Upcoming Webcasts

Tue March 07, 9:00 AM ET

Vendor Webcast

The New Enterprise Security Model: How to Prevent, Detect and Respond

7th March at 2:00pm GMT || In this webinar, we’ll review the current landscape of security challenges.

x

The New Enterprise Security Model: How to Prevent, Detect and Respond

In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing and CISOs are faced with a monumental challenge: securing information wherever it resides, without interfering with the productivity of the increasingly mobile and connected workforce. The ramifications of poor cloud security decisions have become a boardroom issue. In this webinar, we’ll review the current landscape of security challenges and discuss:

  • How adopting cloud solutions improves your security posture;

  • Why effective security measures start with a great user experience;

  • Why contextual user access data is the key to unlocking smarter security policies

More Info

Sponsored by: Okta

On-Demand Webcasts

Vendor Webcast

Lessons from the field: How are skilled technical testers infiltrating networks?

31 January 2:00pm GMT | Hear from two of SecureWorks' most skilled technical testers who will share lessons learned from some of their most challenging engagements...

x

Lessons from the field: How are skilled technical testers infiltrating networks?

Many organisations have technical testing performed a couple of times a year for reasons such as identifying network vulnerabilities or satisfying industry compliance requirements. Unfortunately, the results and lessons learned are typically limited. Wouldn't it be interesting to learn about the tactics and techniques the most skilled technical testers out there are utilising across different industries and levels of scope? Think of it as an opportunity to learn from the good guys simulating the bad guys, without your organisation having to suffer a genuine breach.

Join this webcast and hear from two of SecureWorks' most skilled technical testers, Nate Drier and Trenton Ivey, who will share lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defence practices.

Key topics covered include:

  • Examples of real-world engagements
  • Tactics and techniques commonly used to achieve their objectives
  • Trends and weaknesses they are seeing in defences
  • Lessons learned
More Info

Sponsored by: Dell SecureWorks

Vendor Webcast

Secure Digital Business Transformation: What every CIO or CISO should know

According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies.

x

Secure Digital Business Transformation: What every CIO or CISO should know

Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom. Digital business transformation is no longer a question of if, but WHEN.

According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren't. How ready is your enterprise? 

Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000 organisations through a massive cloud transformation

More Info

Sponsored by: Zscaler

Vendor Webcast

How a reliable CA can help with the Certificate Lifecycle

Gain expert knowledge and insight

x

How a reliable CA can help with the Certificate Lifecycle

Managing your SSL certificates doesn't have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.
  • Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs. 
  • Discuss what to look for when choosing your certificate provider. - 
  • Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
More Info

Sponsored by: Entrust

Editorial Webcast

EU GDPR Planning - Prioritising your checklist

Join us for this 60 min webcast and check your EU GDPR plans against best practice to ensure you are ready by 25th May 2018

x

EU GDPR Planning - Prioritising your checklist

Will YOU be EU GDPR compliant on 25th May 2018? If you draw up your plan today you'll have 18 months to implement it.  here are no extensions or extenuating circumstances – it's the law and applies to everyone with data on EU citizens.

Brexit won't have happened, so even if the UK eventually draws up ‘adequate' alternative laws, you need to take action now. But what's your priority, and are there any short-cuts? How can encryption reduce your breach reporting liability? Is anonymisation appropriate?  

Join our webinar to check your plans against best practice and by attending you will be able to:
  • Participate in a live Q&A session via the interface
  • Download presentation slides
  • Gain expert knowledge and insight
  • Earn one CPE credit 
More Info

Sponsored by: Tripwire

Vendor Webcast

Stay out of the headlines: A Planned Path to Reducing Risk

Gain expert knowledge and insight

x

Stay out of the headlines: A Planned Path to Reducing Risk

Today's breaches all have a common attack vector – stolen usernames and passwords.  Attackers are making major headway into our businesses with simple tactics that exploit our weakest points.  It's clear that we need to bolster our defences, but prioritisation can seem daunting.  

Join us for this 60 min webcast as we walk through some proven practices for prioritising a risk mitigation strategy. First starting with the easy gaps that most often lead to data breach, and moving to sophisticated and comprehensive control.
More Info

Sponsored by: Centrify

Vendor Webcast

Stop Ransomware In Its Tracks

Learn how ransomware threats work and how to stay secure against them.

x

Stop Ransomware In Its Tracks

Ransomware has become one of the most widespread and damaging threats internet users face today.

Since CryptoLocker first appeared in 2013, we've seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organisations. And in 2016 alone it's cost over $1 billion.

Gain expert knowledge and learn how ransomware threats work and how to stay secure against them. Join us for this 60 min webcast as we discuss the following:
  • Why these attacks are so successful
  • Common ransomware attack paths
  • Critical security features to stop ransomware
  • Nine practical steps to protect your organisation
More Info

Sponsored by: Sophos

Editorial Webcast

Breaches or compliance - what's the key driver for security in the cloud?

Everyone knows that compliance is not the same as security, but the key driver to get the board to spend on security or adopt money-saving technology has traditionally...

x

Breaches or compliance - what's the key driver for security in the cloud?

Early concerns about the security and efficiency of cloud storage are being overcome by the spread of robust solutions, leading to their mainstream acceptance. 

Hand in hand with the rise of cloud is the adoption of mobile devices and remote working, which is undermining the hard-won security of cloud solutions by multiplying the number of access points. 

It's a complex picture, so how do you present this to the board? Traditionally, achieving minimum compliance standards has been a way to get the board to spend on security or adopt money-saving technology.

And that's fine – until you get hacked. In a classic case of shutting the stable door after the horse has bolted, budgets are suddenly unloosed as the board wakes up to the potential downsides of the technology – whether that be mobile devices or cloud– that they have adopted. 
More Info

Sponsored by: IBM

Vendor Webcast

Businesses Held Hostage: Are You Ready for a Ransomware Attack?

We'll discuss how a three-pronged strategy of prevention, business continuity and email archiving can help defeat ransomware before it take your business hostage...

x

Businesses Held Hostage: Are You Ready for a Ransomware Attack?

No organisation is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases - but a far better strategy is to be prepared for the threat before ransomware strikes.

How ready is your organisation to face a ransomware attack? Join 451 Research and Mimecast during this webinar to explore:
  • The impact of ransomware: Just how serious a threat is it?
  • How could ransomware get into your organisation?
  • Why is ransomware happening more now than ever before?
  • How can you best defend against a ransomware attack ... before it locks up your critical information assets?
More Info

Sponsored by: Mimecast

Vendor Webcast

Activated Charcoal - Making sense of endpoint data

Learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

x

Activated Charcoal - Making sense of endpoint data

Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues. 

This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralise advanced threats.

You'll discover:

  • Why endpoints are the new perimeter
  • How employees can strengthen your security operations strategy
  • Techniques to test and validate security awareness programs
  • How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralise threats using the LogRhythm security intelligence and analytics platform

 

 

More Info

Sponsored by: LogRhythm

Vendor Webcast

How Trusted Identities can help you accelerate your Digital Business Transformation

This webinar takes a look at some of the security challenges created by today's cloud-centric and mobile- enabled environment.

x

How Trusted Identities can help you accelerate your Digital Business Transformation

We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof. Now your enterprise must provide secure access to employees, customers and partners who work outside the perimeter and who rely on a wide range of cloud apps and mobile devices. The traditional security and enablement solutions built for enterprises with a controllable perimeter, simply will not work. The only truly effective way to solve today's security dilemma is to take an identity-based approach – Trusted Identity.

More Info

Sponsored by: Entrust

Vendor Webcast

From Hummingbad to worse - are targeted androids attacks becoming a trend?

Without the ability to detect and stop suspicious behaviour, millions of Android devices and the data on them remain exposed.

x

From Hummingbad to worse - are targeted androids attacks becoming a trend?

Yingmob uses HummingBad to control 10 million devices globally and generate $300,000 per month in fraudulent ad revenue. This steady stream of cash, coupled with a focused organisational structure, proves cyber criminals can easily become financially self-sufficient.

Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate.  For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder.

Join NTT Com Security and Check Point Software Technologies for this webinar and you will learn
  • What were some of the findings from the research team
  • What is the risk to organisations from Hummingbad and similar Malware campaigns
  • Are these types of attacks becoming the most common form of mobile threat
  • How can organisations protect themselves
More Info

Sponsored by: NTT Security

Editorial Webcast

Understand the threats to your BYOD strategy, and how you can ensure success

How effective can BYOD security be?

x

Understand the threats to your BYOD strategy, and how you can ensure success

Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. 

  • Learn what are the biggest threats to your network from staff mobile devices
  • Discover how attackers undermine your policy
  • Identify the leading mistakes made by your users.
  • Adopt an approach that delivers what your policy promises.
More Info

Sponsored by: IBM

Vendor Webcast

There will be attacks - Prepare your email defenses

Email threats are evolving, dangerous and real. A whopping 91% of cyberattacks start with an email*. But hey, 9% don't, right?

x

There will be attacks - Prepare your email defenses

Learn about the latest threat trends and the newest addition to Mimecast, Targeted Threat Protection, Impersonation Protect.

Webinar agenda:
  • Discover how your email could be hacked by any number of threats
  • Examine the damaging impact attacks have on businesses 
  • Learn why your employees could be the weakest link in email security
More Info

Sponsored by: Mimecast

Vendor Webcast

PKI: Essential security and enablement for today's digital business

The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.

x

PKI: Essential security and enablement for today's digital business

In Digital Business today, with traditional barriers falling away, trust in every entity on your network becomes crucial. Cyber threats are at an all-time high and all cyber threats are fundamentally an attack on identity, whether that be an individual, a device or an application. All need to be strongly identified and differentiated in in terms of privilege and permissions. 

PKI is the ideal vehicle for this, enabling strong identity across the enterprise. In this session, Josh Jabs, Vice President, Strategic Marketing at Entrust Datacard will look at the drivers and challenges of today's digital business and discuss how PKI can build a profoundly secure architecture for the digital enterprise.

More Info

Sponsored by: Entrust

Editorial Webcast

What are The most important things you need to know about Enterprise Mobility Management?

Learn how to take an integrated, comprehensive approach to managing and securing mobile devices, the content they contain, the applications and mobile transactions...

x

What are The most important things you need to know about Enterprise Mobility Management?

How expensive is it to deploy an Enterprise Mobility Solution? What do your staff need to understand about retrofitting legacy systems, or enrolling new mobile devices and how is their security maintained?

Think mobile anew, enforce your email policies and prevent data loss, enable file access, select appropriate enterprise applications, build native mobile apps and put them all together in a strategy that embraces the benefits of mobility.

More Info

Sponsored by: IBM

Vendor Webcast

Global Security Performance: How Top Nations Stack Up

How do some of the most prominent nations in the international economy differ in cyber-security performance? As organisations increasingly open offices off-shores...

x

Global Security Performance: How Top Nations Stack Up

In its latest research report, BitSight studied the security performance of companies with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

Join Stephen Boyer, CTO and Co-founder of BitSight as he takes a deep dive into the threat landscape that organisations face in each of these nations. 

Viewers will also learn: 

● Why companies in some nations tend to be more or less secure than others

● How global companies deal with threats such as botnet infections, SSL attacks, and spam propagation.

● What businesses with a large global presence can do to mitigate cyber risk across their ecosystem
More Info

Sponsored by: BitSight

Vendor Webcast

The key role threat intelligence can play in your cyber security strategy

What drives the actions of your security teams?

x

The key role threat intelligence can play in your cyber security strategy

Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams? 

Are they effectively prioritising what needs protection as well as identifying the most likely threats, or even if a breach has already occurred? Understandable and actionable threat intelligence has the power to inform more proactive and therefore more effective information security. And time is critical, so this intelligence should be available and actionable in real time.

This webinar will cover:

  • Quickly gathering threat intelligence on common “data dump” sites and social analysis for much faster crackdown on potentially serious data leaks.

  • Analysis of the latest attacker tactics, techniques, and procedures (TTPs) for reduced risk of breaches and greatly improved resource allocation.

  • Understanding how threat intelligence ultimately drives action that reduces risk.

More Info

Sponsored by: Recorded Future

Editorial Webcast

Overcoming the challenges presented by mobility in the enterprise

In this webinar we look at the problems and consider some of the potential solutions.

x

Overcoming the challenges presented by mobility in the enterprise

There are now two stakeholders on every mobile device used by employees: the enterprise and the user. Old-style tools have become inadequate to enforce corporate control. If users don't like them, they get around them, including sharing data back and forth between apps. That's because consumerisation of IT means personal devices and apps now have corporate levels functionality.

So what are the granular management controls that you need working at the app or data levels? Can these controls leave the personal user experience unaffected, while securing the data? Should you build “enterprise” versions of apps or use specific devices with granular, per-app policies built into the operating system?

More Info

Sponsored by: IBM

Vendor Webcast

Intelligent Security Automation: Making time for pro-activity

By slashing the time from threat detection to resolution and by eliminating false positives you can free up analyst time for high value activities such as proactive...

x

Intelligent Security Automation: Making time for pro-activity

Chances are that over time you've added layers of security controls which have resulted in a growing number of alerts that need investigation. Analytics are key to threat resolution but effective cyber security is no longer a human scale process. With each new layer of defence the volume of alerts has grown to the point where only automation can help SOC analyst keep pace.

To better balance the large scale of threat volumes with the need for rapid analysis Huntsman industrialises the security management process. It delivers automated functions, streamlined processing and simplifies the day to day tasks of the security analyst. Huntsman eliminates false positives, automatically verifies any compromised asset and extracts only the relevant threat intelligence for immediate resolution so analysts can focus on the threats that matter.

 

More Info

Sponsored by: Huntsman

Vendor Webcast

Tracking the most significant cyber threat: Ransomware

Join this webcast as we discuss steps you can take to reduce the risk of ransomware infections.

x

Tracking the most significant cyber threat: Ransomware

Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

While these attacks are most prevalent on employee laptops. Ransomware is now targeting departmental file servers and other critical infrastructure. But, there are steps you can take to better protect your company and reduce the risk of ransomware infections – and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware. 

Learn how:

  • Ransomware has evolved and what we know about it today
  • To predict what ransomware might do next
  • You can identify the internet infrastructure used by the attackers to connect, control and transfer the encryption keys
More Info

Sponsored by: OpenDNS

Vendor Webcast

A new vision for CISOs - Unprecedented visibility of your attack surface

Earn 1 CPE credit when you attend

x

A new vision for CISOs - Unprecedented visibility of your attack surface

In today's complex security landscape, networks are getting larger and more complicated, creating myriad holes in defences, while cyber attacks are increasing in sophistication and persistence. CISOs are challenged to centralise security and gain visibility over the attack surface, the ways in which their IT systems are vulnerable to threats, including potential attack vectors.

According to a 2015 Gartner report 1, enterprises are shifting security budgets to security management platforms that integrate existing technologies, unify data from multiple vendors, provide greater insight through advanced analytics and enable security operations teams to automate and prioritise activities.

Register today to learn how to:

  • Visualise and analyse your attack surface with an interactive model that links network topology, network connections, business units and organisational hierarchy
  • Categorise IOEs, rank the severity of those IOEs and display the data in a format understandable to both technical and business-oriented viewers
  • Drill down with interactive tools to get quick summaries of actionable intelligence; pinpoint and protect the systems most vulnerable to threats
  • Systematically manage and reduce the attack surface by allocating security resources to where they are most needed
More Info

Sponsored by: Skybox

Editorial Webcast

What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device?

x

What mobile policy suits your organisation?

Whether you can or should retain corporate owned devices, what are the key BOYD policies – and how are they communicated – including ensuring that if tracking or remote wipe are included, it is thoroughly explained to all staff that they need to back up their personal data, and that the policy applies equally to the board? 

Whose data is it anyway if you wipe valued personal photos? What about wearable technology?  Is the issue the device, or the framework within which devices are used? Can security be moved to the data itself to minimise the impact of the access device? It depends what you want to protect and why. We look at the options and selection criteria.

More Info

Sponsored by: IBM

Vendor Webcast

Unlock the power of mobile as the new desktop

Earn 1 CPE credit when you attend

x

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. Your employees are only going to use them more and more in their jobs — and customer service levels, enterprise agility, and overall profitability will improve because of it. The challenge posed by this new mobile world is security. Traditional identity and access controls built around desktops and laptops won't work. Passwords are too vulnerable, hardware tokens are too cumbersome, smart cards don't fit and any approach that causes most employees trouble will lead them to circumvent friction.
More Info

Sponsored by: Entrust

Editorial Webcast

Beyond the perimeter - Integrating mobile access to company data

Earn 1 CPE credit when you attend

x

Beyond the perimeter - Integrating mobile access to company data

Ensure the integrity and security of your company data when it is accessed or used beyond the enterprise walls by mobile devices and cloud services. No matter what device or App you use, a data-centric approach to information security can give you a consistently high level of security and allow you to share and secure your content with fast deployment and easy management of devices and apps.
More Info

Sponsored by: IBM

Vendor Webcast

Would you know if your network is compromised?

Earn 1 CPE credit when you attend

x

Would you know if your network is compromised?

Security Intelligence provides a unique solution to the cyber threats that are affecting any organisation, whether they are aware of it or not. In this presentation, Matt Ellison will discuss how increasing the maturity of an organisation's security intelligence can allow them to identify and negate threats more quickly. Real world examples will show how a simple change in approach resulted in organisations discovering their systems had already been compromised and how they were able to address the issue before a breach occurred.

Most organisations are focused on protection; firewalls, mail scanning, endpoint protection, intrusion prevention and so forth. However, none of those help if an employee takes a bribe to steal information, or a provides access to a person they believe is telecoms engineer. By adopting a mindset that accepts the possibility that an organisation's infrastructure could be compromised, the chances of discovering and mitigating these risks is greatly reduced.

More Info

Sponsored by: LogRhythm

Vendor Webcast

Preparing for Change: What does the new EU GDPR mean for Data Masking?

Earn 1 CPE credit when you attend

x

Preparing for Change: What does the new EU GDPR mean for Data Masking?

Data is the fuel of modern business, but its accessibility is severely restricted by cyber crime.  Under pressure to respond to the understandable concern from consumers, governments are turning to regulations in order to force organisations to take all appropriate care when handling sensitive data, no matter what the cost. 

In the latest EU General Data Protection Regulation (GDPR) companies will be required to mask 100% of their data – both production and non-production. The fine for non-compliance could be as much as 4% of global turnover so this is something that executives, IT, corporate legal departments, Risk & Compliance or any department that generates or manages data must understand.

In this webinar find out:

  • What you need to do under EU GDPR
  • What you can do to comply
  • How next generation data masking can help with compliance
  • Why you need to address both the data security and  the data distribution challenge
More Info

Sponsored by: Delphix

Vendor Webcast

Understand your attacker: A practical guide to identifying TTPs with Threat Intelligence

Earn 1 CPE credit when you attend

x

Understand your attacker: A practical guide to identifying TTPs with Threat Intelligence

To effectively combat threats to the enterprise, security teams must understand their organisation's adversaries and the attack tools, techniques, and processes (TTPs) they are wont to weaponize. Threat analysts can create that picture for security teams, ultimately providing a set of actionable recommendations for threat management, by piecing together data from the Web that indicates a threat to the enterprise.

Recorded Future will share research on the latest attacker tools, provide architecture recommendations for organisations looking to strengthen security controls, and help analysts use threat intelligence to more quickly and effectively identify threat trends. Attend this webinar to learn how to:

  • Apply methodologies for proactive and strategic source identification and information analysis.
  • Understand vendor information sources.
  • Prioritise threats in a business context.
  • Differentiate between vulnerability management and threat intelligence. 
  • Use best practices for working with peer teams to test and strengthen security controls.
More Info

Sponsored by: Recorded Future