Upcoming Webcasts

Wed May 17, 9:00 AM ET

Vendor Webcast

Threat Intelligence is Dead. Long Live Threat Intelligence!

17th May at 2:00pm BST || Join us as we discuss what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence...

x

Threat Intelligence is Dead. Long Live Threat Intelligence!

Threat Intelligence is a very hot topic at the moment and many organisations are looking to establish their own Threat Intelligence capabilities. Everybody wants their own reliable, comprehensive and actionable feed of Threat Intelligence that can inform and bolster their cyber-security controls, but with such a vast multitude of available indicators, how do you make sense of them all?


In this live webcast, Rafe Pilling, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), cuts through the hype to explain firstly, what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences.

More Info

Sponsored by: SecureWorks

Thu May 18, 9:00 AM ET

Vendor Webcast

How to do Flow-Based Security Monitoring at 100G

18th May at 2:00pm BST || Are you ready to detect threats at any speed?

x

How to do Flow-Based Security Monitoring at 100G

The ability to detect threats at any speed is a challenge, but with networks now operating at 40G and 100G, these challenges become even more complex. And with a severe lack of commercial offerings capable of meeting industry demands, many enterprises and cloud service providers are driven to build their own security solutions. But how do you build an efficient solution that provides complete traffic visibility at 100G?
Join this webinar to hear ntop founder Luca Deri explain how they helped a global hyperscale Internet company do just that. By developing a 1:1 NetFlow solution with zero packet loss, they successfully enabled complete and efficient traffic visibility, even at 100G.
More Info

Sponsored by: Napatech

Tue June 13, 9:00 AM ET

Vendor Webcast

De-Perimeterisation and Going Beyond Multi-Factor Authentication

13th June at 2:00pm BST || Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security...

x

De-Perimeterisation and Going Beyond Multi-Factor Authentication

Once you have multi-factor authentication (MFA) installed, how do you take it further in your overall access control programme? 

The idea of getting rid of the perimeter can be intimidating for businesses to contemplate, especially if they’ve only recently solidified one. So let’s not think of it as getting rid of the perimeter, but rather as tightening security on the inside so that the perimeter isn’t the only thing keeping the attacker at bay.

If you’re already in the hybrid environment -- with some of your infrastructure on-premises and some in the cloud -- it’s time to think about re-balancing your security policies, because you already have assets that aren’t within your perimeter.
More Info

Sponsored by: Duo Security

Wed June 21, 9:00 AM ET

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

21st June at 2:00pm BST || There is a data storm coming your way, make sure you are prepared for the storm!

x

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors.  Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

  • How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are
  • How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information
  • How new data privacy regulations are shaping enterprise plans for data security
  • What barriers enterprises encounter to deploying and using data security tools – and how to overcome them

 

More Info

Sponsored by: Thales e-Security

On-Demand Webcasts

Vendor Webcast

GDPR and What It Means for Email Security & Archiving

Are you ready to provide access to personal data in your email archive? You’ve got just a year to get it right.

x

GDPR and What It Means for Email Security & Archiving

Email is especially prone to GDPR violations, given its role as a medium for sharing and storing personal data, as well as its vulnerability to cyber-criminal exploits.

Are you ready to protect the personal data stored in emails as well as provide access to it in your email archive – whenever the data subject asks for it? 

Learn how to build a cyber resilience strategy that reduces GDPR risks for email  ahead of the new fines coming into force

 


More Info

Sponsored by: Mimecast

20/20 Webcast

Fighting Cybercrime with Cognitive Security: Transforming the Security Operations Centre

This 20/20 webcast looks at how cognitive technologies have the potential to revolutionise the way security analysts work

x

Fighting Cybercrime with Cognitive Security: Transforming the Security Operations Centre

The volume of threat data can exceed the capacity of even the most skilled security professional. Analysts can reduce hundreds of thousands of security events every day to those that need further investigation, but it still requires a lot of manpower to identify priorities, then analyse, decide  and implement appropriate responses.  To consider some of the potential solutions to overcome this problem, SC’s editor in chief will be talking to Mike Spradbery, IBM Security's UKI technical leader, to learn how cognitive technologies have the potential to revolutionise the way security analysts work, allowing them to confidently respond to threats at unprecedented speed and scale.

 

More Info

Sponsored by: IBM

Vendor Webcast

The New Enterprise Security Model: How to Prevent, Detect and Respond

In this webinar, we’ll review the current landscape of security challenges.

x

The New Enterprise Security Model: How to Prevent, Detect and Respond

In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing and CISOs are faced with a monumental challenge: securing information wherever it resides, without interfering with the productivity of the increasingly mobile and connected workforce. The ramifications of poor cloud security decisions have become a boardroom issue. In this webinar, we’ll review the current landscape of security challenges and discuss:

  • How adopting cloud solutions improves your security posture;

  • Why effective security measures start with a great user experience;

  • Why contextual user access data is the key to unlocking smarter security policies

More Info

Sponsored by: Okta

Vendor Webcast

Lessons from the field: How are skilled technical testers infiltrating networks?

Hear from two of SecureWorks' most skilled technical testers who will share lessons learned from some of their most challenging engagements and the trends they...

x

Lessons from the field: How are skilled technical testers infiltrating networks?

Many organisations have technical testing performed a couple of times a year for reasons such as identifying network vulnerabilities or satisfying industry compliance requirements. Unfortunately, the results and lessons learned are typically limited. Wouldn't it be interesting to learn about the tactics and techniques the most skilled technical testers out there are utilising across different industries and levels of scope? Think of it as an opportunity to learn from the good guys simulating the bad guys, without your organisation having to suffer a genuine breach.

Join this webcast and hear from two of SecureWorks' most skilled technical testers, Nate Drier and Trenton Ivey, who will share lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defence practices.

Key topics covered include:

  • Examples of real-world engagements
  • Tactics and techniques commonly used to achieve their objectives
  • Trends and weaknesses they are seeing in defences
  • Lessons learned
More Info

Sponsored by: Dell SecureWorks

Vendor Webcast

Secure Digital Business Transformation: What every CIO or CISO should know

According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies.

x

Secure Digital Business Transformation: What every CIO or CISO should know

Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom. Digital business transformation is no longer a question of if, but WHEN.

According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren't. How ready is your enterprise? 

Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000 organisations through a massive cloud transformation

More Info

Sponsored by: Zscaler

Vendor Webcast

How a reliable CA can help with the Certificate Lifecycle

Gain expert knowledge and insight

x

How a reliable CA can help with the Certificate Lifecycle

Managing your SSL certificates doesn't have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.
  • Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs. 
  • Discuss what to look for when choosing your certificate provider. - 
  • Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
More Info

Sponsored by: Entrust

Editorial Webcast

EU GDPR Planning - Prioritising your checklist

Join us for this 60 min webcast and check your EU GDPR plans against best practice to ensure you are ready by 25th May 2018

x

EU GDPR Planning - Prioritising your checklist

Will YOU be EU GDPR compliant on 25th May 2018? If you draw up your plan today you'll have 18 months to implement it.  here are no extensions or extenuating circumstances – it's the law and applies to everyone with data on EU citizens.

Brexit won't have happened, so even if the UK eventually draws up ‘adequate' alternative laws, you need to take action now. But what's your priority, and are there any short-cuts? How can encryption reduce your breach reporting liability? Is anonymisation appropriate?  

Join our webinar to check your plans against best practice and by attending you will be able to:
  • Participate in a live Q&A session via the interface
  • Download presentation slides
  • Gain expert knowledge and insight
  • Earn one CPE credit 
More Info

Sponsored by: Tripwire

Vendor Webcast

Stay out of the headlines: A Planned Path to Reducing Risk

Gain expert knowledge and insight

x

Stay out of the headlines: A Planned Path to Reducing Risk

Today's breaches all have a common attack vector – stolen usernames and passwords.  Attackers are making major headway into our businesses with simple tactics that exploit our weakest points.  It's clear that we need to bolster our defences, but prioritisation can seem daunting.  

Join us for this 60 min webcast as we walk through some proven practices for prioritising a risk mitigation strategy. First starting with the easy gaps that most often lead to data breach, and moving to sophisticated and comprehensive control.
More Info

Sponsored by: Centrify

Vendor Webcast

Stop Ransomware In Its Tracks

Learn how ransomware threats work and how to stay secure against them.

x

Stop Ransomware In Its Tracks

Ransomware has become one of the most widespread and damaging threats internet users face today.

Since CryptoLocker first appeared in 2013, we've seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organisations. And in 2016 alone it's cost over $1 billion.

Gain expert knowledge and learn how ransomware threats work and how to stay secure against them. Join us for this 60 min webcast as we discuss the following:
  • Why these attacks are so successful
  • Common ransomware attack paths
  • Critical security features to stop ransomware
  • Nine practical steps to protect your organisation
More Info

Sponsored by: Sophos

Editorial Webcast

Breaches or compliance - what's the key driver for security in the cloud?

Everyone knows that compliance is not the same as security, but the key driver to get the board to spend on security or adopt money-saving technology has traditionally...

x

Breaches or compliance - what's the key driver for security in the cloud?

Early concerns about the security and efficiency of cloud storage are being overcome by the spread of robust solutions, leading to their mainstream acceptance. 

Hand in hand with the rise of cloud is the adoption of mobile devices and remote working, which is undermining the hard-won security of cloud solutions by multiplying the number of access points. 

It's a complex picture, so how do you present this to the board? Traditionally, achieving minimum compliance standards has been a way to get the board to spend on security or adopt money-saving technology.

And that's fine – until you get hacked. In a classic case of shutting the stable door after the horse has bolted, budgets are suddenly unloosed as the board wakes up to the potential downsides of the technology – whether that be mobile devices or cloud– that they have adopted. 
More Info

Sponsored by: IBM

Vendor Webcast

Businesses Held Hostage: Are You Ready for a Ransomware Attack?

We'll discuss how a three-pronged strategy of prevention, business continuity and email archiving can help defeat ransomware before it take your business hostage...

x

Businesses Held Hostage: Are You Ready for a Ransomware Attack?

No organisation is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases - but a far better strategy is to be prepared for the threat before ransomware strikes.

How ready is your organisation to face a ransomware attack? Join 451 Research and Mimecast during this webinar to explore:
  • The impact of ransomware: Just how serious a threat is it?
  • How could ransomware get into your organisation?
  • Why is ransomware happening more now than ever before?
  • How can you best defend against a ransomware attack ... before it locks up your critical information assets?
More Info

Sponsored by: Mimecast

Vendor Webcast

Activated Charcoal - Making sense of endpoint data

Learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

x

Activated Charcoal - Making sense of endpoint data

Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues. 

This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralise advanced threats.

You'll discover:

  • Why endpoints are the new perimeter
  • How employees can strengthen your security operations strategy
  • Techniques to test and validate security awareness programs
  • How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralise threats using the LogRhythm security intelligence and analytics platform

 

 

More Info

Sponsored by: LogRhythm

Vendor Webcast

How Trusted Identities can help you accelerate your Digital Business Transformation

This webinar takes a look at some of the security challenges created by today's cloud-centric and mobile- enabled environment.

x

How Trusted Identities can help you accelerate your Digital Business Transformation

We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof. Now your enterprise must provide secure access to employees, customers and partners who work outside the perimeter and who rely on a wide range of cloud apps and mobile devices. The traditional security and enablement solutions built for enterprises with a controllable perimeter, simply will not work. The only truly effective way to solve today's security dilemma is to take an identity-based approach – Trusted Identity.

More Info

Sponsored by: Entrust

Vendor Webcast

From Hummingbad to worse - are targeted androids attacks becoming a trend?

Without the ability to detect and stop suspicious behaviour, millions of Android devices and the data on them remain exposed.

x

From Hummingbad to worse - are targeted androids attacks becoming a trend?

Yingmob uses HummingBad to control 10 million devices globally and generate $300,000 per month in fraudulent ad revenue. This steady stream of cash, coupled with a focused organisational structure, proves cyber criminals can easily become financially self-sufficient.

Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate.  For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder.

Join NTT Com Security and Check Point Software Technologies for this webinar and you will learn
  • What were some of the findings from the research team
  • What is the risk to organisations from Hummingbad and similar Malware campaigns
  • Are these types of attacks becoming the most common form of mobile threat
  • How can organisations protect themselves
More Info

Sponsored by: NTT Security

Editorial Webcast

Understand the threats to your BYOD strategy, and how you can ensure success

How effective can BYOD security be?

x

Understand the threats to your BYOD strategy, and how you can ensure success

Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. 

  • Learn what are the biggest threats to your network from staff mobile devices
  • Discover how attackers undermine your policy
  • Identify the leading mistakes made by your users.
  • Adopt an approach that delivers what your policy promises.
More Info

Sponsored by: IBM

Vendor Webcast

There will be attacks - Prepare your email defenses

Email threats are evolving, dangerous and real. A whopping 91% of cyberattacks start with an email*. But hey, 9% don't, right?

x

There will be attacks - Prepare your email defenses

Learn about the latest threat trends and the newest addition to Mimecast, Targeted Threat Protection, Impersonation Protect.

Webinar agenda:
  • Discover how your email could be hacked by any number of threats
  • Examine the damaging impact attacks have on businesses 
  • Learn why your employees could be the weakest link in email security
More Info

Sponsored by: Mimecast

Vendor Webcast

PKI: Essential security and enablement for today's digital business

The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.

x

PKI: Essential security and enablement for today's digital business

In Digital Business today, with traditional barriers falling away, trust in every entity on your network becomes crucial. Cyber threats are at an all-time high and all cyber threats are fundamentally an attack on identity, whether that be an individual, a device or an application. All need to be strongly identified and differentiated in in terms of privilege and permissions. 

PKI is the ideal vehicle for this, enabling strong identity across the enterprise. In this session, Josh Jabs, Vice President, Strategic Marketing at Entrust Datacard will look at the drivers and challenges of today's digital business and discuss how PKI can build a profoundly secure architecture for the digital enterprise.

More Info

Sponsored by: Entrust

Editorial Webcast

What are The most important things you need to know about Enterprise Mobility Management?

Learn how to take an integrated, comprehensive approach to managing and securing mobile devices, the content they contain, the applications and mobile transactions...

x

What are The most important things you need to know about Enterprise Mobility Management?

How expensive is it to deploy an Enterprise Mobility Solution? What do your staff need to understand about retrofitting legacy systems, or enrolling new mobile devices and how is their security maintained?

Think mobile anew, enforce your email policies and prevent data loss, enable file access, select appropriate enterprise applications, build native mobile apps and put them all together in a strategy that embraces the benefits of mobility.

More Info

Sponsored by: IBM

Vendor Webcast

Global Security Performance: How Top Nations Stack Up

How do some of the most prominent nations in the international economy differ in cyber-security performance? As organisations increasingly open offices off-shores...

x

Global Security Performance: How Top Nations Stack Up

In its latest research report, BitSight studied the security performance of companies with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

Join Stephen Boyer, CTO and Co-founder of BitSight as he takes a deep dive into the threat landscape that organisations face in each of these nations. 

Viewers will also learn: 

● Why companies in some nations tend to be more or less secure than others

● How global companies deal with threats such as botnet infections, SSL attacks, and spam propagation.

● What businesses with a large global presence can do to mitigate cyber risk across their ecosystem
More Info

Sponsored by: BitSight

Vendor Webcast

The key role threat intelligence can play in your cyber security strategy

What drives the actions of your security teams?

x

The key role threat intelligence can play in your cyber security strategy

Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams? 

Are they effectively prioritising what needs protection as well as identifying the most likely threats, or even if a breach has already occurred? Understandable and actionable threat intelligence has the power to inform more proactive and therefore more effective information security. And time is critical, so this intelligence should be available and actionable in real time.

This webinar will cover:

  • Quickly gathering threat intelligence on common “data dump” sites and social analysis for much faster crackdown on potentially serious data leaks.

  • Analysis of the latest attacker tactics, techniques, and procedures (TTPs) for reduced risk of breaches and greatly improved resource allocation.

  • Understanding how threat intelligence ultimately drives action that reduces risk.

More Info

Sponsored by: Recorded Future

Editorial Webcast

Overcoming the challenges presented by mobility in the enterprise

In this webinar we look at the problems and consider some of the potential solutions.

x

Overcoming the challenges presented by mobility in the enterprise

There are now two stakeholders on every mobile device used by employees: the enterprise and the user. Old-style tools have become inadequate to enforce corporate control. If users don't like them, they get around them, including sharing data back and forth between apps. That's because consumerisation of IT means personal devices and apps now have corporate levels functionality.

So what are the granular management controls that you need working at the app or data levels? Can these controls leave the personal user experience unaffected, while securing the data? Should you build “enterprise” versions of apps or use specific devices with granular, per-app policies built into the operating system?

More Info

Sponsored by: IBM

Vendor Webcast

Intelligent Security Automation: Making time for pro-activity

By slashing the time from threat detection to resolution and by eliminating false positives you can free up analyst time for high value activities such as proactive...

x

Intelligent Security Automation: Making time for pro-activity

Chances are that over time you've added layers of security controls which have resulted in a growing number of alerts that need investigation. Analytics are key to threat resolution but effective cyber security is no longer a human scale process. With each new layer of defence the volume of alerts has grown to the point where only automation can help SOC analyst keep pace.

To better balance the large scale of threat volumes with the need for rapid analysis Huntsman industrialises the security management process. It delivers automated functions, streamlined processing and simplifies the day to day tasks of the security analyst. Huntsman eliminates false positives, automatically verifies any compromised asset and extracts only the relevant threat intelligence for immediate resolution so analysts can focus on the threats that matter.

 

More Info

Sponsored by: Huntsman