CISO Express | A Security Professional’s Home Page

Tufin Demos

Tufin SecureCloud - Cloud Security Assessment

- 15 days ago 28 Jul 20, 5:27pm -
Tufin Vulnerability Mitigation app

- 27 days ago 16 Jul 20, 6:54pm -
Tufin’s Cisco Tetration App Discovery

- 27 days ago 16 Jul 20, 6:35pm -
Intercontinental Exchange Customer Case Study

- 30 days ago 13 Jul 20, 9:14pm -
NIST Compliance - Coalfire and Tufin

- 42 days ago 1 Jul 20, 5:19pm -
Meet ECB PSD2 Network Security Requirements with Tufin

- 44 days ago 29 Jun 20, 10:19pm -

Palo alto Networks

Fireeye

  • newFireEye Helix Explained: Multistage Rules
    Today’s security operations are often disjointed and constrained by limited visibility and false alerts. These issues can cost organizations valuable time, resources and effort, even as they increase the risk of an incident. FireEye Helix enables o…
    - 13 days ago 25 Aug 20, 4:00pm -
  • newOpening the Books on Ghostwriter
    Mandiant Threat Intelligence has identified a broad influence campaign that is closely aligned with Russian security interests. These operations have primarily targeted audiences in Lithuania, Latvia, and Poland with narratives critical of the North…
    - 7 days ago 19 Aug 20, 3:00pm -
  • newMitigate Ransomware Risks With An Enterprise Content Firewall
    When you have to choose between paying a cyber ransom or losing your IP and customer content and taking a hit to your reputation, it’s really no choice at all. Ideally, you should avoid the problem entirely—detect and quarantine incoming files th…
    - 6 hours ago 12 Aug 20, 6:00pm -

Informatica

  • Unlock the Full Power of Cloud Data Integration – Deep Dive and Demo
    Data integration is a core capability for delivering digital transformation and competitive analytics. Next-gen data integration enables you to combine data from various sources with ease of use and scalability. You may be already using many of th…
    - 12 Dec 19, 6:00pm -
  • Optimize Salesforce by Removing Data Barriers Between IT and Campus
    As the Director of Information Systems at Fresno Pacific University, Jeff Jones was charged with optimizing the student information system. Moving from the legacy student information system to Salesforce necessitated the integration of many differen…
    - 5 Dec 19, 6:00pm -
  • AI-Powered Streaming Analytics for Real-Time Customer Experience
    What’s the best way for businesses to differentiate themselves today? By delivering a unique, real-time customer experience across all touch points—one that is based on a solid, connected business strategy driven by data and analytics insights.…
    - 4 Dec 19, 6:00pm -

CA Technologies

  • newScheduling Options within Clarity
    This session will present a high-level comparison of various scheduling options within Clarity and firsthand experiences with Open Workbench (OWB), Microsoft Project Integration ( MSP) & built-in tools. Key areas will be discussed such as: Tool Comp…
    - 92 days ago 12 Nov 20, 5:00pm -
  • newWhat’s New in Clarity 15.9?
    To stay ahead of the competition, it’s wise to not only to stay on top of the competitors in your market, but to stay on top of new capabilities in your software solutions. Clarity releases every quarter and includes numerous enhancements for Tran…
    - 71 days ago 22 Oct 20, 4:00pm -
  • newClarity Modern UX – Adoption Best Practices
    Adopting the Modern UX? Learn best practices from the experts at Broadcom – the Clarity Solution Engineering Team. Provide tools that work the way people do and you’ll get adoption and acceptance. Accuracy and transparency are outcomes of this a…
    - 43 days ago 24 Sep 20, 4:00pm -
  • newIdeation - Easy to Manage with Clarity!
    Generating ideas is an easy task, but prioritizing can take time and to get it right, you need Clarity. Don’t just prioritize your ideas, add supporting financials, tasks and involve other stakeholders. Manage your ideas as they move through the…
    - 15 days ago 27 Aug 20, 4:00pm -
  • newLearn How Clarity Customers Embrace and Adopt the New UX
    Discover how Clarity customers have planned and successfully migrated to the new user interface. Panel includes key industry organizations like Boeing, U.S. Bancorp, Consorsbank and Government of British Columbia. Open discussion around their plannin…
    - 15 days ago 27 Aug 20, 3:00pm -
  • newSee Why Customers Love the New Clarity Experience
    Join power users from Michigan State University, Sky, AbbVie & TDS Telecom for a lively discussion on the benefits of the new Clarity experience, including strategic roadmapping, continuous planning and must-have prioritization. Hear how customers de…
    - 21 hours ago 11 Aug 20, 3:00pm -
  • Keeping a Healthy Program Backlog in Rally (Part 2)
    In part two of the “Keeping a Healthy Program Backlog” series, our presenters will pick up where they left off, sharing what happens beginning in the fifth week after a Big Room Planning event. Now that you’ve created your Program backlog of Fe…
    - 6 days ago 6 Aug 20, 4:00pm -
  • 6 Rally Features You May Not Be Using But Should
    Join Rally's Rusty Lloyd as he discusses his 6 favorite features in Rally that can help reduce complexity in your Agile organization.
    - 13 days ago 30 Jul 20, 4:00pm -
  • Utilizando Clarity para Gestão de OKRs (Using Clarity for OKRs Management)
    Como os OKRs tem ajudado as empresas a prover dircionamento e alinhamento estratégico e tático e como o Clarity PPM pode ajudar a concretizar essa visão.Language: Portuguese
    - 15 days ago 28 Jul 20, 1:00pm -
  • What's New in Clarity 15.8.1
    New capabilities are on the horizon to keep you ahead of the competition via roadmap enhancements with a new set of import tools, configurable grids with benefit plans, field level security on custom investment types, branding that provides the abili…
    - 20 days ago 23 Jul 20, 4:00pm -
  • Rally Quality Management Integrations
    In the 5th and final webinar of the Rally Quality Management series, our presenters will share a number of existing integrations that Rally has with popular external testing tools. Additionally, you will learn how to create your own integrations usin…
    - 27 days ago 16 Jul 20, 4:00pm -
  • Dores e Remédios para Transformação Ágil (Agile Solutions for Enterprises)
    Dores e Remédios para Transformação Ágil em Grandes Empresas. Conheça quais são os desafios enfrentados pelas grandes corporações tradicionais na sua jornada para a agilidade e as diferentes abordagens para combate-los.Language: Portuguese
    - 29 days ago 14 Jul 20, 1:00pm -
  • Clarity: Product Financials Made Easy
    It's now easier than ever to manage product financials in Clarity. Use a familiar grid to fund ideas, work and custom investments. Set up and track both costs and benefits to gauge the ROI of your work. Enjoy a brand new financial management experien…
    - 34 days ago 9 Jul 20, 8:00pm -
  • ValueOps: A Solution Overview
    ValueOps from Broadcom combines our industry-leading Clarity and Rally products to form a powerful digital business and agile management solution. Breaking down the historic silos between business and IT, ValueOps gives companies superior transparenc…
    - 43 days ago 30 Jun 20, 5:05pm -
  • Clarity Strategic Roadmapping
    The fastest way to innovate, Clarity comes with strategic roadmaps that eliminate organizational fatigue, cutting annual planning from weeks to hours. With drag-and-drop speed you craft new ideas with your team. Then add budgets, resources and tasks…
    - 48 days ago 25 Jun 20, 4:00pm -
  • Keeping a Healthy Program Backlog in Rally (Part 1)
    Program Increment or Release big room planning is a critically important and highly visible event. In order to ensure its success, it all begins with creating and maintaining a healthy backlog of features. In part one of this 2-part series, our prese…
    - 49 days ago 24 Jun 20, 4:00pm -
  • Rally Quality Management Metrics
    In part 4 of the Rally Quality Management series, you’ll learn more about the types of metrics Rally has to help you in your Quality Management efforts. We’ll cover some additional applications you can use to track Test Cases, Test Sets and Defec…
    - 55 days ago 18 Jun 20, 5:00pm -
  • Five Things You Need to Know About ValueOps
    ValueOps is a powerful integration of Clarity and Rally software creating an industry-leading Digital Business & Agile Management Solution. Find out how ValueOps can have a substantial impact across your organization by removing the historic silos be…
    - 56 days ago 17 Jun 20, 5:00pm -
  • First Things First: Working with Must-Have Prioritization in Clarity
    With businesses fighting back, you have fewer resources to get the work done – not to mention all the new digital initiatives spawned from the pandemic. Ruthless prioritization is easier said than done when you’re not sure about objectives and ou…
    - 62 days ago 11 Jun 20, 5:00pm -
  • Clarity: Make Ideas Come Alive
    Add budgets and resources to your ideas in the ideation process. It all carries over as ideas turn into real work.
    - 72 days ago 1 Jun 20, 1:45pm -
  • Clarity: Roadmap Strategies to Business Objectives
    Understand how your products perform by aligning strategies to business objectives in Clarity.
    - 72 days ago 1 Jun 20, 1:15pm -
  • Clarity: Organize Your Investments in Hierarchies
    See how Clarity helps you organize investments the way your business actually runs.
    - 72 days ago 1 Jun 20, 12:45pm -
  • Industry Leading Financial Capabilities with Clarity
    Clarity’s financial and planning pages have been redesigned to mimic Microsoft Excel spreadsheets in both look and feel with powerful new capabilities within project cost plans & transactions. Track not only planned and actual costs but units and…
    - 76 days ago 28 May 20, 4:00pm -
  • How Rally is Bringing Industry-Leading Data Privacy to Customers
    Join Rally and IronCore Labs for a 30-minute webinar discussing how the two companies partnered to bring industry-leading data privacy to Rally’s customers. While there is an inherent risk in storing sensitive data in the cloud, Rally is the first…
    - 83 days ago 21 May 20, 4:00pm -
  • Boas práticas para planejamento remoto (Best practices for remote planning)
    Saiba mais sobre boas práticas para planejamento remoto em uso por nossos times de desenvolvimento, e ver como a gestão ágil da Broadcom pode tornar as cerimônias remotas mais colaborativas e eficientes.This is the Portuguese version from the W…
    - 84 days ago 20 May 20, 12:30pm -
  • Prácticas de agilidad para planeación remota- Best practices for remote planning
    Conozca más sobre buenas prácticas para planificación remota utilizadas por nuestros equipos de desarrollo.This is the Spanish version from the Webinar: Agile practices for remote workers.
    - 85 days ago 19 May 20, 5:00pm -
  • From Chaos to Clarity: How to re-plan your investments
    When you get back from the Covid-19 disruption, the first thing you should do is plan for the future. And this time you need a real plan – a plan that’s going to recover your business. That’s going to build resilience, re-engage and re-empower…
    - 90 days ago 14 May 20, 5:00pm -
  • Rally Quality Management: Defects and Defect Suites
    In part 3 of the Rally Quality Management series, you’ll learn how to create, edit, manage and delete Defects and Defect Suites. We’ll show you how to create a hierarchical display of defect suites and their related defects in your selected proje…
    - 90 days ago 14 May 20, 4:00pm -
  • Clarity: A Product Overview
    With Clarity from Broadcom, you can manage your enterprise investments in multi-dimensional hierarchies and name them whatever you want, like products, projects or platforms. Then allocate people, work and money on strategic roadmaps with drag-and-dr…
    - 91 days ago 13 May 20, 11:30pm -
  • Clarity: Digital Product Management in Four Steps
    Organize, map, prioritize and empower. Follow the four steps of Digital Product Management in Clarity.
    - 91 days ago 13 May 20, 11:15pm -
  • Virtual Agility: 24/7 practices for new ways of working
    Agile methods have never been friendly to the idea of distributed teams. Collaboration and face-to-face communication are core principles that date back to the Agile Manifesto, and many agile consultants have included ‘distributed teams’ in their…
    - 91 days ago 13 May 20, 7:30pm -
  • Virtual Agility: Leveraging Rally for New Ways of Working
    A 100% virtual world can seem chaotic at first. But being suddenly remote doesn’t mean that agile methods need to go to the wayside. With the right tools in place, you can enable your organization to adapt to rapid change and empower your employees…
    - 97 days ago 7 May 20, 8:00pm -
  • Prepare for Day One in the New Digital Business
    Because COVID-19 disrupted every aspect of our lives, we need to reassess the fundamentals of our business. There is a need to press the restart button, to create a Day One of the post COVID-19 world. But like a corporate merger, the first day back b…
    - 30 Apr 20, 5:00pm -
  • What's new in Clarity 15.8?
    Stay on top of ways to be innovative and productive with the new capabilities including investment hierarchy enhancements, configurable project cost plans, saved view enhancements, investment board drill downs, staff module configurable in Ideas, fie…
    - 23 Apr 20, 4:00pm -
  • Augmenting Rally Remote PI Planning with Rentouch
    Are your teams prepping for PI Planning using sticky notes, sharpies, spreadsheets, white boards and other tools outside of Rally? Is your organization suddenly completely distributed and struggling with old ways of working? Are you finding that you…
    - 21 Apr 20, 4:00pm -
  • Rally Quality Management: Test Cases & Test Sets
    In part 2 of the Rally Quality Management series, we’ll cover how to create, edit and delete Test Folders, Test Cases and Test Sets. In addition, we’ll demonstrate how to create a hierarchy of test folders so you can organize and group your tests…
    - 16 Apr 20, 2:00pm -
  • Lean Portfolio Management: The Future of Value Delivery
    Within the SAFe® framework, the Lean Portfolio Management (LPM) competency aligns strategy and execution by applying Lean and systems thinking approaches to strategy and investment funding, Agile portfolio operations, and governance. With an increas…
    - 8 Apr 20, 5:00pm -
  • Low Touch Time Tracking
    Check out the new time tracking in Clarity, which shaves hours of your administrative chores. Easily manage team members' time by quickly reviewing detailed summaries. Add, adjust and approve work on the fly. Turn on configurable time sheets to put t…
    - 26 Mar 20, 4:00pm -
  • Using Rally for Remote PI Planning
    Occasionally there are times when companies may restrict business-related travel, which can impact your organization’s Program Increment (PI) Planning, especially if you have remote employees who often travel to participate in-person. In circumstan…
    - 26 Mar 20, 3:00pm -
  • Rally Quality Management Overview
    Welcome to Part 1 of the Rally Quality Management series. The Quality Management page provides you with a single location to organize and manage your test cases into test folders, which is invaluable when planning and organizing your test efforts. In…
    - 18 Mar 20, 2:00pm -
  • Enhance Your Reporting Strategy and Take Analysis to the Next Level
    Find out how to jazz up your reports in Clarity PPM with the addition of real-time data charting. Within the Modern UX grids, create your report in a graphical format that enables your audience to visualize relationships between the data.Let the p…
    - 27 Feb 20, 5:00pm -
  • Who's Watching Your Agile Principles?
    Enterprises seem to love prescriptive solutions. They embrace frameworks and dogma because those things provide simple answers to complex problems. But when it comes to success with agility, prescription is less important that principle.Focusing on…
    - 16 Dec 19, 4:35pm -
  • Collaboration Over Competition in an Agile Environment
    Let's face it; corporate culture has the tendency to be one of competition, which creates tension and divides teams and peers from one another. What if we shifted the culture with persistence and creative practices, so that organizations are inspired…
    - 4 Dec 19, 4:00pm -
  • From Projects to Products: A new way to manage business outcomes
    Under pressure by disruptive competitors and discerning customers, more companies are focused on delivering tangible business outcomes. To effectively manage business outcomes, organizations need to transition from traditional project management to p…
    - 21 Nov 19, 6:00pm -
  • Post-Event Retrospectives at Rally
    As Agilists we all are doing retrospectives with our individual teams (hopefully) and perhaps at the program level as well. However are we doing retrospectives on production ‘events’ for our product(s)? For example your product has an outage, do…
    - 20 Nov 19, 3:30pm -
  • Roadmapping Digital Business Outcomes with Clarity PPM
    It’s time to change how we plan in the enterprise. Join this 30-minute demonstration of roadmaps in Clarity PPM to see how they end your organizational fatigue with drag-and-drop planning speed, real-time insight and easy adjustments on the fly.
    - 24 Oct 19, 5:00pm -
  • Why Digital Businesses Require Agile Financial Planning
    Disruptive competitors and discerning customers have companies shifting to agile development practices in order to deliver better customer experiences -- fast and effectively. However, many organizations are finding that traditional planning and exec…
    - 19 Sep 19, 5:00pm -
  • Become a Purpose-Driven Organization
    In today’s fast-paced, disruption-prone markets, it’s not enough to simply optimize for feature delivery. Your entire organization must be aligned around the right outcomes and empowered to achieve them, because velocity and throughput count for…
    - 5 Dec 18, 6:00pm -
  • The State of the Modern PMO 2018
    How well are businesses operating in 2018? Are we delivering on time, on budget? Are we optimizing resources, reducing obstacles? In a recent survey, ProjectManagement.com found that the State of the Modern PMO isn't that modern.Join us to hear the…
    - 29 Nov 18, 6:00pm -
  • How to Use Agile to Engage Employees
    Creating an organization focused on employee happiness is a major step to retaining your employee base, motivating them, and increasing engagement (saving money!). To do this, many organizations are implementing agile across the business and creating…
    - 1 Nov 18, 5:00pm -
  • Managing Resources Across Multiple Projects Made Easy
    Resource management - ensuring projects are given the right people, with the right skills and the right availability to do the job. This is often easier said than done when you lack a single view of what people are doing today and what’s planned f…
    - 30 Oct 18, 10:00am -
  • Portfolio Manager Perfection – is there such a thing?
    At a time when effective portfolio management can make or break an organization’s ability to deliver on strategy, it is vital to understand the different aspects for Portfolio Management. Please join us on September 12th to discuss:•What to loo…
    - 25 Oct 18, 1:00pm -
  • Ask an Agile Expert: Let's Talk Modern Business Management
    Here's your opportunity to Ask the Agile Expert, Laureen Knudsen. Join us for our webinar, "Connect Strategic Planning to Agile Team Execution", on Tuesday, October 9, 10am PT / 1pm ET, and then bring your questions here. During this session, Lau…
    - 17 Oct 18, 5:00pm -

Tenable

  • newMicrosoft’s August 2020 Patch Tuesday Addresses 120 CVEs (CVE-2020-1337)

    Microsoft’s August 2020 Patch Tuesday  Addresses 120 CVEs (CVE-2020-1337)

    Microsoft patched 120 CVEs in August, marking the sixth month in a row of addressing over 100 CVEsMicrosoft, for the sixth month in a row, patched over 100 CVEs in the August 2020 Patch Tuesday release, including 17 CVEs rated critical. For the firs…
    - 16 hours ago 11 Aug 20, 7:54pm -
  • Zero-Day Remote Code Execution Vulnerability in vBulletin Disclosed

    Zero-Day Remote Code Execution Vulnerability in vBulletin Disclosed

    Researcher identifies a zero-day vulnerability that bypasses a fix for CVE-2019-16759, a previously disclosed remote code execution vulnerability in vBulletin. Attacks have already been observed in the wild.Update August 10, 2020: The Solutions sect…
    - 2 days ago 10 Aug 20, 10:03pm -
  • Aligning Cybersecurity and Business: Nobody Said It Was Easy

    Aligning Cybersecurity and Business: Nobody Said It Was Easy

    The bad news? There's a disconnect between business and cybersecurity. The good news? Aligning them can make all the difference.If you’ve served as a CISO, CSO or other cybersecurity leader for any length of time, you’ve likely had a CEO, board…
    - 7 days ago 5 Aug 20, 12:45pm -
  • Ripple20: More Vulnerable Devices Discovered, Including New Vendors

    Ripple20: More Vulnerable Devices Discovered, Including New Vendors

    A partnership between Tenable and JSOF continues to uncover additional devices vulnerable to Ripple20.BackgroundOn June 16, researchers from JSOF research lab disclosed a set of 19 vulnerabilities, dubbed “Ripple20”, which could impact millions…
    - 8 days ago 4 Aug 20, 6:53pm -
  • Why Accidental Convergence Requires Purposeful Industrial Security

    Why Accidental Convergence Requires Purposeful Industrial Security

    The digital “air gap” is no longer a viable strategy when it comes to securing industrial environments. Here are the safeguards you need to protect against threats across the converged IT/OT landscape.Modern-day industrial and critical infrastru…
    - 8 days ago 4 Aug 20, 5:27pm -
  • Conversational Kotlin: A Look at the Benefits of Readable Code

    Conversational Kotlin: A Look at the Benefits of Readable Code

    In the latest blog from Engineering@Tenable, we explore how the goal of readable code can help engineering teams minimize errors and expedite software updates.It’s probably a safe assumption that most software engineers, on multiple occasions, hav…
    - 13 days ago 30 Jul 20, 4:29pm -
  • CVE-2020-10713: “BootHole” GRUB2 Bootloader Arbitrary Code Execution Vulnerability

    CVE-2020-10713: “BootHole” GRUB2 Bootloader Arbitrary Code Execution Vulnerability

    Recently disclosed vulnerability in GRUB2 bootloader dubbed “BootHole” could allow an attacker to gain silent malicious persistence by attacking the GRUB2 config file, grub.cfg.BackgroundOn July 29, researchers at Eclypsium disclosed a high sev…
    - 14 days ago 29 Jul 20, 11:59pm -
  • How to Build the Most Effective Information Security Framework

    How to Build the Most Effective Information Security Framework

    Build a comprehensive defense against cyberattacks with a strong information security framework that leverages the world's best standards and infosec tools. A term like "information security framework" can be interpreted in many different ways, and…
    - 14 days ago 29 Jul 20, 9:04pm -
  • Tenable Earns SC Media’s Highest Rating for Risk-Based Vulnerability Management

    Tenable Earns SC Media’s Highest Rating for Risk-Based Vulnerability Management

    SC Media recently conducted comprehensive product reviews of Tenable.io and Tenable Lumin, assessing them based on SC Labs’ standards of overall performance, ease of use, features, documentation, support and value for the money.We’re proud to an…
    - 16 days ago 27 Jul 20, 4:59pm -
  • CISA / NSA Alert AA20-205A

    CISA / NSA Alert AA20-205A

    What Every OT Professional Needs To KnowToday’s joint alert from the NSA and CISA about malicious activity targeting operational technology (OT) and critical infrastructure should be taken very seriously. Don’t be fooled — this isn’t a warnin…
    - 19 days ago 24 Jul 20, 8:22pm -

RSA

  • Make Your Incident Response Program A Key Pillar of Your Security Defenses
    It is now well-accepted in security circles that preventive controls are no longer sufficient to defend your organization against today’s cybercriminal-, nation state-, and hacktivist-led attacks. This leaves monitoring and response teams to pick u…
    - 12 Feb 14, 4:00pm -
  • Executive Order 13636: Improving Critical Infrastructure Cyber security
    In the event of a full-scale cyber war, attacks on our critical information systems would pose the greatest risk of damage. The loss of capabilities in places like our banking, communications, and energy sectors would cripple our nation. It is for th…
    - 31 Oct 13, 3:00pm -
  • Maximum-Strength Threat Detection for Mid-Size Enterprises
    Advanced threats today do not discriminate – organizations of all sizes are at risk. The impact of an advanced threat can be as daunting to a smaller enterprise as it is to a larger one but with the additional challenges and constraints of budget a…
    - 1 Aug 13, 11:25am -
  • Improve Your Breach Readiness, Response and Resiliency
    Defending against today’s sophisticated attacks requires a shift in security investments from prevention to a balanced mix of prevention, detection, and response. The challenge is how to make this shift given limited resources and expertise. The…
    - 16 Jul 13, 3:00pm -
  • An Intelligence-Driven SOC: Hear it, See it, Build it
    Today’s IT security threats are multi-faceted, dynamic and stealthy, and who is the most likely target is very hard to predict. Actionable intelligence fed to an agile security operations center (SOC) is critical as many threats cannot be prevented…
    - 2 May 13, 6:00pm -
  • Fighting Advanced Threats with Big Data Analytics
    Organized criminals, nation-state groups, and hacktivists continue to wreak havoc with organizations of all sizes in spite of their security teams’ best efforts. The problem is an over-reliance on antiquated incident management processes, over-dep…
    - 14 Mar 13, 5:00pm -

Arbor Networks

NETSCOUT Arbor and Optical Networks Alliance for DDoS protection in Peru

- 6 Mar 18, 9:40pm -
Alianza NETSCOUT Arbor y Optical Networks para protección anti-DDoS en Peru

- 28 Feb 18, 9:54pm -
Aliança NETSCOUT Arbor e Optical Networks para proteção anti-DDoS no Peru.

- 28 Feb 18, 4:26pm -
A explosão dos ataques DDoS

- 25 Sep 17, 3:54pm -
Botnets de IoT e ataques DDoS: O jogo mudou

- 25 Sep 17, 3:50pm -
Don't Check The Box - Quando se trata de defesa contra DDoS, não basta marcar a caixa

- 25 Sep 17, 3:48pm -

Fortinet

Logrhythm

  • Closing the Critical Skills Gap for Modern and Effective SOCs
    Any successful security operations center (SOC) will combine skilled people, effective processes and efficient technology. Previous SANS surveys have shown that the skills of the people are the prime prerequisite to enable organizations to define cri…
    - 13 days ago 30 Jul 20, 3:00am -
  • Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
    In this webcast, SANS reviews findings from a recent report, providing expert guidance to help cyber defense professionals learn how to best leverage the MITRE ATT&CK Framework to improve their organization’s security posture.The Adversarial Tact…
    - 21 days ago 22 Jul 20, 1:25am -
  • Securing Telemedicine: The Current Landscape and Future Risks
    The healthcare industry already faces a number of unique challenges and threats. The data that these organizations collect includes extremely sensitive — and therefore valuable — information, making those organizations a target among cyberattacke…
    - 34 days ago 9 Jul 20, 3:45pm -

Veracode

  • newHow to... Reduce Security Debt With Frequent Scanning
    Security Debt is similar to credit card debt in that it gains interest (risk) the longer you wait to pay it off through flaw remediation, leaving your applications exposed to potential breaches and attacks. But there’s good news: we know from our 1…
    - 27 days ago 8 Sep 20, 2:00pm -
  • newHow to... Reduzieren von Sicherheitsschulden durch häufiges Scannen
    Sicherheitsschulden ähneln Kreditkartenschulden dahingehend, dass sie Zinsen (Risiken) erhalten, je länger Sie auf die Rückzahlung durch Fehlerbehebung warten, sodass Ihre Anwendungen potenziellen Verstößen und Angriffen ausgesetzt sind. Aber es…
    - 22 days ago 3 Sep 20, 9:00am -
  • newHow to.. Permitir a los Desarrolladores Encontrar y Corregir Vulnerabilidades
    Con el esfuerzo incesante de desarrollar un buen código de forma regular, los desarrolladores necesitan las herramientas y los procesos adecuados a mano para poder satisfacer la demanda, sin sacrificar la calidad de su código. Mire este video para…
    - 20 days ago 1 Sep 20, 9:00am -

Whitehat Security

  • Reduce API Security Risks with Automated and Continuous API Scanning
    Digital businesses have widespread API usage that makes it easier for organizations to share data and integrate with customer applications. However, since APIs expose application logic and sensitive data such as Personally Identifiable Information (P…
    - 28 days ago 15 Jul 20, 5:00pm -
  • Detecting and Defending Against Server-Side Request Forgery
    Today’s web applications help us stay connected and are more than likely dependent on other services. This means that most web applications will utilize a server that sends off HTTP requests in order to receive the information that drives its conte…
    - 10 Mar 20, 5:00pm -
  • Mobile Security App-titude: Best Practices for Secure App Design and Data Privac
    Join us on a journey to secure the personally-identifiable information (PII) data you collect in your mobile applications.-Consider which points of data you are collecting and why?-Does your app really need all that data?-Is the gathered data sec…
    - 25 Feb 20, 6:00pm -

ZScalar

  • Accelerate the Migration to Microsoft Azure with Zscaler Private Access
    Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends…
    - 5 Jun 18, 5:50pm -
  • Adopting A Zero-Trust Model. Google Did It, Can You?
    Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach…
    - 24 Apr 18, 7:45pm -
  • GDPR - are you ready? Key steps to getting GDPR right
    On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance wi…
    - 13 Mar 18, 9:20pm -

Tufin

  • newSecureCloud Webinar: Cloud-Native Security without Compromise
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and mo…
    - 49 days ago 30 Sep 20, 6:00am -
  • newSecureCloud Webinar: Cloud-Native Security without Compromise
    Securing your cloud environment should not mean sacrificing the speed and agility of cloud application development and operations.In this webinar, learn how security teams using SecureCloud can accelerate a company’s digital transformation and mo…
    - 48 days ago 29 Sep 20, 3:00pm -
  • newTechTalk: Solutions for Creating & Enforcing Policies for Kubernetes Flows
    Are you looking for an effective and automated way to secure Kubernetes deployments and automate security across your hybrid network? Watch this webinar to learn how you can use Tufin solutions to establish your firewalls as a second layer of defense…
    - 43 days ago 24 Sep 20, 6:00am -

Akamai Technologies

¿Qué es el Credential Stuffing?

- 5 days ago 7 Aug 20, 1:45pm -
Akamai Enterprise Application Access: Simple and Secure Identity-Aware Access

- 6 days ago 6 Aug 20, 8:03pm -
Akamai Enterprise Threat Protector: Proactive Security

- 6 days ago 6 Aug 20, 5:42pm -
Qu'est-ce que le « credential stuffing » ?

- 8 days ago 4 Aug 20, 1:36pm -
Credential Stuffing とは?

- 8 days ago 4 Aug 20, 1:27pm -
크리덴셜 스터핑이란?

- 8 days ago 4 Aug 20, 1:22pm -

AllienVault

  • newHow to evolve your web and internet security for SD-WAN, Mobility and Cloud
    Today, most organizations rely on cloud apps and services to get work done. Yet, protecting access to the cloud and the broader internet is a growing challenge as workers increasingly want access to your cloud assets from branch offices, mobile devic…
    - 29 days ago 10 Sep 20, 3:00pm -
  • newNew (and free) analysis tools for the cyber threat hunter
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their…
    - 22 days ago 3 Sep 20, 3:00pm -
  • newHow to manage access control with Zero Trust
    A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO)Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing th…
    - 1 day ago 13 Aug 20, 3:00pm -

Bradford Networks

  • Reduce the Mean Time to Incident Response
    Incident Response has always been a complex and time consuming process. It requires Incident Responders to aggregate security, network and endpoint information to find the threat’s presence and reconstruct an accurate picture of its foothold. To mi…
    - 17 Jun 15, 4:00pm -
  • Network Access Control 101: Secure the Critical Edge of Your Network
    As the volume and diversity of mobile devices on your network continue to rise, so does the need to ensure that every device is safe. Cybercriminals leverage vulnerable endpoints as backdoors to the network and according to Gartner "by 2017, the focu…
    - 2 Jun 15, 5:00pm -
  • Rapid Threat Response 101: An Introduction to Network Sentry/RTR
    Today’s cyber threats are targeted, difficult to detect, and require expertise to contain. They traverse various domains of IT management — making incident response a time consuming and cross-functional challenge. Silos of security and network i…
    - 20 May 15, 5:00pm -

Dell Sonicwall

  • newYour Inbox Is For Sale: How Attackers Are Monetizing Your Email on the Dark Web
    You probably know there are attackers willing to pay for access to your inbox. But did you know there are groups so sure they can gain access to your accounts that they offer a money-back guarantee? Join SonicWall’s Ken Dang as he explores the so…
    - 8 days ago 20 Aug 20, 5:00pm -
  • Conversations with a Ransomware Developer
    The boundaries of your organization are borderless and expand to limitless endpoints and networks.Join us to get an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, e…
    - 92 days ago 12 May 20, 7:00pm -
  • Mindhunter: Confessions of a Ransomware Developer
    Join SonicWall security expert Brook Chelmo for an update on one of last year’s most popular cybersecurity stories, as he recaps his ongoing conversations with a Russian ransomware cell and details how it’s grown. You’ll get an inside look at t…
    - 99 days ago 5 May 20, 6:00pm -

Fortinet

  • 4 Key Ingredients for Endpoint Resilience
    Endpoint visibility alone isn't enough, and EDR solutions have needed to evolve dramatically to keep pace with an expanding threat landscape. Learn why FortiEDR helps you achieve true endpoint resilience, including: the critical combination of preven…
    - 14 days ago 29 Jul 20, 5:40pm -
  • Protecting Your APIs from Cyberthreats, Easily and Effectively
    Learn all about all about how to deliver security for APIs. The use of traditional web applications is declining, replaced by API-based applications that can provide a richer, more responsive user experience, especially for mobile device users. Come…
    - 21 days ago 22 Jul 20, 6:00pm -
  • A First-of-Its-Kind Secure SD-WAN Solution for Multi-Cloud Application Deploymen
    This era of Cloud, creates demand for networking and security teams to constantly balance security, complexity, and application performance. Learn how to design a Secure SD-WAN solution right for you, from optimizing CapEx and OpEx, to increasing ove…
    - 28 days ago 15 Jul 20, 8:10pm -
  • Revolutionize Your Security Operations with FortiAI
    Learn how ten years of ML and AI development has contributed to our self-learning Deep Neural Networks (DNN) based solution that will revolutionize your SOC and help your teams be at their best by assisting investigation, detection, and respond to se…
    - 35 days ago 8 Jul 20, 4:50pm -
  • Minimizing Risk: The ROI of Your Cybersecurity Investments
    Ready to keep the board from getting bored? Cybersecurity and OT are critical investments to get right. All security teams need a set of measures that give meaning to technology investment as a true solution, maximizing value and minimizing risk. Joi…
    - 42 days ago 1 Jul 20, 6:20pm -
  • Increase Efficiency and Effectiveness of Network Operations with Automation
    Networking teams want to solve for the ever-growing complexity of multiple solutions and get more out of their investments. Join our expert as we look into multiple use cases and look at how a single-console approach to management helps improve effic…
    - 49 days ago 24 Jun 20, 9:50pm -
  • Simplifying SOC Operations: Automate Response with SOAR Across the Security Fabr
    Most of today's SOCs are needlessly complex, with too many vendors, too many alerts, slow response times, and a lack of trained staff. Join this new webinar to learn how Fortinet can simplify security operations with the Fortinet Security Fabric and…
    - 54 days ago 19 Jun 20, 5:10pm -
  • Rollins' Secure SD-WAN Digital Transformation
    In this special presentation, Rollins CISO Kevin Morrison will share how Rollins tackles its hardest security and management challenges, keeps 2 million customers informed, and keeps services running smoothly—all with an anticipated ROI of $5 milli…
    - 56 days ago 17 Jun 20, 5:30pm -
  • Extending Your FortiGate Next-Gen Firewall to Kubernetes
    Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databas…
    - 56 days ago 17 Jun 20, 5:00pm -
  • Use a Zero-Trust Network Access Approach to Defend your Network
    Digital transformation is creating new threat edges. One threat edge is the number of IP-based devices that are coming onto networks that must be discovered, identified, and controlled. Additionally, network administrators need to identify and provi…
    - 68 days ago 5 Jun 20, 8:35pm -
  • SD-WAN Delivers Resiliency, Security & Unique Digital Experiences for Retailers
    Discover how to transform your retail network with the speed and security to support optimal eCommerce experiences with a joint Windstream Enterprise and Fortinet solution. Learn how Windstream Enterprise SD-WAN with Fortinet enhancements ensures upt…
    - 76 days ago 28 May 20, 8:30pm -
  • FortiOS 6.4 Launch Feature Overview
    Find out why we’re so excited about FortiOS 6.4.1! With too many new innovations to list, this FortiOS launch is here to empower your digital innovations across all four tenants of the Fortinet Security Fabric from security-driven networking to dyn…
    - 83 days ago 21 May 20, 5:30am -
  • Cybersecurity Strategy and Leadership for the SMB
    Smaller businesses have a common problem when it comes to cybersecurity - limited expertise, resources and budget. The board is asking for, clients are demanding to know whether the company is secure, IT team can't articulate the cybersecurity pro…
    - 84 days ago 20 May 20, 4:00pm -
  • Dynamic Network Security from On-prem to the Cloud
    Learn how you can easily protect the entire evolving attack surface while delivering secure remote access to critical applications and meeting compliance—all with a single pane of glass with the FortiGate-VM next-generation firewall which delivers…
    - 97 days ago 7 May 20, 5:00pm -
  • Enabling Enterprises with Secure, Agile and Intelligent Managed SD-WAN
    Join experts from Masergy and Fortinet to hear how this managed service works as well as customer success stories and actionable use cases. This joint discussion will dive into how Masergy Managed Secure SD-WAN services backed by Fortinet Secure SD-W…
    - 29 Apr 20, 9:55pm -
  • Best Practices for Teleworkers at Scale
    A sudden shift to a remote workforce presents new challenges for many networks. Organizations need to support their employees with VPN access at scale, all without sacrificing security. We will share some recent attack methods cybercriminals have bee…
    - 23 Apr 20, 7:20pm -
  • Defend Your High Performance Web Applications with Amazon CloudFront & Fortinet
    To help you keep pace with modern application deployments, Fortinet and Amazon CloudFront have partnered to deliver industry-leading performance and security on AWS. Learn how our integrated solutions from Fortinet and AWS secures your entire infrast…
    - 23 Apr 20, 4:55pm -
  • How the Threat Landscape Has Changed with COVID-19
    In the midst of an unforeseen influx of remote workers due to COVID-19, hackers and cybercriminals across the globe are quickly taking advantage of new vulnerabilities. Hear from Derek Manky, leader at the FortiGuard Labs threat research team, about…
    - 16 Apr 20, 3:20pm -
  • Securing Medical Devices - The Next Threat Vector
    Join this exclusive panel event to hear from healthcare security leaders with Fortinet, IDC and a customer in a medical office as they dive into the latest findings from a recent IDC report and discuss how they work to protect medical devices from th…
    - 14 Apr 20, 7:00pm -
  • 5 Key Factors to Automating Your Endpoint Protection
    Discover how an innovative approach to endpoint security that includes real-time threat detection and automated response capabilities can successfully and effectively combat the most sophisticated attacks seen today. Our experts will share five key f…
    - 24 Mar 20, 6:10pm -
  • Applying the Most Dynamic and Comprehensive AI to the Kill Chain
    Join our expert as we cover the ground-breaking work Fortinet is doing to go above and beyond industry standards by integrating AI into threat intelligence and several cybersecurity solutions to stop more threats, faster, and with fewer staff resourc…
    - 18 Mar 20, 5:00pm -
  • Zeroing in on Threat Trends Around Election Disruption, & Ripe Vulnerabilities
    Uncover the latest findings of the Fortinet Quarterly Threat Landscape Report as our security strategy expert dives into some of the top trends which include: APTs targeting elections, increasing IoT risks, and exploitation of old vulnerabilities. Pr…
    - 5 Mar 20, 5:35pm -
  • Soar Into Digital Innovation by Protecting Your Customers with Confidence
    Discover how to deliver long-lasting experiences for retail and hospitality customers with new digital technologies. Fortinet Secure SD-Branch not only supports secure, high-performance network capabilities, but can extend branch location’s network…
    - 27 Feb 20, 2:15am -
  • Simplify Management and Secure the Edges of Your Business Network with Secure SD
    Learn how to take branch locations to the next level with a truly Secure SD-Branch and a deeper understanding of how to extend edge security to branch locations while streamlining management. Plus, take a look at what an extended architecture that go…
    - 13 Feb 20, 1:45am -
  • Strategies for Leveraging E-rate to Strengthen Your Network
    Find out how to leverage the newest updates to the 2020 E-rate program for reduced or even zero-cost security solutions for your K-12 campuses. Gain an understanding of common security challenges schools face and learn which eligible E-rate products…
    - 5 Feb 20, 1:20am -
  • The Modern WAF: Machine Learning and Web Application and API Protection
    Gain and insightful look at how powerful machine learning (ML) can deliver an evolved web application firewall (WAF) that removes the tiring manual processes in protecting web application deployments. Learn how collaborative teams can ensure web appl…
    - 29 Jan 20, 12:35am -
  • Overcome WAN Challenges with Powerful and Dynamic Secure SD-WAN
    Discover how you can simplify complex environments while enabling a cloud-ready branch with Fortinet Secure SD-WAN. Plus, hear why we believe Fortinet Secure SD-WAN has contributed to our recognition in the 2019 Gartner Magic Quadrant for WAN Edge In…
    - 16 Jan 20, 10:35pm -
  • Enable Consistent Security for True SD-WAN Transformation
    Discover how transforming your network with next-generation technology can ensure proper protection and compliance of your data, increase network resiliency, and improve application performance and productivity, all while lowering your costs. Learn h…
    - 11 Dec 19, 9:25pm -
  • Report Findings—The Dangers Lurking Right Below the Surface with Insider Threats
    Join this panel of cybersecurity experts who will share their perspectives on the true risk of insider threats. Find out what types of threats are actually lurking within your organization and what to watch for to safeguard your critical data. Plus,…
    - 19 Nov 19, 5:45pm -
  • A Platform Approach to Security-Driven Networking
    Discover why we believe our platform-based approach, at Fortinet, has contributed to our recognition in the 2019 Gartner Magic Quadrant for Network Firewall. Fortinet CMO and EVP of Products, John Maddison will provide an animated overview of our uni…
    - 31 Oct 19, 10:10pm -
  • What Matters to the CIO When It Comes to Cybersecurity
    Join an engaging discussion among CIO experts about emerging industry trends and their impact on an organization. Learn about recent trends they have experienced and how they aim to reduce security risk across their organizations. Plus, gain more fro…
    - 16 Oct 19, 9:10pm -
  • 10 Best Practices for Improving Election Security
    Discover how to address some of the widespread concerns of electoral security. Join our expert as we unpack some of the challenges faced when protecting election systems, and gain valuable insights about how to develop an integrated security framewor…
    - 7 Oct 19, 1:05am -
  • Understanding the Current Threat Landscape - A Walk-through of the Latest Attack
    Join our FortiGuard Labs researcher, as he walks through some of the most disruptive findings from the latest edition of the Fortinet Quarterly Threat Landscape Report. Learn how to better meet the security needs of your evolving organizations and ho…
    - 25 Sep 19, 8:30pm -
  • Significantly Reduce Your Data Breach Risk Factor with FortiGuard Security Ratin
    Find out how security checks, actionable recommendations, and compliance reporting through FortiGuard Security Rating Service can help security teams to ensure their organization’s most critical assets are protected in real-time, all the time. This…
    - 19 Sep 19, 7:25pm -
  • IHS Report Findings on the New Dynamic Multi-Cloud Realities
    Learn about the latest findings from an IHS Markit report about customer approaches to cloud deployments. Don’t miss the chance to hear from both Fortinet and IHS Markit as they explain the report findings and some of the leading reasons that organ…
    - 21 Aug 19, 7:55pm -
  • Enhance Your WAN Edge Security Posture at Every Branch Location
    Learn why security is essential for a complete WAN Edge transformation from headquarters to the enterprise branch. Tune in for use cases and real-world examples of how organizations are using Secure SD-WAN to empower employees globally. Our Fortinet…
    - 14 Aug 19, 6:40pm -
  • Securing the Future of Industrial Control Systems
    Join this panel discussion to find out how to protect your evolving critical infrastructure systems from the latest wave of cyber threats. Our OT security experts will share deep insights from the latest report and provide use cases for how top-tier…
    - 12 Aug 19, 8:45pm -
  • Operational Technology and the Digital Transformation Era
    Manufacturing industries are facing accrued complexity while trying to keep up with integrating digital transformation (DX) principles. The challenge of harmonizing legacy operational equipment with digital technologies solutions designed for IT has…
    - 8 Aug 19, 5:30pm -
  • Evolve Your Approach to Securely Deploying Web Applications
    Find out how an automated approach to your network operations can not only prevent headline grabbing breaches due to the human error factor but simplify managing your infrastructure security. Join us to gain insights into key use cases of how enterpr…
    - 31 Jul 19, 11:30pm -
  • Threat Similarities Got Us Seeing Double
    Discover valuable insights from this edition of the Threat Landscape Report, such as the growing trend of shared threat infrastructure, increasingly targeted ransomware attacks and the rise of sophisticated attack code.Our senior security strategis…
    - 18 Jul 19, 4:00pm -
  • Accelerating Time to Revenue for Network Service Providers
    Join this webcast, Kevin Beaver, an independent information security consultant and author of security book Hacking For Dummies, along with Fortinet’s Vinod Sundarraj, Senior Director, Service Provider Segment Marketing as they share various consid…
    - 11 Jul 19, 8:05pm -
  • Threat Similarities Got Us Seeing Double
    Discover valuable insights from this edition of the Threat Landscape Report, such as the growing trend of shared threat infrastructure, increasingly targeted ransomware attacks and the rise of sophisticated attack code.Our senior security strategis…
    - 3 Jul 19, 9:05pm -
  • Accelerating SD-WAN Innovation within the Digital Branch Office
    Find out how Fortinet's Security Driven Networking approach completely magnifies the digital business experience for your WAN Edge with paramount networking performance and security.Join us to gain insights into critical use cases, plus how you can…
    - 27 Jun 19, 4:30pm -
  • What Makes Local Government an Enticing Cyber Target
    Discover the tactics cyber criminals are using to steal valuable taxpayer and student data. State government, local government, and educational institutions across the globe are at risk of facing sophisticated attacks if they do not have the proper s…
    - 21 Jun 19, 8:00pm -
  • Simplify Operations with Automation-Driven Network Management
    Find out how an automated approach to your network operations can not only prevent headline grabbing breaches due to the human error factor but simplify managing your infrastructure security. Join us to gain insights into key use cases of how enterpr…
    - 21 Jun 19, 3:20pm -
  • Take Control of IoT
    Watch this panel discussion filmed at the Tech Museum of Innovation in San Jose, where Fortinet’s SVP of Products and Solutions interviews key executives of the recent Bradford Networks acquisition, as well as a partner exec, to discuss how and why…
    - 20 Jun 19, 5:00pm -
  • Accelerating SD-WAN Innovation within the Digital Branch Office
    Find out how Fortinet's Security Driven Networking approach completely magnifies the digital business experience for your WAN Edge with paramount networking performance and security.Join us to gain insights into critical use cases, plus how you can…
    - 17 Jun 19, 5:40pm -
  • Artificial Intelligence Ups the Sandbox Game
    Learn how a sandbox solution with integrated AI capabilities, changes the playing field for threat detection. Our FortiSandbox with AI has been years in the making and our experts will blow you away with the inner workings that allow it to outsmart e…
    - 15 Jun 19, 7:20pm -
  • Reduce the Complexity of Security Operations with Analytics-Powered Security & L
    Find out how you can gain in-depth visibility of anomalies across the entire attack surface, while reducing time to remediate risks with the latest release of FortiAnalyzer 6.2 which delivers powerful automation and analytics-backed visibility with a…
    - 14 Jun 19, 2:05am -
  • Threat Research Truths: Unraveling the Warnings of the Modern Ides of March
    The latest release of the Fortinet Quarterly Threat Landscape Report reveals the most intriguing threat trends uncovered by our dedicated research team, FortiGuard Labs.Join this webinar to gain an in-depth look at which threat trends to keep a wat…
    - 10 Jun 19, 6:00pm -
  • Protecting DevOps Without Impeding Speed and Time to Market
    Join our panel of experts from Fortinet and an ESG Analyst, as they share deep insights about the primary challenges DevOps leaders face. They'll explore reasons why it is not a current priority in most organizations and how the DevOps role is evolvi…
    - 6 Jun 19, 3:35pm -
  • Realizing the Benefits of Gender Diversity in Cybersecurity
    Understand the research behind why women only comprise a small portion of the cybersecurity workforce today, and how that negatively impacts business operations. Our panel of experts will share findings about the affects of a lack of diversity in the…
    - 4 Jun 19, 4:05am -
  • DX Takes Businesses By Storm, Security a Top Concern Per New CISO Study
    Join us to hear from two security leaders, and their interpretation of the takeaways taken from the findings of a new global survey of 300 enterprise CISOs on topics such as security traits and best practices of top-tier security organizations and mu…
    - 31 May 19, 4:00pm -

Tripwire

  • Retail Security – Closing The Threat Gap
    Attendees will learn:•How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.•The importance of end point security across your business cr…
    - 12 Jun 14, 6:00pm -
  • How the 20 Controls Address Real Threats
    In this webcast, we will:•Discuss how to translate security information into specific and scalable action•Describe the remediation plan for the controls, starting with the Top 5 •Discuss how the Council on CyberSecurity uses a community app…
    - 11 Jun 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Recovery
    In this webcast we will show:The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organizationHow you can identify your business exposure and what systems are vulnerableHow Tripwire’s solutio…
    - 15 May 14, 9:00am -
  • Insider Threat Kill Chain: Detecting Human Indicators of Compromise
    In this webinar we will: • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem. • Identify risk indicators with employee attitudes and behavior and how it correlates to their…
    - 8 May 14, 6:00pm -
  • Heartbleed Outpatient Care: Steps for Secure Business Recovery
    In this webcast we will show:1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization2. How you can identify your business exposure and what systems are vulnerable3. How Tripwire’s…
    - 17 Apr 14, 6:00pm -
  • AAA: Getting Roadside Assistance from Tripwire
    Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.In this Q&A-style webcast you will learn:•How to move your PCI efforts from a small tactical implementation to a key critical component of your…
    - 2 Apr 14, 6:00pm -
  • How to Restore Trust After a Breach – Middle East
    Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of t…
    - 13 Mar 14, 8:00am -
  • How to Restore Trust After a Breach – DACH
    Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:•Which systems can be trusted?•What is the extent of…
    - 5 Mar 14, 9:00am -
  • How to Restore Trust After a Breach - UK
    In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you atta…
    - 4 Mar 14, 10:00am -
  • How to Restore Trust After a Breach
    In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How qui…
    - 12 Feb 14, 6:00pm -
  • Preparing for PCI DSS v3.0: Advice from the QSA
    As a former QSA and currently a security analyst at The 451 Research, Adrian Sanabria will share a frank viewpoint of how the new version of Payment Card Industry standard will affect your organization. Join us for this webcast and you will:•Ob…
    - 22 Jan 14, 6:00pm -
  • Vulnerability Voodoo: The Convergence of Foundational Security Controls
    Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire, will discuss:•Integrating Vulnerability Management with other security controls to improve compliance and secur…
    - 17 Dec 13, 6:00pm -
  • PCI DSS 3.0: Don't Shortchange Your PCI Readiness
    Join Jeff Hall, CISSP, CISM, CGEIT, PCI-QSA, PCIP and Senior Security Consultant at FishNet Security and Steve Hall, Director of PCI Solutions at Tripwire, to learn how PCI DSS 3.0 will impact your organization and what you need to do:• Understan…
    - 16 Dec 13, 7:00pm -
  • Reducing Risk Through Effective Vulnerability Management
    Gavin Millard, Tripwire's EMEA Technical Director, will discuss why effective vulnerability management is critical to measuring, managing and reducing your attack surface and how to gain insight from the information Tripwire can provide.Topics cover…
    - 16 Dec 13, 10:00am -
  • 2014 IT Security Budget Mistakes to Avoid
    Often during budget cycles, we’re handed a number – no choice or negotiation – this is just all you get. This year however, there are some positive trends in security budget research from Gartner, IDC, Ponemon, and CEB. This webcast will show…
    - 6 Nov 13, 6:00pm -
  • Avoiding Vulnerability Info Overload: How to Prioritize and Respond to Risk
    Lamar Bailey, Tripwire's Director of the Vulnerability & Exposure Research team will provide you with a better understanding of:- Why is the Tripwire Vulnerability scoring so granular?- How do we arrive at those scores and why not just use CVSS?-…
    - 16 Oct 13, 5:00pm -
  • Using the SANS Top 4 Controls to Measure and Reduce your Attack Surface
    Please accept our apologies for the technical difficulties encountered with this webinar on Monday. This is now due to take place on Friday 4th October.This hour-long webinar, hosted by Gavin Millard, Tripwire's EMEA Technical Director, will discu…
    - 4 Oct 13, 9:00am -
  • Strategic Vulnerability Management: Go Beyond Scanning
    Join Rick Holland, Forrester Senior Analyst, and Edward Smith, Product Marketing Manager at Tripwire, to learn how to go beyond scanning to a strategic vulnerability management program.In this webcast you’ll learn how a strategic VM program can he…
    - 23 Sep 13, 5:00pm -
  • CyberSecurity Awareness and the SANS 20 CSCs
    Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on Cybersecurity, as she shares her thoughts on the rapidly evolving world of cybersecurity.In this webinar, you will learn: * How the Council on CyberSe…
    - 12 Sep 13, 5:00pm -
  • TLC 7.0: Creating Confidence through Improved Log Intelligence
    As Security Management solutions evolve to address today’s environment of complex security threats, the need for a log intelligence layer has emerged to provide high speed analysis and filtering of log and event data.In this webcast, Steve Hall,…
    - 26 Aug 13, 8:00pm -
  • How to Communicate Security Imperatives to the Business
    Global IT executive Jitender Arora and Dwayne Melancon, Tripwire’s CTO, will demonstrate the pitfalls and offer tips and tricks for communicating security initiatives with executives and non-financial stakeholders. In this webcast, you will learn…
    - 7 Aug 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Bryce Schroeder,Systems Engineer Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding your…
    - 25 Jun 13, 5:00pm -
  • I Didn't Know Tripwire Owned That!
    Join Gavin Millard, EMEA Technical Systems Director of Tripwire, to get an overview of the technology Tripwire recently acquired through the purchase of nCircle. Hear why hardware and software discovery is the foundational control to understanding…
    - 18 Jun 13, 9:00am -
  • The Emergence of Enterprise Security Intelligence (AMER)
    Enterprise Security Intelligence (ESI) is defined as an emerging concept that is a comprehensive and holistic alternative to traditional disjointed security approaches that will enable stronger enterprise-wide security, optimal decision making and be…
    - 11 Apr 13, 5:00pm -
  • The Emergence of Enterprise Security Intelligence (EMEA)
    Tripwire’s CTO, Dwayne Melançon, will discuss:• Gartner’s Enterprise Security Intelligence concept and how to utilize it in your security efforts• Practical tips for leveraging security intelligence and how it fits with Tripwire's System…
    - 11 Apr 13, 2:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 27 Mar 13, 10:00am -
  • Tripwire Announcement
    Tripwire general announcement to customers
    - 20 Mar 13, 3:00pm -
  • SCM for Dummies
    Join us for a live preview of "Security Configuration Management For Dummies," a new book by Wiley Publishing sponsored by Tripwire. In this webcast, we'll outline how to:•Harden systems against attack, •Rapidly repair configuration drift, and…
    - 20 Feb 13, 6:00pm -
  • I Didn't Know Tripwire Could Do That--The Series Continues
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Bryce Schroeder, Tripwire's Director of Systems Engineering, who will…
    - 12 Feb 13, 6:00pm -
  • I Didnt Know Tripwire Could Do That - Part 2 (EMEA)
    After the success of the first customer webcast, Tripwire presents “I Didn’t Know Tripwire Could Do That – Part 2” This will feature more groundbreaking revelations from Gavin Millard, EMEA Technical Director, who will walk you through ways…
    - 29 Jan 13, 10:00am -
  • 10 Steps to Risk-Based Security Management
    Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways that do not reflect this commitment. This dichotomy often leads to misplaced effort, spending and r…
    - 4 Dec 12, 3:00pm -
  • I Didnt Know Tripwire Could Do That - EMEA
    The last few releases, Tripwire has added some pretty groundbreaking features as part of the Tripwire VIA platform—the Event Integration Framework, Asset View and Data Mart. Even before that, we’d released our pre-packaged set of high-value secur…
    - 22 Nov 12, 10:00am -
  • "I Didn't Know Tripwire Could Do That!"
    Everyone knows that Tripwire solutions help customers meet compliance mandates and offer best-of-breed FIM. Lately, though, when we demonstrate features and capabilities our users exclaim, “I didn’t know Tripwire could do that!” In this webcast…
    - 14 Nov 12, 6:00pm -
  • 10 Steps to Risk-Based Security Management
    This webcast will provide a simple framework for executing a risk based security management program. This framework is based on some basic tenants about risk based security management:•It creates an environment of informed choice•It strives to…
    - 13 Nov 12, 6:00pm -
  • „Systemausfälle und Downtime reduzieren“
    Der häufigste Grund für Systemausfälle sind Fehlkonfigurationen. Das muss aber nicht so sein. So sagt z.B. ein führender Dienstleister der Automobilbranche: „Mit Tripwire haben wir unsere Downtime um ca. 80% reduziert.“ NTT DATA und Tripwire…
    - 8 Nov 12, 10:00am -
  • Own Your Own Network: Continuous Monitoring
    Continuous monitoring has been defined by NIST and the SANS 20 Critical Security Controls as key to reducing risk in IT environments. Under these definitions, continuous monitoring encompasses at lot of moving parts! Change management, configuration…
    - 19 Oct 12, 5:15pm -
  • Secure Configuration Management Demystified
    The SANS 20 Critical Security Controls recommends Secure Configuration for systems, servers and end points as a third critical control, and secure configuration for network and security devices as a tenth critical control. Tune in as SANS' configurat…
    - 16 Oct 12, 5:50pm -
  • IANS Webcast: Calculating Your Return on Security Investment with Tripwire
    In the world of security, you know first-hand how difficult it can be to quantify the advantages of solutions when there are so many variables at play. Join us and listen in to Diana Kelley, IANS faculty member and analyst and Tripwire customer, Fran…
    - 9 Oct 12, 5:00pm -
  • Connecting Security to the Business
    Information security has entered the boardroom. So, how can CISOs show value to their organization in meaningful ways? In this video we outline the growing problem and Tripwire's solution.
    - 14 Sep 12, 8:40pm -
  • Five Steps for Utilities to Reduce Risk Management Framework Fatigue
    Utilities fear the specter of the NERC auditor, new security legislation on the horizon, and cyber attacks that could shut down systems and services. But risk management framework fatigue has set in, and with so many approaches they don’t know wher…
    - 28 Aug 12, 5:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 27 Jun 12, 2:00pm -
  • 2012 Ponemon Report on Risk-based Security Management: Are Organizations...
    Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of risk management. In this webcast, hea…
    - 26 Jun 12, 5:00pm -
  • 10 Steps to Better Security Incident Detection
    Organisations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 22 May 12, 1:00pm -
  • Achieving Continuous Monitoring Easily with Security Automation
    With complex, distributed government information systems increasingly under attack from rogue nations, terrorists and cause-driven groups, IT security teams need to get a lead on the state of their systems. In this webcast, learn about an approach to…
    - 17 May 12, 5:00pm -
  • Get more out of SIEM with Change and Configuration Data
    The New 2012 Verizon Data Breach Investigation Report shows that 85% of breaches took weeks or more to discover which is an increase of 6% on last year. There is also an increase on the number of breaches that are being discovered by third parties a…
    - 3 May 12, 12:00pm -
  • 10 Steps to Better Security Incident Detection
    Organizations invest heavily in their security defenses, yet many still get breached. Sadly, they frequently find out about it from a third party. So why can’t security teams detect incidents early? In this webcast, information security expert Bria…
    - 2 May 12, 5:00pm -
  • Reducing Federal Systems Risk with the SANS 20 Critical Controls
    The big news from RSA this year was the announcement out of the Department of Homeland Security (DHS) that U.S. and Canadian government agencies are adopting the SANS 20 Critical Security Controls as a standard. While the Federal Information Systems…
    - 20 Apr 12, 3:50am -
  • Get more out of SIEM with Change and Configuration Data
    Join us for this Lunch and Learn Webcast:Most organizations capture log data that could indicate a breach occurred. Yet not a single breach investigated in the Verizon Data Breach Investigation Report was detected through log analysis or review.…
    - 27 Mar 12, 11:30am -
  • The Metamorphosis: Extracting Business Intelligence from IT Security Data
    It’s been a long time coming: businesses really care about the organization’s state of security. But to make it relevant to business executives, they need up-leveled views of raw security data that don’t require a deep understanding of IT and s…
    - 15 Mar 12, 5:00pm -
  • IT-Security Controls in Deutschland 2011
    IT-Security-Verantwortliche in deutschen Unternehmen wissen, welche Daten sie schützen müssen und kennen die Folgen einer Datenschutzverletzung: Umsatzeinbußen, Reputations- und sogar Jobverlust. Dennoch sind die meisten der Meinung, irgendwann Op…
    - 14 Mar 12, 10:00am -
  • Needle in a Haystack – Getting to Attribution in Control Systems
    The nation’s control systems support critical infrastructure like water treatment plants and the bulk electricity system. When they are compromised, the stakes can be extremely high, potentially even including loss of life. In this webcast, SCADA s…
    - 22 Feb 12, 6:00pm -
  • Where, When and How to Use Real-Time Monitoring
    It's clear to most IT security practitioners that if you only monitor for change through periodic scans, you are probably missing changes that can introduce risk or cause non-compliance. Real-time monitoring seems to offer the panacea by allowing you…
    - 15 Dec 11, 11:00am -
  • GPG13 Compliance: More Than Log Collection and Monitoring
    There is widespread belief that GPG13 compliance can be met by simply logging and monitoring log files. Yet Protective Monitoring Control (PMC) 4 requires a GPG13 solution to detect change and determine its impact upon security. Is it practical to ac…
    - 7 Dec 11, 11:00am -

Bit9

    Guide Point Security

    • Enterprise Security Monitoring: Leaping From Legacy to Leadership
      Advanced cyberattacks are occurring at an astounding rate, with more industries and government entities becoming victims of massive data thefts, damaged brands, public trust issues, as well as billions in lost revenues. One of the primary problems is…
      - 8 Dec 15, 7:00pm -
    • PCI DSS v3.0 and the Evolution of the Self-Assessment Questionnaire
      When the PCI SSC published version 3.0 of the PCI DSS, they revised their complement of Self-Assessment Questionnaires (SAQs) to align with the new standard. Part of the release included three new SAQs that reflect their maturing perspective on the t…
      - 5 Feb 15, 7:00pm -
    • Detecting and Responding More Quickly to Advanced Cyber Attacks
      Most organizations realize it’s no longer a matter of ‘If’ their organization will be breached but ‘When’ (if it hasn’t already happened and they just don’t know it). The key question is ‘How can you gain better visibility, sooner to…
      - 24 Sep 14, 6:00pm -
    • 10 Questions CISOs Should Ask About Mobile Security
      Come join the interactive conversation about factors CISOs should be considering when implementing a mobile security solution. The mobile landscape is changing rapidly, creating new challenges and opportunities for CISOs tasked with balancing busine…
      - 24 Jun 14, 6:00pm -
    • Security Visibility in the Cloud - Logging and Monitoring in AWS
      Come join the conversation on the pros and cons of commercial and open source options available in AWS, best practices for managing logs and monitoring incidents in the Cloud, and guidance on what to log from two security leaders in the field. Lear…
      - 1 May 14, 6:00pm -

    Kaspersky

    • Mobile Security: What Are The Real World Risks?
      The explosion in mobile device usage within corporate networks has raised many security concerns ranging from spyware and malware to data exfiltration. With an increasing mobile workforce, smart phones, laptops and tablets are viable targets for mal…
      - 5 Dec 12, 5:00pm -

    Trend Micro

    • Go To The Cloud, Worry-Free
      As you take advantage of the operational and economic benefits of virtualization and the cloud, you need to demonstrate that you can strategize and implement an approach to security that matches the agility and performance they are seeking across the…
      - 24 Oct 18, 7:00pm -
    • Secure your customer’s Office 365 environment with leading security solutions
      Office 365 is a cloud-based service designed to help organization’s meet their needs for robust security, reliability, and user productivity to help save time and money. When organizations move to a cloud service, they must be able to trust their s…
      - 16 Aug 18, 6:00pm -
    • ESG Interview on Endpoint Detection Response (EDR)
      An ESG Interview with Steve Duncan, Trend Micro's Product Marketing Manager, on Endpoint Detection and Response (EDR).
      - 25 Jun 18, 7:45pm -
    • Advanced Endpoint Protection (AEP) 2.0 Group Test Results - Trend Micro
      Whether we are talking about the traditional desktop, laptop, or mobile device, the endpoint is always the target of cybercriminal activity. Advanced endpoint protection (AEP) is a disruptive new technology that focuses on preventing cybercriminals f…
      - 5 Jun 18, 3:00pm -
    • Going Beyond Next Generation Security
      The Endpoint Is Not The Battleground - We have seen extensive growth in protection capabilities at the endpoint but is that enough? In this webinar, we will discuss the terminology of “next generation” and explore true end-to-end threat intellige…
      - 30 May 18, 5:50pm -
    • Protecting Against Threats in Office 365
      Although you may not be aware, there are risks passing through your Office 365 environment. Join this webinar to learn more about the phishing, malware, and fraud risks affecting Office 365 email, OneDrive, and SharePoint users.You'll hear from Trend…
      - 17 May 18, 1:05pm -
    • Are You GDPR Compliant?
      GDPR is coming May 25, 2018. Learn what you need to do to prepareand get state-of-the-art security solutions to help with compliance. In this video you will learn:- What is GDPR and its implications- How you can become GDPR compliant- How Trend…
      - 15 May 18, 3:15pm -
    • Going Beyond Next-Gen Endpoint Security, powered by XGen
      Your users are a key source of risk in your organization – they want to work where and how they want. How do you ensure that your corporate information is free from prying eyes and that your users aren’t creating gaps in your security? Trend Mic…
      - 11 May 18, 4:10pm -
    • Go beyond next-gen with XGen Security Explainer Video
      Go beyond next-gen with XGen™ security, a new class of security software that addresses the full range of ever-changing threats—now and in the future. Instead of using separate, siloed security solutions that don’t share information, XGen™ se…
      - 11 May 18, 3:15pm -

    Sophos

    • Data Protection and Compliance: Where Encryption Applies
      Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data. Join Dave Shackleford, IT se…
      - 23 Apr 14, 3:00pm -

    Symantec Information Security

    • Cyber Security Brief: GDPR Special: The Impact of the Regulation One Year On
      In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsen…
      - 29 Aug 19, 8:00am -
    • After the Breach: How to Turn Disaster into Success
      Failure is an essential component of success. Ask any “successful” person and, assuming they’re being honest, they’ll tell you it’s what they learned when things went wrong that proved most valuable of all. That and the grit to pick themsel…
      - 28 Aug 19, 12:50pm -
    • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
      On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behin…
      - 27 Aug 19, 8:00am -
    • Cyber Security Brief: Bug bounties, bad passwords, and Radiohead
      On this week’s Cyber Security Brief podcast, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that ha…
      - 22 Aug 19, 8:00am -
    • Explore the Benefits EDR tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 20 Aug 19, 2:00pm -
    • Cyber Security Brief: Waterbug, “Smart” TVs, and BEC Scam Hits Canadian City
      In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same w…
      - 20 Aug 19, 8:00am -
    • Mobile Security Strategy Best Practices
      As enterprises begin to recognize the need for greater visibility into mobile threats and are increasingly pressed to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify…
      - 15 Aug 19, 5:00pm -
    • Cyber Security Brief: Tube data collected, Baltimore ransomware & BlueKeep
      On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing re…
      - 15 Aug 19, 8:00am -
    • Cyber Security Brief: BlueKeep bug, ransomware “recovery” & GozNym network
      In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of…
      - 13 Aug 19, 8:00am -
    • Cyber Security Brief: Buckeye pre Shadow Brokers leak, IoT security & ransomware
      On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segur…
      - 8 Aug 19, 8:00am -
    • Cloud Workload Assurance: A Journey from visibility to compliance
      Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.In this webinar,…
      - 6 Aug 19, 1:00pm -
    • Cyber Security Brief: Beapy worm, Emotet’s hiding skill & set-top box dangers
      On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data br…
      - 6 Aug 19, 8:00am -
    • Integrating Security Across Your Cloud
      As companies move their applications and operations from on-prem data centers to the cloud, a variety of security concerns become more complex. Applying security controls to servers outside of the physical control of IT means depending on web servi…
      - 5 Aug 19, 1:00pm -
    • Identify, Prioritize, and Remediate Vulnerabilities
      The number of security vulnerabilities discovered over the last few years has rapidly increased. 2018 was a record setting year with a total of 14,760 – more than double the amount from just 2 years earlier. In addition, many of the recent breaches…
      - 1 Aug 19, 1:00pm -
    • Cyber Security Brief: Bayrob convictions, Silk Road 2.0, Alexa listening
      On this week’s Cyber Security Brief podcast, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the p…
      - 1 Aug 19, 8:00am -
    • How to Ensure Your Data is Secure in AWS
      Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations…
      - 31 Jul 19, 1:00pm -
    • How a Managed EDR Analyst Hunts, Investigates, and Remediates an Incident
      Demo Video (8 mins)In this demo, a Symantec Managed Endpoint Detection and Response (MEDR) analyst walks through an end-to-end example of how he:- Creates an automated investigation playbook and hunts for a threat- Demonstrates how he investi…
      - 30 Jul 19, 7:45pm -
    • Cyber Security Brief: Hotel booking privacy, dark marketplace & Mar-a-Lago
      On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an…
      - 29 Jul 19, 9:00am -
    • The Office 365 Dilemma – how secure is secure?
      Office 365 has captured the imagination of many organisations, offering a wide range of productivity applications in a single platform. However, as organisations race to the cloud they realise that solving the security challenges may not be as straig…
      - 29 Jul 19, 8:00am -
    • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends
      Is your perception of cloud security matching the reality? We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec. Join Clou…
      - 26 Jul 19, 10:00am -
    • Cyber Security Brief: Malware @ Mar-a-Lago, Albany ransomware & Tesla tricked
      On this week’s Cyber Security Brief podcast, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the…
      - 25 Jul 19, 9:00am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 25 Jul 19, 8:00am -
    • The perfect storm: the impact of fragmentation and complexity
      Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to…
      - 23 Jul 19, 1:00pm -
    • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
      On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week –…
      - 23 Jul 19, 8:00am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 22 Jul 19, 9:00pm -
    • Explore the Benefits of Endpoint Detection and Response Tools and Services
      Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.Join ESG and Symantec…
      - 18 Jul 19, 5:00pm -
    • Cyber Security Brief: Interview: Neil Jenkins, CAO, Cyber Threat Alliance
      In today’s Cyber Security Brief podcast, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect th…
      - 18 Jul 19, 8:00am -
    • Travel Bookings: Personal Data and Privacy at Risk
      A year has passed since the General Data Protection Regulation (GDPR) came into effect, but new research has found users’ personal data and privacy is still at risk. Symantec found that 67% of hotel and travel websites are leaking guests’ booking…
      - 17 Jul 19, 10:00am -
    • Cyber Security Brief: ISTR Special: Enterprise
      This week’s Cyber Security Brief podcast is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to brin…
      - 16 Jul 19, 8:00am -
    • Next Generation Network Forensics for the Cloud
      The average cost of a breach is US$4 million and continues to increase year on year. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?Join Kar…
      - 11 Jul 19, 5:00pm -
    • Cloud Storage Security Innovations Video
      CWP 4.0 and DLP Integration Video
      - 8 Jul 19, 9:55am -
    • Tackling the Skills Crisis: Reduce Complexity, Increase Automation
      The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their jobs and are committed to the mission but in the face of mounting alerts, new threats and a…
      - 20 Jun 19, 8:00am -
    • Symantec Cloud & Web Access Security
      As a leader in Cyber Security, Symantec has an integrated set of cloud-delivered gateway services for securing modern enterprise cloud and web access.
      - 13 Jun 19, 10:30pm -
    • Expert Guide to CASB Deployment Success
      There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. Join Steve Riley, a Gartner Senior Director Analyst who focuses on public cloud security, and Eric Andrews, Symantec’s Vice President of Cloud Security, a…
      - 6 Jun 19, 5:00pm -
    • Livestream Video - Proactive Data Privacy and Security
      How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.…
      - 6 Jun 19, 1:00pm -
    • Livestream Video - CISO Challenges and How to Solve Them
      Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking fo…
      - 5 Jun 19, 10:30am -
    • Symantec - Comprehensive about Security
      As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.Join Darren Thomson, EMEA CTO discu…
      - 31 May 19, 12:35pm -
    • Is Your Network Safe From Cyber Threats?
      Do you know what’s lurking in your network? How strong are your defenses against today’s cyber threats? Nothing gives you a better understanding of your security posture than a deep analysis of your historical traffic. Using your own data, Sy…
      - 30 May 19, 5:00pm -
    • Gartner Recommendations for Modern Endpoint Security
      Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response…
      - 30 May 19, 3:20pm -
    • Cyber Security Solutions & Strategies for the Modern Organization
      Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. The old way of fighting cyber-attacks using fragmented tools no longer works. How do organizations adapt thei…
      - 30 May 19, 9:00am -
    • GDPR Turns 1: Is your organization compliant?
      There are countless organizations still working to get their digital houses in order to comply with GDPR and the rules that offer the promise of better governance and further transparency. Join Ramses Gallego, Giampiero Nanni, Damase Tricart, and I…
      - 28 May 19, 9:00am -
    • Il GDPR, un anno dopo...
      Temi del WebinarIl GDPR, il Regolamento Generale sulla Protezione dei Dati, è entrato in vigore un anno fa. Stabilisce una serie di obblighi di notifica che le aziende di tutta Europa devono rispettare in merito a sicurezza informatica e violazione…
      - 22 May 19, 9:00am -
    • RGPD: Panorama un año después
      El Reglamento General de Protección de Datos (RGPD) ya lleva un año en vigor. La nueva normativa impuso una serie de onerosas obligaciones de notificación de filtraciones de datos y de seguridad para organizaciones en toda Europa, así como fuerte…
      - 21 May 19, 1:00pm -
    • GDPR : le point un an après
      - 21 May 19, 9:00am -
    • Insider Threat - Who is the enemy within?
      Client data shared to a personal cloud account? Financial data on a USB drive? An unknowingly hacked password? People don’t generally mean harm. But under GDPR it’s the security breach that matters, not the motivation. See how Symantec Data Lo…
      - 20 May 19, 3:10pm -
    • How to Detect and Protect Sensitive Data
      Have you got the visibility and control you need to detect and protect your GDPR-regulated information? See how Symantec Data Loss Prevention (DLP) uses an information-centric approach to stop your data reaching places it shouldn’t. So you can sh…
      - 20 May 19, 3:05pm -
    • [PANEL] Ensuring Continued Compliance – Data Protection
      Since the rollout of The General Data Protection Regulation (GDPR) in 2018, companies worldwide have had to implement new policies and procedures to protect data. Join leading compliances and security experts as they discuss why data protection is at…
      - 20 May 19, 3:00pm -
    • GDPR: What’s happened in the last year
      The GDPR places a number of onerous cybersecurity and data breach notification obligations for organizations with strong enforcement powers for the data protection authorities. Compliance with GDPR remains as challenging with today’s threat landsca…
      - 20 May 19, 2:00pm -
    • Cloud Workload Protection + Cloud Workload Assurance
      What if security was baked in to your development workflow in a way that didn’t slow you down? Symantec Cloud Workload Protection (CWP), integrates into your DevOps workflows, automating security so you don’t have to think about it. Watch this…
      - 20 May 19, 12:45pm -
    • CloudSoc + Cloud Workload Assurance
      The cloud makes your teams faster and more agile. But they’re leaning on infrastructure as a service faster than you can secure it. With Symantec’s Cloud Security you are able to see who is using the cloud, how they are using the cloud and if y…
      - 20 May 19, 12:45pm -
    • Cloud Workload Assurance
      It’s no news flash that misconfigurations cause the majority of cloud security failures. But how do you prioritize security tasks with your limited resources? Symantec Cloud Workload Assurance minimizes misconfigurations through automated discove…
      - 20 May 19, 12:40pm -
    • How to Take Control of Sensitive Data in the Cloud
      Do you know how much of your sensitive data is being shared in the cloud? See how Symantec Cloud Access Security Broker (CASB) can help your teams benefit from today’s cloud-based productivity tools, while giving you the visibility and reassuranc…
      - 17 May 19, 4:30pm -
    • Strategies for Managing Compliance and Security in the Cloud
      With breaches on the rise, enterprises are looking to assess the security and compliance risks coming from the cloud. As more and more data is being stored in, and accesible from, cloud applications, how can organization better prepare should the unt…
      - 8 May 19, 12:00pm -

    Imperva

    • newReduce risk and protect critical data to meet CCPA compliance
      The rapid growth of personal data and the simultaneous increase in cyberattacks and breaches is making data security a top priority for businesses around the world driving more stringent data privacy regulations.The California Consumer Privacy Act…
      - 15 days ago 27 Aug 20, 5:00pm -
    • See How Database Visibility and Compliance Can Happen in Minutes
      When it comes to data and databases, security and compliance are essential. Solutions like Amazon Relational Database Service (Amazon RDS) provide built-in security with features including network isolation, data encryption, and automated backups.H…
      - 7 days ago 5 Aug 20, 5:00pm -
    • How to Secure Data After It’s Moved to the Cloud Without You
      Your business is moving data to the cloud without all the security controls mandated for on-prem. After all, the promised economics and business agility are far too attractive for business leaders to ignore. But, attackers are after data, auditors de…
      - 13 days ago 30 Jul 20, 5:00pm -
    • Cybersecurity in healthcare and the impact on compliance
      Healthcare organizations have always been a target for cyberattackers who are out to get their hands on valuable PHI (Protected Health Information). In recent years a number of developments have made cybersecurity even more of a priority for healthca…
      - 21 days ago 22 Jul 20, 5:00pm -
    • Why NIST recognizes RASP to reduce software development risks
      The NIST Cybersecurity Framework standardizes the practices and controls that mitigate constantly evolving cyberthreats and adopted by both government entities as well as global businesses is increasingly becoming the basis of other key industry secu…
      - 42 days ago 1 Jul 20, 8:00pm -
    • Schützen Sie Ihr Unternehmen vor DDoS-Angriffen
      2019 wurde der größte jemals aufgezeichnete DDoS-Angriff verzeichnet. In diesem Webinar lernen Sie die verschiedenen Arten von DDoS-Angriffen kennen, auf welche Branchen und Regionen abgezielt wird und warum Beharrlichkeit zur neuen Norm wird. Ne…
      - 77 days ago 27 May 20, 8:00am -
    • Cloud Database Best Practices: Secure and Audit Ready
      Cloud providers streamline their database-as-a-service (DBaaS) offerings to make adoption as frictionless as possible. But for your programs operating under regulatory mandates, the challenge comes in protecting the privacy and clearing compliance a…
      - 84 days ago 20 May 20, 5:00pm -
    • FinServ Compliance: How to be compliant and resilient in times of disruption
      Disruption exposes vulnerabilities and increases the risk for businesses. COVID-19 is causing major disruption for organizations around the world, not least for financial institutions that are likely to have more at stake in terms of critical assets.…
      - 92 days ago 12 May 20, 2:00pm -
    • Bad Bots are Striking Back and Ruining the Internet
      One in every four web requests is a bad bot looking to hurt your business. From price scraping to credential stuffing, bots are all over your website and mobile app. In today's environment, bad bots are also trying to legitimize their behavior. Data…
      - 99 days ago 5 May 20, 5:00pm -
    • Financial Services: Actionable Practices to Ramp Up Security in Disruptive Times
      The COVID19 environment is causing business disruption on a global scale, forcing industries to quickly adapt to the changing market, which is creating a hotbed of opportunity for cybercrime. The Financial Services sector has always been a prime targ…
      - 28 Apr 20, 2:00pm -
    • Movement to the cloud and security attacks are on the rise
      Insights from the 2020 Cyberthreat Defense ReportEnterprises today are challenged with securing data and applications as they are migrating to the cloud. At the same time, attacks are increasing, IT is understaffed and they are looking for the tool…
      - 16 Apr 20, 5:00pm -
    • Global DDoS Threat Landscape
      2019 saw the biggest DDoS attack ever recorded. In this webinar you will learn about the different types of DDoS attacks, which industries and geographies are being targeted, and why persistence is becoming the new 'norm'.
      - 25 Mar 20, 5:00pm -
    • Top CISO Priorities for 2020
      What are the key areas CISOs are focusing on in 2020 and beyond? From identity management in a multi-cloud world, to protecting assets with encryption and zero trust, to educating DevOps and other teams on security rather than control, to dealing wi…
      - 26 Feb 20, 6:30pm -
    • How Security Enables Business Growth
      As more data is created and collected every day, more users within and outside of your organization are accessing it to create business value. Identifying the security risks without compromising the agility of your business is critical. Join this e…
      - 25 Feb 20, 4:30pm -
    • 2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 20 Feb 20, 7:00pm -
    • 2020 Trends in Cybersecurity
      Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
      - 11 Dec 19, 6:00pm -
    • How RASP can easily secure your legacy apps
      While your enterprise is undergoing a digital transformation, your team’s still on the hook for securing legacy apps, as well as apps built with open source and third-party libraries and frameworks. But a problem arises when the resources who wrote…
      - 5 Dec 19, 6:00pm -
    • How RASP can save a struggling Secure SDLC
      Despite countless hours of effort and billions of dollars spent, companies are struggling mightily under their SDLC programs. Prioritizing ever increasing vulnerability backlogs and release delays due to critical security bugs found in the eleventh h…
      - 19 Nov 19, 6:00pm -
    • How FinServ can Balance Digital Transformation, Risk and Compliance
      Market fragmentation, the influx of modern digital solutions by fintechs, and the foray into the banking world by tech giants, are all intensifying competition for financial firms, placing them under immense pressure to adopt cloud technology and tra…
      - 14 Nov 19, 6:00pm -
    • Web Application Firewalls – Critical Trends and Requirements
      As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Join Terry Ray, SVP and Imperva Fellow, as we analyze the key insights from the new 2019 Gartner Magic Quadr…
      - 12 Nov 19, 9:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 5 Nov 19, 7:00pm -
    • Live DDoS Attack: Mitigate then Investigate
      Think DDoS protection is easy? Join Imperva Product Manager David Elmaleh and DDoS attack expert Andrew Shoemaker of NimbusDDOS to understand the challenges that DDoS attacks create from the time an attack happens to the aftermath. Witness a live la…
      - 23 Oct 19, 5:00pm -
    • Gain rapid threat protection with automated DDoS and WAF solutions
      Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. A…
      - 9 Oct 19, 6:00pm -
    • Bad Bots, Big Business: The impact of malicious bots on e-commerce sites
      E-Commerce businesses are bombarded with specialized bot attacks—more often than you probably realize. Most IT pros have experienced the craziness and utter chaos that ensues as malicious bots attack with persistence. The lack of visibility, the t…
      - 1 Oct 19, 5:00pm -
    • API Security: Discover Complete Visibility Throughout Your API Endpoints
      Gartner predicts that by 2022, API abuse will become the most frequent attack vector resulting in data breaches for enterprise web applications. Join our API Security Principal Product Manager, Ziv Grinberg and Senior Product Marketing Manager Michae…
      - 18 Sep 19, 5:00pm -
    • Simple Security Licensing For The Cloud Era: Introducing Imperva FlexProtect
      FlexProtect is a simple and predictable way to secure your entire environment whether its on-premises, in the cloud or hybrid.
      - 9 Jul 19, 1:45am -
    • Security Analytics wird begehrteste Lösung (nur auf Englisch verfügbar)
      Wissen Sie, welche Sicherheitsansätze Ihre Peers beim exponentiellen Wachstum von Sicherheitsdaten verfolgen? Sie wissen, dass sich Bedrohungen ständig weiterentwickeln. Aber wissen Sie, wie sich Ihre aktuelle Aufstellung im Bereich der Cybersicher…
      - 20 Jun 19, 5:45pm -
    • Security Analytics(英語版のみ)が最も求められるソリューションに
      セキュリティデータの急増に伴い、同業者がどのようなセキュリティ対策を講じているかご存知ですか? サイバー脅威の環境は絶えず進化を遂げていますが、自社の現在のサイバーセキ…
      - 20 Jun 19, 5:40pm -
    • Die 5 besten Verfahrensweisen für mehrschichtige Verteidigung
      Anwendungen sind das Lebenselixier von Unternehmen, aber sie zu schützen, ist eine massive Herausforderung, die sich mit zunehmender Häufigkeit und Anzahl der Bedrohungen vervielfacht. Angesichts der Probleme, die mit dem Umzug von Anwendungen in d…
      - 18 Jun 19, 10:45pm -
    • アプリケーションを多層防御するための5つのベストプラクティス
      - 14 Jun 19, 5:50pm -
    • Exec Talk: Working With Security Leader, Imperva
      Imperva is evolving to continue to be the defender of your business growth.
      - 11 Jun 19, 5:00pm -
    • RASP has your WAF's back: Protect against zero days by default
      With nefarious actors constantly evolving their tactics, leading companies should adopt a layered defense approach to mitigate their risk of exploitations. On the edge, WAFs provide the first line of defense against things like bot attacks, DDoS, ATO…
      - 4 Jun 19, 6:00pm -
    • Migrating to the Cloud Safely & Securely - Imperva Part 3
      Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven bus…
      - 23 May 19, 5:00pm -
    • Risk Buydown: Why Data Security is a Must
      With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well…
      - 1 May 19, 6:25pm -
    • Buying Down Risk in the New World of App Development - Imperva Part 2
      In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities…
      - 25 Apr 19, 5:00pm -
    • Security Analytics becomes Most-Wanted Solution
      With exponential growth of security data, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of y…
      - 10 Apr 19, 3:00pm -
    • Best Practices for Mitigating Data Breach Risk - Imperva Part 1
      Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data acce…
      - 28 Mar 19, 5:00pm -
    • Five Best Practices for Application Defense in Depth
      Applications are the lifeblood of enterprise, but protecting them is a massive challenge that multiplies as the rate and volume of threats increase. Layer in the issues associated with moving applications to the cloud, using open source code, impleme…
      - 27 Mar 19, 8:00pm -
    • Cyber Security Battles: How to Prepare and Win
      What is the future of cyber warfare and how does it impact enterprise security? While the world has yet to see a cyber battle between AI systems, experts predict this might be on the horizon in the next three to five years. Join this interactive Q&…
      - 6 Mar 19, 5:30pm -
    • Top Cybersecurity Trends for 2019
      Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overridin…
      - 19 Dec 18, 6:00pm -
    • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
      Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack…
      - 15 Nov 18, 4:00pm -
    • Security Analytics: How to Identify True Risks to Your Data
      The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage b…
      - 8 Nov 18, 5:00pm -
    • Tech Demo: Key Features for Web Application Firewalls
      Join to better understand key requirements needed in a web application firewall to protect applications and critical data in this changing world of application development and security. This webinar includes:- A detailed explanation of key fea…
      - 17 Oct 18, 3:00pm -
    • Tech Demo: Stop Data Breaches by Securing Along the Breach Kill Chain
      Attackers will continue to attempt to breach and steal sensitive data from organizations. Our goal is to detect those potential breaches as early as possible, before any actual harm is done. There are some early signs of data breaches. By detecting t…
      - 9 Oct 18, 3:00pm -
    • Trends and Challenges in Web Application Firewalls
      As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewa…
      - 3 Oct 18, 8:00pm -
    • Data Breach: How to Identify the Early Signs
      With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early b…
      - 20 Sep 18, 3:00pm -
    • Detect Data Breaches without Alert Fatigue
      Data breaches are difficult to detect because security team is often drowning in alerts.Imperva CounterBreach uses machine learning and analytics to identify suspicious data access and prioritize threats.By distilling millions of alerts, Imperva a…
      - 1 Aug 18, 9:05pm -
    • Infrastructure DDoS Protection Analytics Demo
      In this video, Senior Security Engineer Jonathan Gruber demos Imperva’s enhanced infrastructure DDoS protection analytics. The new dashboard shows details such as top traffic patterns by source, destination IP, port or packet size for a protected n…
      - 1 Aug 18, 4:20pm -
    • Video: Database Compliance and Security Overview
      This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many…
      - 9 Jul 18, 10:25pm -
    • DevOps Security Challenges and Solutions
      What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of clou…
      - 24 Jun 18, 5:00pm -
    • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
      A massive overload of security events.Constant data breaches.Sophisticated threats.Combine these three facts, and you get cumbersome and complicated security-related investigations.Join this webinar to learn how to: • Efficiently manage…
      - 21 Jun 18, 5:00pm -
    • Securing the Cryptocurrency Exchange
      Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attack…
      - 14 Jun 18, 2:00pm -
    • Living in the GDPR World – What Now?
      With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate g…
      - 29 May 18, 4:00pm -

    Juniper Networks

    Bluecoat

    Thales e-Security

    • The Changing Landscape of Data Security for U.S. Federal Agencies
      With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this…
      - 30 May 19, 6:00pm -
    • Proactive Data Defence for Digital Transformation
      In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.Digital transformation is business enhancing but fraught with danger. With servi…
      - 22 Nov 18, 10:00am -
    • Is Your Retail Data at Risk?
      The retail industry, already at intersection of online with brick-and-mortar, is one of the most heavily targeted for cyber-attacks, and encountering record levels of data breaches as a result. With digital transformation an imperative, dealing with…
      - 6 Nov 18, 7:00pm -
    • Ensuring Data Security in Hybrid and Multi-Cloud Environments
      Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on “cloud” - the biggest growth area of technology investment this year.Companies are increasingly reliant upon multi-cloud or hybrid cloud to meet speci…
      - 18 Oct 18, 9:00am -
    • Nutanix and Thales, Hyerconverged & Hypersecure
      The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements…
      - 26 Sep 18, 6:00pm -
    • Thales eSecurity - CipherTrust Cloud Key Manager
      For virtually every organization today, the adoption of multiple cloud services continues to expand. According to the AlphaWise/Morgan Stanley 2016 Annual CIO Survey of 100 CIOs, by 2020 over 46% of the application workload will move to the public cl…
      - 30 Aug 18, 8:00pm -
    • Tokenization: Ready for Prime Time
      The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats. Individuals and businesses need to combat these thre…
      - 15 Aug 18, 3:00pm -
    • 2018 Data threats - data breaches, digital transformation - and the way forward
      When 451 Research surveyed 1200 IT security professionals, including 400 across Europe, for the 2018 Thales Data Threat Report, we found that today’s threat environment, digital transformation initiatives and regulations are having a deep impact on…
      - 14 Jun 18, 3:00pm -
    • Proactive Data Defence for Digital Transformation
      Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking pl…
      - 23 Mar 18, 10:00am -
    • 2018 Data Threats - What will it take to stop the breaches?
      Digital transformation initiatives and increased threats have put enterprise data at risk more than ever, with 67% already experiencing a breach, and over half of those breaches in the last year. In this webinar Garrett Bekker, Principal Analyst for…
      - 15 Mar 18, 3:00pm -
    • Is Your Business Fit for GDPR?
      With the clock ticking towards May 2018, NOW is the time to ensure you are taking the right steps to protect your organization and your customers in order to be compliant with General Data Protection Regulation (GDPR).Less than a 1/3 companies are p…
      - 9 Jan 18, 7:00pm -
    • Best Practices for GDPR when hosting data off-premises
      GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises. But what does GD…
      - 17 Nov 17, 11:00am -
    • Cifrado transparente. Asegurando la transformación digital
      La nube, IoT, movilidad y big data están reinventando la forma en que operan y hacen negocios las organizaciones. Sin embargo, muchas empresas no han incluido la seguridad como pieza clave de la transformación digital. Conozca porque es necesario p…
      - 28 Sep 17, 3:00pm -
    • Data Security – Identifying Your Last Line of Defense
      Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.Sensitive data…
      - 13 Jul 17, 8:30am -
    • IT Sicherheitsbedrohungen in Deutschland 2017
      Datensicherheitsvorfälle. DSGVO Risiken. Daten in der Cloud, Big Data und das Internet der Dinge (IoT).95% aller deutschen Unternehmen glauben, dass sie nicht ausreichend gegen Cyberangriffe geschützt sindWas erleben Unternehmen in Deutschland…
      - 6 Jul 17, 12:00pm -
    • NY DFS Cybersecurity Regulations - Are You Prepared?
      New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the sec…
      - 15 Jun 17, 4:00pm -
    • Key Management in the world of Multiple Cloud providers
      Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud. Customers need to know if there is a consistent way to handle this across all their cloud services.…
      - 6 Jun 17, 6:00pm -
    • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
      Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of w…
      - 25 May 17, 3:00pm -
    • Data Encryption for the Cloud-First Era
      The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be r…
      - 18 May 17, 5:00pm -
    • Data Protection for IoT – Securing Enterprise Business Intelligence
      The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best…
      - 17 May 17, 3:00pm -
    • 2017 Data Threats – The Big Disconnect
      Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect. In this webinar Andy Kicklighter with Thales e-Security, and four time p…
      - 8 Feb 17, 4:00pm -
    • Protecting Data in line with the Australian Data Breach Notification
      Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities. With cybercrime and…
      - 15 Sep 16, 6:00am -
    • Virtualization Unwrapped – How to Scale While Remaining Secure
      There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/c…
      - 27 Jul 16, 5:00pm -
    • Scalability & Security – Will we always be playing catch-up?
      With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in mo…
      - 9 Jun 16, 4:00pm -
    • Cloud Based Payments: the future of Mobile Payments?
      In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (…
      - 19 May 16, 12:00pm -
    • The Eye of The Security Cyberstorm
      It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust mos…
      - 11 May 16, 5:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 11:00pm -
    • Innovation and security in the digital payments world
      Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evo…
      - 20 Apr 16, 2:00pm -
    • Making The Migration From EOPS to Vormetric Data Security
      RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
      - 11 Apr 16, 6:00pm -
    • Cloud Payments (HCE): A Simpler Step with Thales HSMs
      Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutio…
      - 13 Jan 16, 3:00pm -
    • How Hyperconverged, Hypersecure Is Your Organization?
      With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexib…
      - 3 Dec 15, 6:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 4:00pm -
    • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs
      Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary…
      - 29 Apr 15, 9:00am -
    • Applications that go bump in the night
      The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step fur…
      - 12 Mar 15, 5:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments”
      This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experien…
      - 22 Oct 14, 7:00am -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 4:00pm -
    • Host Card Emulation (HCE): How to take direct control of mobile payments
      For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availabil…
      - 16 Sep 14, 1:00pm -
    • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia
      Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tor…
      - 23 Oct 13, 12:00pm -
    • Mobile payments- are you in control?
      Join Entrust and Thales e-Security as we share our practical knowledge of securing mobile payment solutions, underpinned by real-world use cases and proven technology. If mobile payments are important for your future company success please register b…
      - 17 Sep 13, 2:00pm -
    • Data Protection in the Cloud – Whose problem is it really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 12 Dec 12, 7:00pm -
    • Data Protection in the Cloud – Whose Problem Is It Really?
      Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the…
      - 23 May 12, 5:00pm -

    Safenet

    More Product Demos