • Modern Business Management: Creating a Built-to-Change Organization
    Transform your entire organization, not just a part of it. Take a modern look now that the world is focusing on business agility rather than thinking about team-level or even scaled Agile. Many people and businesses believe that “doing Agile”…
    - 17 May 18, 3:30pm -
  • Achieve Sustainable Business Agility with Agile Coaching Organizations
    Learn about IHS Markit's Agile Transformation and how they have created a highly effective and impactful Agile Coaching organization that works across silos to enable the company to take firm and confident steps towards business agility.
    - 17 May 18, 2:30pm -
  • Business Agility and the Modern PMO
    Projects deliver outputs, but businesses need outcomes. Today’s PMO must enable that transformation, embracing business agility concepts to deliver consistent achievement of business goals and to drive top down innovation into every area of projec…
    - 17 May 18, 2:30pm -
  • Portfolio Management and Strategic Agility
    Agile management has become necessary to survive, but is it enough to thrive? Many organizations have embraced Agile management on the assumption that if they upgrade existing products and services through cost reductions, time savings or quality enh…
    - 17 May 18, 1:30pm -
  • The Struggle Between Agile and Project Management
    Agile is not a fad, it is a reality. In today’s application economy almost every company is a software company. One of the biggest misconceptions is that Agile is new. However, there is a struggle that seems to be happening between the understan…
    - 17 May 18, 1:30pm -
  • Agile Development’s Impact on Your Project Finances
    With the shift to more agile-based development cycles, the PMO and her counterparts in Finance are faced with new challenges properly tracking capital and operational expenditures in accordance with the law. Sonja Furneaux, a project portfolio consul…
    - 17 May 18, 12:30pm -
  • Make the Business Case for Big Room Planning: Overcome the Quantification Bias
    Many IT and technology companies are scaling agility by introducing Big Room Planning (BRP), or PI Planning (if you’re a SAFe® shop), as a seminal event in their planning calendar. Those who have experienced a BRP know the return realized from gre…
    - 27 Apr 18, 5:00pm -

Tenable

RSA

  • Make Your Incident Response Program A Key Pillar of Your Security Defenses
    It is now well-accepted in security circles that preventive controls are no longer sufficient to defend your organization against today’s cybercriminal-, nation state-, and hacktivist-led attacks. This leaves monitoring and response teams to pick u…
    - 12 Feb 14, 4:00pm -
  • Executive Order 13636: Improving Critical Infrastructure Cyber security
    In the event of a full-scale cyber war, attacks on our critical information systems would pose the greatest risk of damage. The loss of capabilities in places like our banking, communications, and energy sectors would cripple our nation. It is for th…
    - 31 Oct 13, 3:00pm -
  • Maximum-Strength Threat Detection for Mid-Size Enterprises
    Advanced threats today do not discriminate – organizations of all sizes are at risk. The impact of an advanced threat can be as daunting to a smaller enterprise as it is to a larger one but with the additional challenges and constraints of budget a…
    - 1 Aug 13, 11:25am -
  • Improve Your Breach Readiness, Response and Resiliency
    Defending against today’s sophisticated attacks requires a shift in security investments from prevention to a balanced mix of prevention, detection, and response. The challenge is how to make this shift given limited resources and expertise. The…
    - 16 Jul 13, 3:00pm -
  • An Intelligence-Driven SOC: Hear it, See it, Build it
    Today’s IT security threats are multi-faceted, dynamic and stealthy, and who is the most likely target is very hard to predict. Actionable intelligence fed to an agile security operations center (SOC) is critical as many threats cannot be prevented…
    - 2 May 13, 6:00pm -
  • Fighting Advanced Threats with Big Data Analytics
    Organized criminals, nation-state groups, and hacktivists continue to wreak havoc with organizations of all sizes in spite of their security teams’ best efforts. The problem is an over-reliance on antiquated incident management processes, over-dep…
    - 14 Mar 13, 5:00pm -

Arbor Networks

Fortinet

  • FortiClient Trial License
    In this video we will demonstrate how to you can obtain a trial license for FortiClient EMS to Manage 10 Windows, MacOS and Linux endpoints along with 10 Chromebook endpoints.
    - 13 days ago 4 Feb 20, 8:00am -
  • Manage FortiSwitch with FortiGate, FortiOS 6.2
    In this video, we will show you how to manage a FortiSwitch from a FortiGate running FortiOS 6.2.
    - 31 days ago 17 Jan 20, 8:00am -
  • FortiDeceptor SCADA Decoy Demonstration
    In this video you will see the latest SCADA Decoys VM in action in FortiDeceptor.
    - 73 days ago 6 Dec 19, 8:00am -

Logrhythm

  • Cisco + LogRhythm: Smarter, Faster Security Through Integrations
    Smarter, faster security through LogRhythm and Cisco integrationsLogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Manageme…
    - 60 days ago 19 Dec 19, 6:00pm -
  • Webinar: Threat Hunting Overview with 7 Common Hunts
    Dabble or Deep Dive: 7 Different Threat Hunts You Can Do With Available ResourcesIn this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting.…
    - 61 days ago 18 Dec 19, 6:00pm -
  • Optiv / LogRhythm Joint Webinar: Healthcare and Cybersecurity
    In this webinar, Optiv and LogRhythm discuss the current landscape of cybersecurity in the healthcare industry and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do…
    - 62 days ago 17 Dec 19, 6:00pm -

Veracode

  • newHow to Accelerate Open Source Adoption, Not Open Source Risk
    In a recent blinded survey by Red Hat to more than 950 global IT leaders, 69 percent said Open Source Software was very or extremely important to the organisation’s overall enterprise infrastructure software plans. With the advantages of speed, agi…
    - 38 days ago 26 Mar 20, 3:00pm -
  • newPanel Discussion - AppSec in Practice: The View From the Front Lines
    Join this panel discussion between a security expert, a Veracode security program manager, and a Veracode customer to get a true picture of implementing and growing an AppSec program. We’ll discuss the triumphs, pitfalls, and lessons learned from r…
    - 24 days ago 12 Mar 20, 3:00pm -
  • newFix What You Find With Developer Engagement
    AppSec programs fail when developers are not engaged or empowered to fix vulnerabilities and security teams are only incentivized to find vulnerabilities but not to fix them. Too often, security teams dictate rather than partner with development team…
    - 24 days ago 12 Mar 20, 2:00pm -

Whitehat Security

  • Jump Start your Application Security in the Cloud
    New threats emerge as the landscape of the cloud application evolves from more traditional environments. With technology becoming pervasive and new concepts revolutionizing the nature and reach of IT, applications have become central to business stra…
    - 23 Oct 19, 6:00pm -
  • Unbreakable API’s: Best Practices for Application Security Testing
    APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications. In this presentation we will discuss best practices to ensure that APIs have full security coverage, and how teams can f…
    - 25 Sep 19, 6:00pm -
  • Top 10 Application Security Vulnerabilities for Developers
    Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to…
    - 8 Aug 19, 4:00pm -

ZScalar

  • Accelerate the Migration to Microsoft Azure with Zscaler Private Access
    Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends…
    - 5 Jun 18, 5:50pm -
  • Adopting A Zero-Trust Model. Google Did It, Can You?
    Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach…
    - 24 Apr 18, 7:45pm -
  • GDPR - are you ready? Key steps to getting GDPR right
    On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance wi…
    - 13 Mar 18, 9:20pm -

Tufin

Akamai Technologies

AllienVault

  • 5G is Coming, Are You Prepared?
    5G technologies and networks are bringing exciting new possibilities for the enterprise. Prudent organizations are taking a proactive stance by anticipating the security requirements that will come with the new technology. Given the multifaceted natu…
    - 4 days ago 13 Feb 20, 5:00pm -
  • New (and free) analysis tools for the cyber threat hunter
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their…
    - 25 days ago 23 Jan 20, 5:00pm -
  • How to evolve your web and internet security for SD-WAN, Mobility and Cloud
    Today, most organizations rely on cloud apps and services to get work done. Yet, protecting access to the cloud and the broader internet is a growing challenge as workers increasingly want access to your cloud assets from branch offices, mobile devic…
    - 95 days ago 14 Nov 19, 5:00pm -

Bradford Networks

  • Reduce the Mean Time to Incident Response
    Incident Response has always been a complex and time consuming process. It requires Incident Responders to aggregate security, network and endpoint information to find the threat’s presence and reconstruct an accurate picture of its foothold. To mi…
    - 17 Jun 15, 4:00pm -
  • Network Access Control 101: Secure the Critical Edge of Your Network
    As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focu…
    - 2 Jun 15, 5:00pm -
  • Rapid Threat Response 101: An Introduction to Network Sentry/RTR
    Today’s cyber threats are targeted, difficult to detect, and require expertise to contain. They traverse various domains of IT management — making incident response a time consuming and cross-functional challenge. Silos of security and network i…
    - 20 May 15, 5:00pm -

Dell Sonicwall

Fortinet

  • Securing the Future of Industrial Control Systems
    Join this panel discussion to find out how to protect your evolving critical infrastructure systems from the latest wave of cyber threats. Our OT security experts will share deep insights from the latest report and provide use cases for how top-tier…
    - 12 Aug 19, 8:45pm -
  • Threat Similarities Got Us Seeing Double
    Discover valuable insights from this edition of the Threat Landscape Report, such as the growing trend of shared threat infrastructure, increasingly targeted ransomware attacks and the rise of sophisticated attack code.Our senior security strategis…
    - 18 Jul 19, 4:00pm -
  • Accelerating Time to Revenue for Network Service Providers
    Join this webcast, Kevin Beaver, an independent information security consultant and author of security book Hacking For Dummies, along with Fortinet’s Vinod Sundarraj, Senior Director, Service Provider Segment Marketing as they share various consid…
    - 11 Jul 19, 8:05pm -
  • Threat Similarities Got Us Seeing Double
    Discover valuable insights from this edition of the Threat Landscape Report, such as the growing trend of shared threat infrastructure, increasingly targeted ransomware attacks and the rise of sophisticated attack code.Our senior security strategis…
    - 3 Jul 19, 9:05pm -
  • Accelerating SD-WAN Innovation within the Digital Branch Office
    Find out how Fortinet's Security Driven Networking approach completely magnifies the digital business experience for your WAN Edge with paramount networking performance and security.Join us to gain insights into critical use cases, plus how you can…
    - 27 Jun 19, 4:30pm -
  • What Makes Local Government an Enticing Cyber Target
    Discover the tactics cyber criminals are using to steal valuable taxpayer and student data. State government, local government, and educational institutions across the globe are at risk of facing sophisticated attacks if they do not have the proper s…
    - 21 Jun 19, 8:00pm -
  • Simplify Operations with Automation-Driven Network Management
    Find out how an automated approach to your network operations can not only prevent headline grabbing breaches due to the human error factor but simplify managing your infrastructure security. Join us to gain insights into key use cases of how enterpr…
    - 21 Jun 19, 3:20pm -
  • Take Control of IoT
    Watch this panel discussion filmed at the Tech Museum of Innovation in San Jose, where Fortinet’s SVP of Products and Solutions interviews key executives of the recent Bradford Networks acquisition, as well as a partner exec, to discuss how and why…
    - 20 Jun 19, 5:00pm -
  • Accelerating SD-WAN Innovation within the Digital Branch Office
    Find out how Fortinet's Security Driven Networking approach completely magnifies the digital business experience for your WAN Edge with paramount networking performance and security.Join us to gain insights into critical use cases, plus how you can…
    - 17 Jun 19, 5:40pm -
  • Artificial Intelligence Ups the Sandbox Game
    Learn how a sandbox solution with integrated AI capabilities, changes the playing field for threat detection. Our FortiSandbox with AI has been years in the making and our experts will blow you away with the inner workings that allow it to outsmart e…
    - 15 Jun 19, 7:20pm -
  • Reduce the Complexity of Security Operations with Analytics-Powered Security & L
    Find out how you can gain in-depth visibility of anomalies across the entire attack surface, while reducing time to remediate risks with the latest release of FortiAnalyzer 6.2 which delivers powerful automation and analytics-backed visibility with a…
    - 14 Jun 19, 2:05am -
  • Threat Research Truths: Unraveling the Warnings of the Modern Ides of March
    The latest release of the Fortinet Quarterly Threat Landscape Report reveals the most intriguing threat trends uncovered by our dedicated research team, FortiGuard Labs.Join this webinar to gain an in-depth look at which threat trends to keep a wat…
    - 10 Jun 19, 6:00pm -
  • Protecting DevOps Without Impeding Speed and Time to Market
    Join our panel of experts from Fortinet and an ESG Analyst, as they share deep insights about the primary challenges DevOps leaders face. They'll explore reasons why it is not a current priority in most organizations and how the DevOps role is evolvi…
    - 6 Jun 19, 3:35pm -
  • Realizing the Benefits of Gender Diversity in Cybersecurity
    Understand the research behind why women only comprise a small portion of the cybersecurity workforce today, and how that negatively impacts business operations. Our panel of experts will share findings about the affects of a lack of diversity in the…
    - 4 Jun 19, 4:05am -
  • DX Takes Businesses By Storm, Security a Top Concern Per New CISO Study
    Join us to hear from two security leaders, and their interpretation of the takeaways taken from the findings of a new global survey of 300 enterprise CISOs on topics such as security traits and best practices of top-tier security organizations and mu…
    - 31 May 19, 4:00pm -
  • FortiOS 6.2 Global Live Release
    Celebrate the evolution of the Fortinet Security Fabric with the release of FortiOS 6.2, and discover how its 300+ new features expand and enhance your security infrastructure. Don't miss this exciting global event where John Maddison, Executive Vic…
    - 30 May 19, 8:40pm -
  • NAC Transformed: Network Sentry to FortiNAC & Beyond
    Find out how the latest version of FortiNAC provides better visibility, intent-based segmentation, and extends the reach of the Security Fabric. Learn more about what Fortinet has been up to since acquiring Bradford Networks last year and hear from o…
    - 21 May 19, 9:00pm -
  • Triumph Over Business Goals and Robust Security with Intent-Based Segmentation
    Discover how intent-based segmentation can transform your network from a reactive to a proactive security posture.Join our Fortinet technical experts as they discuss the in-depth why and how intent-based segmentation is vital to your overall networ…
    - 7 May 19, 5:00pm -
  • Threat Research Truths: Unraveling the Warnings of the Modern Ides of March
    The latest release of the Fortinet Quarterly Threat Landscape Report reveals the most intriguing threat trends uncovered by our dedicated research team, FortiGuard Labs.Join this webinar to gain an in-depth look at which threat trends to keep a wat…
    - 30 Apr 19, 5:00pm -
  • Threat Research Truths: Unraveling the Warnings of the Modern Ides of March
    The latest release of the Fortinet Quarterly Threat Landscape Report reveals the most intriguing threat trends uncovered by our dedicated research team, FortiGuard Labs.Join this webinar to gain an in-depth look at which threat trends to keep a wat…
    - 22 Apr 19, 7:15pm -
  • In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    Join the discussion and learn about the full advantages of implementing an SD-WAN solution that enables both digital transformation and comes with critical cybersecurity.Our Fortinet experts will guide you through a variety of use cases including h…
    - 19 Mar 19, 4:00pm -
  • Remedy Security Gaps with Automation in Your Multi-Vendor Environment
    Learn how to leverage your existing security investments and Fortinet API's to automate security in your multi-vendor environments spanning the cloud, IoT, data center, and mobile plus additional insights into specific partner-developed integration s…
    - 14 Mar 19, 5:00pm -
  • Detecting Tomorrow’s Threats Today with Mature AI & Machine Learning
    Learn how Fortinet's multiple years of AI and machine learning (ML) capabilities are key to combating and preventing evolving attacks. Processing more than 100 billion security events each day, our expert will review Fortinet's unique understanding…
    - 12 Mar 19, 5:00pm -
  • Achieve SD-WAN Zen With Complete and Balanced Security
    Fortinet was named a Challenger in the first Gartner Magic Quadrant for WAN Edge Infrastructure.Join our expert to learn about insights from the report and how Fortinet SD-WAN weaves both networking and security, providing one offering that is scal…
    - 7 Mar 19, 5:00pm -
  • Maximized Network & Security Value
    Learn how to secure your SMB with the industry's most trusted solutions from Fortinet. Find out how to take advantage of SSL inspection, secure connectivity, and more to secure your SMB. Plus, learn more about the recently released Gartner Magic Qu…
    - 27 Feb 19, 6:00pm -
  • Take Control of IoT
    Watch this panel discussion filmed at the Tech Museum of Innovation in San Jose, where Fortinet’s SVP of Products and Solutions interviews key executives of the recent Bradford Networks acquisition, as well as a partner exec, to discuss how and why…
    - 19 Feb 19, 5:00pm -
  • The Proven & Premier SD-WAN Choice of Hundreds of Global Enterprises
    Join us to bear witness to a once-in-a-lifetime first, executed by NSS Labs and the remarkable advantages Fortinet has been bringing to the market, as the only vendor with security capabilities to receive SD-WAN "Recommended" rating.
    - 12 Feb 19, 5:00pm -
  • Ransomware Solved. Cryptojacking, Next.
    A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.Join our panel of experts for…
    - 4 Feb 19, 5:00pm -
  • DX Takes Businesses By Storm, Security a Top Concern Per New CISO Study
    Join us to hear from two security leaders, and their interpretation of the takeaways taken from the findings of a new global survey of 300 enterprise CISOs on topics such as security traits and best practices of top-tier security organizations and mu…
    - 7 Dec 18, 9:55pm -
  • Top Priorities as New Cyber Threats Plague Healthcare
    Join our FortiGuard Labs expert to learn more about the unique vulnerabilities in the healthcare sector that make it a desired target for hackers, plus some of the surprising reasons of why attacks have skyrocketed in healthcare more than any other v…
    - 20 Sep 18, 4:30pm -
  • How SD-WAN can Unleash Application Performance Without Sacrificing Security
    SD-WAN helps enterprises evolve branch networks, with better performance and cost savings over traditional WANs. And while Gartner notes that SD-WAN products now incorporate internet perimeter security, more than 90% of vendors are not traditional se…
    - 6 Sep 18, 4:00pm -
  • Fighting Cybercrime with A.I.: A Self Evolving Detection System
    Malware has been around since the earliest days of connected computing. While it has evolved quite a bit, our core methods for fighting it have not. Join our webinar to learn more about the history of artificial intelligence dating back to nearly a c…
    - 29 Aug 18, 4:00pm -
  • NSS Labs and Fortinet: Sweeping the SSL Performance for Cloud Access NGFW
    Join our industry experts as they examine the rigorous testing performed by NSS Labs for NGFWs, where Fortinet placed and why performance and security is important when it comes to SSL inspection.
    - 22 Aug 18, 5:30pm -
  • Transforming Security for Digital Education
    FortiGuard 7000 Series offers industry’s best consolidated SSL performance, threat protection that results in lower CapEx & OpEx benefits1.Sharing of threat insight across the entire network to prevent lateral attacks2.Inspection of encrypted tra…
    - 17 Aug 18, 6:10pm -
  • 200+ New Reasons FortiOS 6.0 is the Leading Network Security Operating System
    The security challenges facing organizations today can't be solved with traditional approaches. Digital transformation is creating an unending digital attack surface, point solutions are creating unprecedented complexity, and threats are constantly b…
    - 16 Aug 18, 4:00pm -
  • Soaring Global Cyber Gotchas: Dissecting the Ever-Expanding Threat Landscape
    Join our expert as we look into some of the most effective and crippling threat trends from the last quarter, including a rise in the use of cryptojacking
    - 9 Aug 18, 7:00pm -
  • Battling the Cryptojacking Epidemic & Malware Mutations
    These and other trending vulnerabilities from our Quarterly Threat Report. Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty. Join our fourth installment of in-depth t…
    - 21 Jun 18, 5:00pm -
  • Meet Digital Enterprise Demands with the Latest Edge Security
    Learn how to address always-evolving cyber threats, the ubiquity of encrypted traffic, and the shortage of security professionals with a smaller, but mightier edge firewall.
    - 19 Jun 18, 6:00pm -
  • Securing Digital Business in the Cloud with Microsoft Azure and Fortinet
    Join Microsoft and Fortinet cloud experts as they provide valuable insights into the expanding attack surface and how you can enable efficient, agile computing while leveraging integrated multi-cloud network security and visibility.
    - 14 Jun 18, 5:00pm -
  • Stop Losing Sleep (or Money) Over a Potential Breach
    Today's rapid evolution of threats can be truly frightening. Join this webinar to understand breach technology and the shift that is occurring beyond just detection.
    - 5 Jun 18, 6:00pm -
  • Become an Application & Traffic Hero with Secure SD-WAN
    Learn about the significant benefits of integrated security and network management in one solution plus the 6 most important things to consider when evaluating your SD-WAN options.
    - 31 May 18, 5:00pm -
  • The Impact of GDPR: Even if You're Not in the EU
    While the new law doesn't include a lot of specifics on how to comply, it is clear that personal data needs to be safe at all times. Join this discussion of the implications of the General Data Protection Regulation and how to approach preparations.
    - 24 May 18, 5:00pm -
  • Don't Click This Link
    Find out what you need to know about the phishing phenomenon: consequences, techniques, and how to fight back with one of our leading FortiGuard Labs security strategists, plus the significant role of the human factor.
    - 17 May 18, 5:00pm -

Tripwire

  • Retail Security – Closing The Threat Gap
    Attendees will learn:•How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.•The importance of end point security across your business cr…
    - 12 Jun 14, 6:00pm -
  • How the 20 Controls Address Real Threats
    In this webcast, we will:•Discuss how to translate security information into specific and scalable action•Describe the remediation plan for the controls, starting with the Top 5 •Discuss how the Council on CyberSecurity uses a community app…
    - 11 Jun 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Recovery
    In this webcast we will show:The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organizationHow you can identify your business exposure and what systems are vulnerableHow Tripwire’s solutio…
    - 15 May 14, 9:00am -
  • Insider Threat Kill Chain: Detecting Human Indicators of Compromise
    In this webinar we will: • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem. • Identify risk indicators with employee attitudes and behavior and how it correlates to their…
    - 8 May 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Business Recovery
    In this webcast we will show:1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization2. How you can identify your business exposure and what systems are vulnerable3. How Tripwire’s…
    - 17 Apr 14, 6:00pm -
  • AAA: Getting Roadside Assistance from Tripwire
    Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.In this Q&A-style webcast you will learn:•How to move your PCI efforts from a small tactical implementation to a key critical component of your…
    - 2 Apr 14, 6:00pm -
  • How to Restore Trust After a Breach – Middle East
    Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of t…
    - 13 Mar 14, 8:00am -
  • How to Restore Trust After a Breach – DACH
    Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of…
    - 5 Mar 14, 9:00am -
  • How to Restore Trust After a Breach - UK
    In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you atta…
    - 4 Mar 14, 10:00am -
  • How to Restore Trust After a Breach
    In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How qui…
    - 12 Feb 14, 6:00pm -
  • Preparing for PCI DSS v3.0: Advice from the QSA
    As a former QSA and currently a security analyst at The 451 Research, Adrian Sanabria will share a frank viewpoint of how the new version of Payment Card Industry standard will affect your organization. Join us for this webcast and you will:•Ob…
    - 22 Jan 14, 6:00pm -
  • Vulnerability Voodoo: The Convergence of Foundational Security Controls
    Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire, will discuss:•Integrating Vulnerability Management with other security controls to improve compliance and secur…
    - 17 Dec 13, 6:00pm -
  • PCI DSS 3.0: Don't Shortchange Your PCI Readiness
    Join Jeff Hall, CISSP, CISM, CGEIT, PCI-QSA, PCIP and Senior Security Consultant at FishNet Security and Steve Hall, Director of PCI Solutions at Tripwire, to learn how PCI DSS 3.0 will impact your organization and what you need to do:• Understan…
    - 16 Dec 13, 7:00pm -
  • Reducing Risk Through Effective Vulnerability Management
    Gavin Millard, Tripwire's EMEA Technical Director, will discuss why effective vulnerability management is critical to measuring, managing and reducing your attack surface and how to gain insight from the information Tripwire can provide.Topics cover…
    - 16 Dec 13, 10:00am -
  • 2014 IT Security Budget Mistakes to Avoid
    Often during budget cycles, we’re handed a number – no choice or negotiation – this is just all you get. This year however, there are some positive trends in security budget research from Gartner, IDC, Ponemon, and CEB. This webcast will show…
    - 6 Nov 13, 6:00pm -
  • Avoiding Vulnerability Info Overload: How to Prioritize and Respond to Risk
    Lamar Bailey, Tripwire's Director of the Vulnerability & Exposure Research team will provide you with a better understanding of:- Why is the Tripwire Vulnerability scoring so granular?- How do we arrive at those scores and why not just use CVSS?-…
    - 16 Oct 13, 5:00pm -
  • Using the SANS Top 4 Controls to Measure and Reduce your Attack Surface
    Please accept our apologies for the technical difficulties encountered with this webinar on Monday. This is now due to take place on Friday 4th October.This hour-long webinar, hosted by Gavin Millard, Tripwire's EMEA Technical Director, will discu…
    - 4 Oct 13, 9:00am -
  • Strategic Vulnerability Management: Go Beyond Scanning
    Join Rick Holland, Forrester Senior Analyst, and Edward Smith, Product Marketing Manager at Tripwire, to learn how to go beyond scanning to a strategic vulnerability management program.In this webcast you’ll learn how a strategic VM program can he…
    - 23 Sep 13, 5:00pm -
  • CyberSecurity Awareness and the SANS 20 CSCs
    Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on Cybersecurity, as she shares her thoughts on the rapidly evolving world of cybersecurity.In this webinar, you will learn: * How the Council on CyberSe…
    - 12 Sep 13, 5:00pm -
  • TLC 7.0: Creating Confidence through Improved Log Intelligence
    As Security Management solutions evolve to address today’s environment of complex security threats, the need for a log intelligence layer has emerged to provide high speed analysis and filtering of log and event data.In this webcast, Steve Hall,…
    - 26 Aug 13, 8:00pm -
  • How to Communicate Security Imperatives to the Business
    Global IT executive Jitender Arora and Dwayne Melancon, Tripwire’s CTO, will demonstrate the pitfalls and offer tips and tricks for communicating security initiatives with executives and non-financial stakeholders. In this webcast, you will learn…
    - 7 Aug 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Bryce Schroeder,Systems Engineer Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding your…
    - 25 Jun 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Gavin Millard, EMEA Technical Systems Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding…
    - 18 Jun 13, 9:00am -
  • The Emergence of Enterprise Security Intelligence (AMER)
    Enterprise Security Intelligence (ESI) is defined as an emerging concept that is a comprehensive and holistic alternative to traditional disjointed security approaches that will enable stronger enterprise-wide security, optimal decision making and be…
    - 11 Apr 13, 5:00pm -
  • The Emergence of Enterprise Security Intelligence (EMEA)
    Tripwire’s CTO, Dwayne Melançon, will discuss:• Gartner’s Enterprise Security Intelligence concept and how to utilize it in your security efforts• Practical tips for leveraging security intelligence and how it fits with Tripwire's System…
    - 11 Apr 13, 2:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 27 Mar 13, 10:00am -
  • Tripwire Announcement
    Tripwire general announcement to customers
    - 20 Mar 13, 3:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 20 Feb 13, 6:00pm -
  • I Didn't Know Tripwire Could Do That--The Series Continues
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Bryce Schroeder, Tripwire's Director of Systems Engineering, who will…
    - 12 Feb 13, 6:00pm -
  • I Didnt Know Tripwire Could Do That - Part 2 (EMEA)
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Gavin Millard, EMEA Technical Director, who will walk you through ways…
    - 29 Jan 13, 10:00am -
  • 10 Steps to Risk-Based Security Management
    Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways that do not reflect this commitment. This dichotomy often leads to misplaced effort, spending and r…
    - 4 Dec 12, 3:00pm -
  • I Didnt Know Tripwire Could Do That - EMEA
    The last few releases, Tripwire has added some pretty groundbreaking features as part of the Tripwire VIA platform—the Event Integration Framework, Asset View and Data Mart. Even before that, we’d released our pre-packaged set of high-value secur…
    - 22 Nov 12, 10:00am -
  • "I Didn't Know Tripwire Could Do That!"
    Everyone knows that Tripwire solutions help customers meet compliance mandates and offer best-of-breed FIM. Lately, though, when we demonstrate features and capabilities our users exclaim, “I didn’t know Tripwire could do that!” In this webcast…
    - 14 Nov 12, 6:00pm -
  • 10 Steps to Risk-Based Security Management
    This webcast will provide a simple framework for executing a risk based security management program. This framework is based on some basic tenants about risk based security management:•It creates an environment of informed choice•It strives to…
    - 13 Nov 12, 6:00pm -
  • „Systemausfälle und Downtime reduzieren“
    Der häufigste Grund für Systemausfälle sind Fehlkonfigurationen. Das muss aber nicht so sein. So sagt z.B. ein führender Dienstleister der Automobilbranche: „Mit Tripwire haben wir unsere Downtime um ca. 80% reduziert.“ NTT DATA und Tripwire…
    - 8 Nov 12, 10:00am -
  • Own Your Own Network: Continuous Monitoring
    Continuous monitoring has been defined by NIST and the SANS 20 Critical Security Controls as key to reducing risk in IT environments. Under these definitions, continuous monitoring encompasses at lot of moving parts! Change management, configuration…
    - 19 Oct 12, 5:15pm -
  • Secure Configuration Management Demystified
    The SANS 20 Critical Security Controls recommends Secure Configuration for systems, servers and end points as a third critical control, and secure configuration for network and security devices as a tenth critical control. Tune in as SANS' configurat…
    - 16 Oct 12, 5:50pm -
  • IANS Webcast: Calculating Your Return on Security Investment with Tripwire
    In the world of security, you know first-hand how difficult it can be to quantify the advantages of solutions when there are so many variables at play. Join us and listen in to Diana Kelley, IANS faculty member and analyst and Tripwire customer, Fran…
    - 9 Oct 12, 5:00pm -
  • Connecting Security to the Business
    Information security has entered the boardroom. So, how can CISOs show value to their organization in meaningful ways? In this video we outline the growing problem and Tripwire's solution.
    - 14 Sep 12, 8:40pm -
  • Five Steps for Utilities to Reduce Risk Management Framework Fatigue
    Utilities fear the specter of the NERC auditor, new security legislation on the horizon, and cyber attacks that could shut down systems and services. But risk management framework fatigue has set in, and with so many approaches they don’t know wher…
    - 28 Aug 12, 5:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 27 Jun 12, 2:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 26 Jun 12, 5:00pm -
  • 10 Steps to Better Security Incident Detection
    Organisations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 22 May 12, 1:00pm -
  • Achieving Continuous Monitoring Easily with Security Automation
    With complex, distributed government information systems increasingly under attack from rogue nations, terrorists and cause-driven groups, IT security teams need to get a lead on the state of their systems. In this webcast, learn about an approach to…
    - 17 May 12, 5:00pm -
  • Get more out of SIEM with Change and Configuration Data
    The New 2012 Verizon Data Breach Investigation Report shows that 85% of breaches took weeks or more to discover which is an increase of 6% on last year. There is also an increase on the number of breaches that are being discovered by third parties a…
    - 3 May 12, 12:00pm -
  • 10 Steps to Better Security Incident Detection
    Organizations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 2 May 12, 5:00pm -
  • Reducing Federal Systems Risk with the SANS 20 Critical Controls
    The big news from RSA this year was the announcement out of the Department of Homeland Security (DHS) that U.S. and Canadian government agencies are adopting the SANS 20 Critical Security Controls as a standard. While the Federal Information Systems…
    - 20 Apr 12, 3:50am -
  • Get more out of SIEM with Change and Configuration Data
    Join us for this Lunch and Learn Webcast:Most organizations capture log data that could indicate a breach occurred. Yet not a single breach investigated in the Verizon Data Breach Investigation Report was detected through log analysis or review.…
    - 27 Mar 12, 11:30am -
  • The Metamorphosis: Extracting Business Intelligence from IT Security Data
    It’s been a long time coming: businesses really care about the organization’s state of security. But to make it relevant to business executives, they need up-leveled views of raw security data that don’t require a deep understanding of IT and s…
    - 15 Mar 12, 5:00pm -
  • IT-Security Controls in Deutschland 2011
    IT-Security-Verantwortliche in deutschen Unternehmen wissen, welche Daten sie schützen müssen und kennen die Folgen einer Datenschutzverletzung: Umsatzeinbußen, Reputations- und sogar Jobverlust. Dennoch sind die meisten der Meinung, irgendwann Op…
    - 14 Mar 12, 10:00am -
  • Needle in a Haystack – Getting to Attribution in Control Systems
    The nation’s control systems support critical infrastructure like water treatment plants and the bulk electricity system. When they are compromised, the stakes can be extremely high, potentially even including loss of life. In this webcast, SCADA s…
    - 22 Feb 12, 6:00pm -
  • Where, When and How to Use Real-Time Monitoring
    It's clear to most IT security practitioners that if you only monitor for change through periodic scans, you are probably missing changes that can introduce risk or cause non-compliance. Real-time monitoring seems to offer the panacea by allowing you…
    - 15 Dec 11, 11:00am -
  • GPG13 Compliance: More Than Log Collection and Monitoring
    There is widespread belief that GPG13 compliance can be met by simply logging and monitoring log files. Yet Protective Monitoring Control (PMC) 4 requires a GPG13 solution to detect change and determine its impact upon security. Is it practical to ac…
    - 7 Dec 11, 11:00am -

Bit9

    Guide Point Security

    • Enterprise Security Monitoring: Leaping From Legacy to Leadership
      Advanced cyberattacks are occurring at an astounding rate, with more industries and government entities becoming victims of massive data thefts, damaged brands, public trust issues, as well as billions in lost revenues. One of the primary problems is…
      - 8 Dec 15, 7:00pm -
    • PCI DSS v3.0 and the Evolution of the Self-Assessment Questionnaire
      When the PCI SSC published version 3.0 of the PCI DSS, they revised their complement of Self-Assessment Questionnaires (SAQs) to align with the new standard. Part of the release included three new SAQs that reflect their maturing perspective on the t…
      - 5 Feb 15, 7:00pm -
    • Detecting and Responding More Quickly to Advanced Cyber Attacks
      Most organizations realize it’s no longer a matter of ‘If’ their organization will be breached but ‘When’ (if it hasn’t already happened and they just don’t know it). The key question is ‘How can you gain better visibility, sooner to…
      - 24 Sep 14, 6:00pm -
    • 10 Questions CISOs Should Ask About Mobile Security
      Come join the interactive conversation about factors CISOs should be considering when implementing a mobile security solution. The mobile landscape is changing rapidly, creating new challenges and opportunities for CISOs tasked with balancing busine…
      - 24 Jun 14, 6:00pm -
    • Security Visibility in the Cloud - Logging and Monitoring in AWS
      Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field. Lear…
      - 1 May 14, 6:00pm -

    Kaspersky

    • Mobile Security: What Are The Real World Risks?
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware and malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable targets for mal…
      - 5 Dec 12, 5:00pm -

    Trend Micro

    • Go To The Cloud, Worry-Free
      As you take advantage of the operational and economic benefits of virtualization and the cloud, you need to demonstrate that you can strategize and implement an approach to security that matches the agility and performance they are seeking across the…
      - 24 Oct 18, 7:00pm -
    • Secure your customer’s Office 365 environment with leading security solutions
      Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their s…
      - 16 Aug 18, 6:00pm -
    • ESG Interview on Endpoint Detection Response (EDR)
      An ESG Interview with Steve Duncan, Trend Micro's Product Marketing Manager, on Endpoint Detection and Response (EDR).
      - 25 Jun 18, 7:45pm -
    • Advanced Endpoint Protection (AEP) 2.0 Group Test Results - Trend Micro
      Whether we are talking about the traditional desktop, laptop, or mobile device, the endpoint is always the target of cybercriminal activity. Advanced endpoint protection (AEP) is a disruptive new technology that focuses on preventing cybercriminals f…
      - 5 Jun 18, 3:00pm -
    • Going Beyond Next Generation Security
      The Endpoint Is Not The Battleground - We have seen extensive growth in protection capabilities at the endpoint but is that enough? In this webinar, we will discuss the terminology of “next generation” and explore true end-to-end threat intellige…
      - 30 May 18, 5:50pm -
    • Protecting Against Threats in Office 365
      Although you may not be aware, there are risks passing through your Office 365 environment. Join this webinar to learn more about the phishing, malware, and fraud risks affecting Office 365 email, OneDrive, and SharePoint users.You'll hear from Trend…
      - 17 May 18, 1:05pm -
    • Are You GDPR Compliant?
      GDPR is coming May 25, 2018. Learn what you need to do to prepareand get state-of-the-art security solutions to help with compliance. In this video you will learn:- What is GDPR and its implications- How you can become GDPR compliant- How Trend…
      - 15 May 18, 3:15pm -
    • Going Beyond Next-Gen Endpoint Security, powered by XGen
      Your users are a key source of risk in your organization – they want to work where and how they want. How do you ensure that your corporate information is free from prying eyes and that your users aren’t creating gaps in your security? Trend Mic…
      - 11 May 18, 4:10pm -
    • Go beyond next-gen with XGen Security Explainer Video
      Go beyond next-gen with XGen™ security, a new class of security software that addresses the full range of ever-changing threats—now and in the future. Instead of using separate, siloed security solutions that don’t share information, XGen™ se…
      - 11 May 18, 3:15pm -

    Sophos

    • Data Protection and Compliance: Where Encryption Applies
      Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data. Join Dave Shackleford, IT se…
      - 23 Apr 14, 3:00pm -

    Symantec Information Security

    • Cyber Security Brief: GDPR Special: The Impact of the Regulation One Year On
      In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsen…
      - 29 Aug 19, 8:00am -
    • After the Breach: How to Turn Disaster into Success
      Failure is an essential component of success. Ask any “successful” person and, assuming they’re being honest, they’ll tell you it’s what they learned when things went wrong that proved most valuable of all. That and the grit to pick themsel…
      - 28 Aug 19, 12:50pm -
    • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
      On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behin…
      - 27 Aug 19, 8:00am -
    • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
      On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that ha…
      - 22 Aug 19, 8:00am -
    • Explore the Benefits EDR tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 20 Aug 19, 2:00pm -
    • Cyber Security Brief: Waterbug, “Smart” TVs, and BEC Scam Hits Canadian City
      In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same w…
      - 20 Aug 19, 8:00am -
    • Mobile Security Strategy Best Practices
      As enterprises begin to recognize the need for greater visibility into mobile threats and are increasingly pressed to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify…
      - 15 Aug 19, 5:00pm -
    • Cyber Security Brief: Tube data collected, Baltimore ransomware & BlueKeep
      On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing re…
      - 15 Aug 19, 8:00am -
    • Cyber Security Brief: BlueKeep bug, ransomware “recovery” & GozNym network
      In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of…
      - 13 Aug 19, 8:00am -
    • Cyber Security Brief: Buckeye pre Shadow Brokers leak, IoT security & ransomware
      On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segur…
      - 8 Aug 19, 8:00am -
    • Cloud Workload Assurance: A Journey from visibility to compliance
      Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.In this webinar,…
      - 6 Aug 19, 1:00pm -
    • Cyber Security Brief: Beapy worm, Emotet’s hiding skill & set-top box dangers
      On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data br…
      - 6 Aug 19, 8:00am -
    • Integrating Security Across Your Cloud
      As companies move their applications and operations from on-prem data centers to the cloud, a variety of security concerns become more complex. Applying security controls to servers outside of the physical control of IT means depending on web servi…
      - 5 Aug 19, 1:00pm -
    • Identify, Prioritize, and Remediate Vulnerabilities
      The number of security vulnerabilities discovered over the last few years has rapidly increased. 2018 was a record setting year with a total of 14,760 – more than double the amount from just 2 years earlier. In addition, many of the recent breaches…
      - 1 Aug 19, 1:00pm -
    • Cyber Security Brief: Bayrob convictions, Silk Road 2.0, Alexa listening
      On this week’s Cyber Security Brief podcast, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the p…
      - 1 Aug 19, 8:00am -
    • How to Ensure Your Data is Secure in AWS
      Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations…
      - 31 Jul 19, 1:00pm -
    • How a Managed EDR Analyst Hunts, Investigates, and Remediates an Incident
      Demo Video (8 mins)In this demo, a Symantec Managed Endpoint Detection and Response (MEDR) analyst walks through an end-to-end example of how he:- Creates an automated investigation playbook and hunts for a threat- Demonstrates how he investi…
      - 30 Jul 19, 7:45pm -
    • Cyber Security Brief: Hotel booking privacy, dark marketplace & Mar-a-Lago
      On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an…
      - 29 Jul 19, 9:00am -
    • The Office 365 Dilemma – how secure is secure?
      Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisations race to the cloud they realise that solving the security challenges may not be as straig…
      - 29 Jul 19, 8:00am -
    • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends
      Is your perception of cloud security matching the reality? We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec. Join Clou…
      - 26 Jul 19, 10:00am -
    • Cyber Security Brief: Malware @ Mar-a-Lago, Albany ransomware & Tesla tricked
      On this week’s Cyber Security Brief podcast, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the…
      - 25 Jul 19, 9:00am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 25 Jul 19, 8:00am -
    • The perfect storm: the impact of fragmentation and complexity
      Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to…
      - 23 Jul 19, 1:00pm -
    • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
      On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week –…
      - 23 Jul 19, 8:00am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 22 Jul 19, 9:00pm -
    • Explore the Benefits of Endpoint Detection and Response Tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 18 Jul 19, 5:00pm -
    • Cyber Security Brief: Interview: Neil Jenkins, CAO, Cyber Threat Alliance
      In today’s Cyber Security Brief podcast, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect th…
      - 18 Jul 19, 8:00am -
    • Travel Bookings: Personal Data and Privacy at Risk
      A year has passed since the General Data Protection Regulation (GDPR) came into effect, but new research has found users’ personal data and privacy is still at risk. Symantec found that 67% of hotel and travel websites are leaking guests’ booking…
      - 17 Jul 19, 10:00am -
    • Cyber Security Brief: ISTR Special: Enterprise
      This week’s Cyber Security Brief podcast is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to brin…
      - 16 Jul 19, 8:00am -
    • Next Generation Network Forensics for the Cloud
      The average cost of a breach is US$4 million and continues to increase year on year. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?Join Kar…
      - 11 Jul 19, 5:00pm -
    • Cloud Storage Security Innovations Video
      CWP 4.0 and DLP Integration Video
      - 8 Jul 19, 9:55am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 20 Jun 19, 8:00am -
    • Symantec Cloud & Web Access Security
      As a leader in Cyber Security, Symantec has an integrated set of cloud-delivered gateway services for securing modern enterprise cloud and web access.
      - 13 Jun 19, 10:30pm -
    • Expert Guide to CASB Deployment Success
      There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. Join Steve Riley, a Gartner Senior Director Analyst who focuses on public cloud security, and Eric Andrews, Symantec’s Vice President of Cloud Security, a…
      - 6 Jun 19, 5:00pm -
    • Livestream Video - Proactive Data Privacy and Security
      How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.…
      - 6 Jun 19, 1:00pm -
    • Livestream Video - CISO Challenges and How to Solve Them
      Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking fo…
      - 5 Jun 19, 10:30am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 31 May 19, 12:35pm -
    • Is Your Network Safe From Cyber Threats?
      Do you know what’s lurking in your network? How strong are your defenses against today’s cyber threats? Nothing gives you a better understanding of your security posture than a deep analysis of your historical traffic. Using your own data, Sy…
      - 30 May 19, 5:00pm -
    • Gartner Recommendations for Modern Endpoint Security
      Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response…
      - 30 May 19, 3:20pm -
    • Cyber Security Solutions & Strategies for the Modern Organization
      Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. The old way of fighting cyber-attacks using fragmented tools no longer works. How do organizations adapt thei…
      - 30 May 19, 9:00am -
    • GDPR Turns 1: Is your organization compliant?
      There are countless organizations still working to get their digital houses in order to comply with GDPR and the rules that offer the promise of better governance and further transparency. Join Ramses Gallego, Giampiero Nanni, Damase Tricart, and I…
      - 28 May 19, 9:00am -
    • Il GDPR, un anno dopo...
      Temi del WebinarIl GDPR, il Regolamento Generale sulla Protezione dei Dati, è entrato in vigore un anno fa. Stabilisce una serie di obblighi di notifica che le aziende di tutta Europa devono rispettare in merito a sicurezza informatica e violazione…
      - 22 May 19, 9:00am -
    • RGPD: Panorama un año después
      El Reglamento General de Protección de Datos (RGPD) ya lleva un año en vigor. La nueva normativa impuso una serie de onerosas obligaciones de notificación de filtraciones de datos y de seguridad para organizaciones en toda Europa, así como fuerte…
      - 21 May 19, 1:00pm -
    • GDPR : le point un an après
      - 21 May 19, 9:00am -
    • Insider Threat - Who is the enemy within?
      Client data shared to a personal cloud account? Financial data on a USB drive? An unknowingly hacked password? People don’t generally mean harm. But under GDPR it’s the security breach that matters, not the motivation. See how Symantec Data Lo…
      - 20 May 19, 3:10pm -
    • How to Detect and Protect Sensitive Data
      Have you got the visibility and control you need to detect and protect your GDPR-regulated information? See how Symantec Data Loss Prevention (DLP) uses an information-centric approach to stop your data reaching places it shouldn’t. So you can sh…
      - 20 May 19, 3:05pm -
    • [PANEL] Ensuring Continued Compliance – Data Protection
      Since the rollout of The General Data Protection Regulation (GDPR) in 2018, companies worldwide have had to implement new policies and procedures to protect data. Join leading compliances and security experts as they discuss why data protection is at…
      - 20 May 19, 3:00pm -
    • GDPR: What’s happened in the last year
      The GDPR places a number of onerous cybersecurity and data breach notification obligations for organizations with strong enforcement powers for the data protection authorities. Compliance with GDPR remains as challenging with today’s threat landsca…
      - 20 May 19, 2:00pm -
    • Cloud Workload Protection + Cloud Workload Assurance
      What if security was baked in to your development workflow in a way that didn’t slow you down? Symantec Cloud Workload Protection (CWP), integrates into your DevOps workflows, automating security so you don’t have to think about it. Watch this…
      - 20 May 19, 12:45pm -
    • CloudSoc + Cloud Workload Assurance
      The cloud makes your teams faster and more agile. But they’re leaning on infrastructure as a service faster than you can secure it. With Symantec’s Cloud Security you are able to see who is using the cloud, how they are using the cloud and if y…
      - 20 May 19, 12:45pm -
    • Cloud Workload Assurance
      It’s no news flash that misconfigurations cause the majority of cloud security failures. But how do you prioritize security tasks with your limited resources? Symantec Cloud Workload Assurance minimizes misconfigurations through automated discove…
      - 20 May 19, 12:40pm -
    • How to Take Control of Sensitive Data in the Cloud
      Do you know how much of your sensitive data is being shared in the cloud? See how Symantec Cloud Access Security Broker (CASB) can help your teams benefit from today’s cloud-based productivity tools, while giving you the visibility and reassuranc…
      - 17 May 19, 4:30pm -
    • Strategies for Managing Compliance and Security in the Cloud
      With breaches on the rise, enterprises are looking to assess the security and compliance risks coming from the cloud. As more and more data is being stored in, and accesible from, cloud applications, how can organization better prepare should the unt…
      - 8 May 19, 12:00pm -

    Imperva

    • newTop CISO Priorities for 2020
      What are the key areas CISOs are focusing on in 2020 and beyond? From identity management in a multi-cloud world, to protecting assets with encryption and zero trust, to educating DevOps and other teams on security rather than control, to dealing wi…
      - 10 days ago 26 Feb 20, 6:30pm -
    • newHow Security Enables Business Growth
      As more data is created and collected every day, more users within and outside of your organization are accessing it to create business value. Identifying the security risks without compromising the agility of your business is critical. Join this e…
      - 8 days ago 25 Feb 20, 4:30pm -
    • new2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 4 days ago 20 Feb 20, 7:00pm -
    • 2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 68 days ago 11 Dec 19, 6:00pm -
    • How RASP can easily secure your legacy apps
      While your enterprise is undergoing a digital transformation, your team’s still on the hook for securing legacy apps, as well as apps built with open source and third-party libraries and frameworks. But a problem arises when the resources who wrote…
      - 74 days ago 5 Dec 19, 6:00pm -
    • How RASP can save a struggling Secure SDLC
      Despite countless hours of effort and billions of dollars spent, companies are struggling mightily under their SDLC programs. Prioritizing ever increasing vulnerability backlogs and release delays due to critical security bugs found in the eleventh h…
      - 90 days ago 19 Nov 19, 6:00pm -
    • How FinServ can Balance Digital Transformation, Risk and Compliance
      Market fragmentation, the influx of modern digital solutions by fintechs, and the foray into the banking world by tech giants, are all intensifying competition for financial firms, placing them under immense pressure to adopt cloud technology and tra…
      - 95 days ago 14 Nov 19, 6:00pm -
    • Web Application Firewalls – Critical Trends and Requirements
      As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Join Terry Ray, SVP and Imperva Fellow, as we analyze the key insights from the new 2019 Gartner Magic Quadr…
      - 96 days ago 12 Nov 19, 9:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 5 Nov 19, 7:00pm -
    • Live DDoS Attack: Mitigate then Investigate
      Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live la…
      - 23 Oct 19, 5:00pm -
    • Gain rapid threat protection with automated DDoS and WAF solutions
      Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. A…
      - 9 Oct 19, 6:00pm -
    • Bad Bots, Big Business: The impact of malicious bots on e-commerce sites
      E-Commerce businesses are bombarded with specialized bot attacks—more often than you probably realize. Most IT pros have experienced the craziness and utter chaos that ensues as malicious bots attack with persistence. The lack of visibility, the t…
      - 1 Oct 19, 5:00pm -
    • API Security: Discover Complete Visibility Throughout Your API Endpoints
      Gartner predicts that by 2022, API abuse will become the most frequent attack vector resulting in data breaches for enterprise web applications. Join our API Security Principal Product Manager, Ziv Grinberg and Senior Product Marketing Manager Michae…
      - 18 Sep 19, 5:00pm -
    • Simple Security Licensing For The Cloud Era: Introducing Imperva FlexProtect
      FlexProtect is a simple and predictable way to secure your entire environment whether its on-premises, in the cloud or hybrid.
      - 9 Jul 19, 1:45am -
    • Security Analytics wird begehrteste Lösung (nur auf Englisch verfügbar)
      Wissen Sie, welche Sicherheitsansätze Ihre Peers beim exponentiellen Wachstum von Sicherheitsdaten verfolgen? Sie wissen, dass sich Bedrohungen ständig weiterentwickeln. Aber wissen Sie, wie sich Ihre aktuelle Aufstellung im Bereich der Cybersicher…
      - 20 Jun 19, 5:45pm -
    • Security Analytics(英語版のみ)が最も求められるソリューションに
      セキュリティデータの急増に伴い、同業者がどのようなセキュリティ対策を講じているかご存知ですか? サイバー脅威の環境は絶えず進化を遂げていますが、自社の現在のサイバーセキ…
      - 20 Jun 19, 5:40pm -
    • Die 5 besten Verfahrensweisen für mehrschichtige Verteidigung
      Anwendungen sind das Lebenselixier von Unternehmen, aber sie zu schützen, ist eine massive Herausforderung, die sich mit zunehmender Häufigkeit und Anzahl der Bedrohungen vervielfacht. Angesichts der Probleme, die mit dem Umzug von Anwendungen in d…
      - 18 Jun 19, 10:45pm -
    • アプリケーションを多層防御するための5つのベストプラクティス
      - 14 Jun 19, 5:50pm -
    • Exec Talk: Working With Security Leader, Imperva
      Imperva is evolving to continue to be the defender of your business growth.
      - 11 Jun 19, 5:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 4 Jun 19, 6:00pm -
    • Migrating to the Cloud Safely & Securely - Imperva Part 3
      Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven bus…
      - 23 May 19, 5:00pm -
    • Risk Buydown: Why Data Security is a Must
      With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well…
      - 1 May 19, 6:25pm -
    • Buying Down Risk in the New World of App Development - Imperva Part 2
      In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities…
      - 25 Apr 19, 5:00pm -
    • Security Analytics becomes Most-Wanted Solution
      With exponential growth of security data, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of y…
      - 10 Apr 19, 3:00pm -
    • Best Practices for Mitigating Data Breach Risk - Imperva Part 1
      Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data acce…
      - 28 Mar 19, 5:00pm -
    • Five Best Practices for Application Defense in Depth
      Applications are the lifeblood of enterprise, but protecting them is a massive challenge that multiplies as the rate and volume of threats increase. Layer in the issues associated with moving applications to the cloud, using open source code, impleme…
      - 27 Mar 19, 8:00pm -
    • Cyber Security Battles: How to Prepare and Win
      What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years. Join this interactive Q&…
      - 6 Mar 19, 5:30pm -
    • Top Cybersecurity Trends for 2019
      Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overridin…
      - 19 Dec 18, 6:00pm -
    • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
      Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack…
      - 15 Nov 18, 4:00pm -
    • Security Analytics: How to Identify True Risks to Your Data
      The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage b…
      - 8 Nov 18, 5:00pm -
    • Tech Demo: Key Features for Web Application Firewalls
      Join to better understand key requirements needed in a web application firewall to protect applications and critical data in this changing world of application development and security. This webinar includes:- A detailed explanation of key fea…
      - 17 Oct 18, 3:00pm -
    • Tech Demo: Stop Data Breaches by Securing Along the Breach Kill Chain
      Attackers will continue to attempt to breach and steal sensitive data from organizations. Our goal is to detect those potential breaches as early as possible, before any actual harm is done. There are some early signs of data breaches. By detecting t…
      - 9 Oct 18, 3:00pm -
    • Trends and Challenges in Web Application Firewalls
      As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewa…
      - 3 Oct 18, 8:00pm -
    • Data Breach: How to Identify the Early Signs
      With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early b…
      - 20 Sep 18, 3:00pm -
    • Detect Data Breaches without Alert Fatigue
      Data breaches are difficult to detect because security team is often drowning in alerts.Imperva CounterBreach uses machine learning and analytics to identify suspicious data access and prioritize threats.By distilling millions of alerts, Imperva a…
      - 1 Aug 18, 9:05pm -
    • Infrastructure DDoS Protection Analytics Demo
      In this video, Senior Security Engineer Jonathan Gruber demos Imperva’s enhanced infrastructure DDoS protection analytics. The new dashboard shows details such as top traffic patterns by source, destination IP, port or packet size for a protected n…
      - 1 Aug 18, 4:20pm -
    • Video: Database Compliance and Security Overview
      This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many…
      - 9 Jul 18, 10:25pm -
    • DevOps Security Challenges and Solutions
      What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of clou…
      - 24 Jun 18, 5:00pm -
    • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
      A massive overload of security events.Constant data breaches.Sophisticated threats.Combine these three facts, and you get cumbersome and complicated security-related investigations.Join this webinar to learn how to: • Efficiently manage…
      - 21 Jun 18, 5:00pm -
    • Securing the Cryptocurrency Exchange
      Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attack…
      - 14 Jun 18, 2:00pm -
    • Living in the GDPR World – What Now?
      With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate g…
      - 29 May 18, 4:00pm -
    • Security in the Age of Hybrid Cloud
      The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the…
      - 22 May 18, 5:00pm -
    • The GDPR World Is Upon Us!
      With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mi…
      - 22 May 18, 4:00pm -
    • Video: Imperva Attack Analytics Overview
      Imperva Attack Analytics correlates and distills thousands of security events into a few distinct readable narratives. Attack Analytics employs artificial intelligence and machine learning to make the investigation of application security events easy…
      - 14 May 18, 9:30pm -
    • Combating insider threats and alert fatigue
      Join us for a short discussion and demo, as we provide an overview of how our CounterBreach behavioral analytics uses machine learning and context rich algorithms to identify the proverbial needle in the alert haystack.
      - 9 May 18, 5:00pm -
    • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report
      With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up…
      - 25 Apr 18, 5:00pm -
    • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It?
      The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the…
      - 11 Apr 18, 5:00pm -
    • Protect Your Web Applications from Cryptomining
      Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution AttacksRemote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulner…
      - 28 Mar 18, 5:00pm -
    • Cloud Data Security: Securing Amazon RDS
      Take steps to secure your cloud-deployed databases. Join this live demonstration of how to secure RDS with SecureSphere DAM.
      - 27 Mar 18, 5:30pm -
    • Briefings Part 2: Top Three Ways To Tackle API Security
      Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to prote…
      - 22 Mar 18, 5:00pm -
    • Fighting Cybercrime: Seven Popular DDoS Myths Debunked
      DDoS attacks can be damaging; especially for an online business that depends on valuable client relationships and reliable user experiences. But business organizations aren’t the only targets of malicious web bots. Banking institutions, governments…
      - 21 Mar 18, 7:00pm -
    • Part 1: March of the Bots: How to Deal with the Onslaught
      Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers. Impreva wi…
      - 7 Mar 18, 6:00pm -
    • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 2
      The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than…
      - 30 Jan 18, 6:00pm -

    Juniper Networks

    Bluecoat

    Thales e-Security

    • The Changing Landscape of Data Security for U.S. Federal Agencies
      With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this…
      - 30 May 19, 6:00pm -
    • Proactive Data Defence for Digital Transformation
      In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.Digital transformation is business enhancing but fraught with danger. With servi…
      - 22 Nov 18, 10:00am -
    • Is Your Retail Data at Risk?
      The retail industry, already at intersection of online with brick-and-mortar, is one of the most heavily targeted for cyber-attacks, and encountering record levels of data breaches as a result. With digital transformation an imperative, dealing with…
      - 6 Nov 18, 7:00pm -
    • Ensuring Data Security in Hybrid and Multi-Cloud Environments
      Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on “cloud” - the biggest growth area of technology investment this year.Companies are increasingly reliant upon multi-cloud or hybrid cloud to meet speci…
      - 18 Oct 18, 9:00am -
    • Nutanix and Thales, Hyerconverged & Hypersecure
      The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements…
      - 26 Sep 18, 6:00pm -
    • Thales eSecurity - CipherTrust Cloud Key Manager
      For virtually every organization today, the adoption of multiple cloud services continues to expand. According to the AlphaWise/Morgan Stanley 2016 Annual CIO Survey of 100 CIOs, by 2020 over 46% of the application workload will move to the public cl…
      - 30 Aug 18, 8:00pm -
    • Tokenization: Ready for Prime Time
      The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats. Individuals and businesses need to combat these thre…
      - 15 Aug 18, 3:00pm -
    • 2018 Data threats - data breaches, digital transformation - and the way forward
      When 451 Research surveyed 1200 IT security professionals, including 400 across Europe, for the 2018 Thales Data Threat Report, we found that today’s threat environment, digital transformation initiatives and regulations are having a deep impact on…
      - 14 Jun 18, 3:00pm -
    • Proactive Data Defence for Digital Transformation
      Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking pl…
      - 23 Mar 18, 10:00am -
    • 2018 Data Threats - What will it take to stop the breaches?
      Digital transformation initiatives and increased threats have put enterprise data at risk more than ever, with 67% already experiencing a breach, and over half of those breaches in the last year. In this webinar Garrett Bekker, Principal Analyst for…
      - 15 Mar 18, 3:00pm -
    • Is Your Business Fit for GDPR?
      With the clock ticking towards May 2018, NOW is the time to ensure you are taking the right steps to protect your organization and your customers in order to be compliant with General Data Protection Regulation (GDPR).Less than a 1/3 companies are p…
      - 9 Jan 18, 7:00pm -
    • Best Practices for GDPR when hosting data off-premises
      GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises. But what does GD…
      - 17 Nov 17, 11:00am -
    • Cifrado transparente. Asegurando la transformación digital
      La nube, IoT, movilidad y big data están reinventando la forma en que operan y hacen negocios las organizaciones. Sin embargo, muchas empresas no han incluido la seguridad como pieza clave de la transformación digital. Conozca porque es necesario p…
      - 28 Sep 17, 3:00pm -
    • Data Security – Identifying Your Last Line of Defense
      Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.Sensitive data…
      - 13 Jul 17, 8:30am -
    • IT Sicherheitsbedrohungen in Deutschland 2017
      Datensicherheitsvorfälle. DSGVO Risiken. Daten in der Cloud, Big Data und das Internet der Dinge (IoT).95% aller deutschen Unternehmen glauben, dass sie nicht ausreichend gegen Cyberangriffe geschützt sindWas erleben Unternehmen in Deutschland…
      - 6 Jul 17, 12:00pm -
    • NY DFS Cybersecurity Regulations - Are You Prepared?
      New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the sec…
      - 15 Jun 17, 4:00pm -
    • Key Management in the world of Multiple Cloud providers
      Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud. Customers need to know if there is a consistent way to handle this across all their cloud services.…
      - 6 Jun 17, 6:00pm -
    • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
      Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of w…
      - 25 May 17, 3:00pm -
    • Data Encryption for the Cloud-First Era
      The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be r…
      - 18 May 17, 5:00pm -
    • Data Protection for IoT – Securing Enterprise Business Intelligence
      The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best…
      - 17 May 17, 3:00pm -
    • 2017 Data Threats – The Big Disconnect
      Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect. In this webinar Andy Kicklighter with Thales e-Security, and four time p…
      - 8 Feb 17, 4:00pm -
    • Protecting Data in line with the Australian Data Breach Notification
      Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities. With cybercrime and…
      - 15 Sep 16, 6:00am -
    • Virtualization Unwrapped – How to Scale While Remaining Secure
      There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/c…
      - 27 Jul 16, 5:00pm -
    • Scalability & Security – Will we always be playing catch-up?
      With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in mo…
      - 9 Jun 16, 4:00pm -
    • Cloud Based Payments: the future of Mobile Payments?
      In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (…
      - 19 May 16, 12:00pm -
    • The Eye of The Security Cyberstorm
      It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust mos…
      - 11 May 16, 5:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 11:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 2:00pm -
    • Making The Migration From EOPS to Vormetric Data Security
      RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
      - 11 Apr 16, 6:00pm -
    • Cloud Payments (HCE): A Simpler Step with Thales HSMs
      Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutio…
      - 13 Jan 16, 3:00pm -
    • How Hyperconverged, Hypersecure Is Your Organization?
      With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexib…
      - 3 Dec 15, 6:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 4:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 9:00am -
    • Applications that go bump in the night
      The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step fur…
      - 12 Mar 15, 5:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments”
      This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experien…
      - 22 Oct 14, 7:00am -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 4:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 1:00pm -
    • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia
      Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tor…
      - 23 Oct 13, 12:00pm -
    • Mobile payments- are you in control?
      Join Entrust and Thales e-Security as we share our practical knowledge of securing mobile payment solutions, underpinned by real-world use cases and proven technology. If mobile payments are important for your future company success please register b…
      - 17 Sep 13, 2:00pm -
    • Data Protection in the Cloud – Whose problem is it really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 12 Dec 12, 7:00pm -
    • Data Protection in the Cloud – Whose Problem Is It Really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 23 May 12, 5:00pm -

    Safenet

    More Product Demos