Upcoming Webcasts

Thu June 29, 9:00 AM ET

Vendor Webcast

Using Augmented Intelligence to address the human element

29th June at 2:00pm BST || So how do you spot a criminal operating on your network with legitimate credentials, and avoid blaming innocent staff – or catch the...

x

Using Augmented Intelligence to address the human element

Today’s information-rich enterprise needs a 360 view of its data, under 24 hour analysis to spot anomalies and actions that contravene agreed policies and behaviours - in essence the who, what, when and where of your critical data.
 
And when it comes to the ‘who’, you need to identify and address the human element in your network security to safeguard your organisation, its customers and your staff.
 
So how do you spot a criminal operating on your network with legitimate credentials, and avoid blaming innocent staff – or catch the malicious staffer gone bad?  
 
By using augmented intelligence to leverage brain power with processing power, combining human experience with machine powered pattern recognition in big data to multiply the results achieved by your best staff.
More Info

Sponsored by: ZoneFox

On-Demand Webcasts

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

There is a data storm coming your way, make sure you are prepared for the storm!

x

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors.  Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

  • How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are
  • How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information
  • How new data privacy regulations are shaping enterprise plans for data security
  • What barriers enterprises encounter to deploying and using data security tools – and how to overcome them

 

More Info

Sponsored by: Thales e-Security

Vendor Webcast

Your GDPR Plan: 4 Steps to Bolster Security & Meet Compliance

GDPR will impact both your organisation and the way you think about its security but where do you start?

x

Your GDPR Plan: 4 Steps to Bolster Security & Meet Compliance

25th May, 2018, will mark the enforcement of the first comprehensive overhaul of European data protection legislation in over twenty years. The critical date is looming ever closer, and the amount of attention on the General Data Protection Regulation and speculation over whether some of the world’s largest organisations will meet the deadline is growing rapidly. And deservedly so, it’s a big deal. Ultimately, the GDPR will impact both your organisation and the way you think about its security.  But where do you start?  What should organisations be doing to ensure that they are taking positive steps towards compliance, but also generating enough urgency internally to be able to achieve this goal? Join Hadi Hosn, Head of Security Strategy and GRC Consulting and Resident GDPR Practitioner in EMEA for SecureWorks, as he reviews the GDPR basics, what they mean for your business, and the steps you can be taking now on your journey to compliance. Whether you are just starting to think about GDPR, looking for help on where to go next, or raising awareness and reinforcing the importance of the GDPR in your organisation, this webcast is for you. In this webcast you will learn:
  • GDPR basics – what you need to know
  • What the regulation means for businesses
  • The SecureWorks point of view
  • The SecureWorks approach to achieving GDPR Compliance
  • More Info

    Sponsored by: SecureWorks

    Vendor Webcast

    How to keep the peace between security and development

    Listen to this webinar to understand how recent research has found that security and development are actually more aligned than we previously thought.

    x

    How to keep the peace between security and development

    It’s long been thought that security teams and development are on opposite sides of a battlefield. Security makes it difficult for dev to reach their goals while developers disregard security protocols in favour of speed. However recent research by ESG and Veracode has found that security and development are actually more aligned than we previously thought.
     
    Listen to this webinar to understand:
    • The current state of security in the development process
    • The real-life results of implementing DevOps into an organisation
    • Where security and development teams can find common ground
    More Info

    Sponsored by: Veracode

    Vendor Webcast

    De-Perimeterisation and Going Beyond Multi-Factor Authentication

    Learn about how business environments can use MFA on the road to de-perimeterisation and zero-trust models to improve internal security.

    x

    De-Perimeterisation and Going Beyond Multi-Factor Authentication

    Once you have multi-factor authentication (MFA) installed, how do you take it further in your overall access control programme? 

    The idea of getting rid of the perimeter can be intimidating for businesses to contemplate, especially if they’ve only recently solidified one. So let’s not think of it as getting rid of the perimeter, but rather as tightening security on the inside so that the perimeter isn’t the only thing keeping the attacker at bay.

    If you’re already in the hybrid environment -- with some of your infrastructure on-premises and some in the cloud -- it’s time to think about re-balancing your security policies, because you already have assets that aren’t within your perimeter.
    More Info

    Sponsored by: Duo Security

    Vendor Webcast

    How to do Flow-Based Security Monitoring at 100G

    Are you ready to detect threats at any speed?

    x

    How to do Flow-Based Security Monitoring at 100G

    The ability to detect threats at any speed is a challenge, but with networks now operating at 40G and 100G, these challenges become even more complex. And with a severe lack of commercial offerings capable of meeting industry demands, many enterprises and cloud service providers are driven to build their own security solutions. But how do you build an efficient solution that provides complete traffic visibility at 100G?
    Join this webinar to hear ntop founder Luca Deri explain how they helped a global hyperscale Internet company do just that. By developing a 1:1 NetFlow solution with zero packet loss, they successfully enabled complete and efficient traffic visibility, even at 100G.
    More Info

    Sponsored by: Napatech

    Vendor Webcast

    Threat Intelligence is Dead. Long Live Threat Intelligence!

    Join us as we discuss what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences...

    x

    Threat Intelligence is Dead. Long Live Threat Intelligence!

    Threat Intelligence is a very hot topic at the moment and many organisations are looking to establish their own Threat Intelligence capabilities. Everybody wants their own reliable, comprehensive and actionable feed of Threat Intelligence that can inform and bolster their cyber-security controls, but with such a vast multitude of available indicators, how do you make sense of them all?


    In this live webcast, Rafe Pilling, Senior Researcher with the SecureWorks Counter Threat Unit (CTU), cuts through the hype to explain firstly, what true Threat Intelligence is, and secondly, how your organisation can effectively integrate Threat Intelligence into your cyber defences.

    More Info

    Sponsored by: SecureWorks

    Vendor Webcast

    GDPR and What It Means for Email Security & Archiving

    Are you ready to provide access to personal data in your email archive? You’ve got just a year to get it right.

    x

    GDPR and What It Means for Email Security & Archiving

    Email is especially prone to GDPR violations, given its role as a medium for sharing and storing personal data, as well as its vulnerability to cyber-criminal exploits.

    Are you ready to protect the personal data stored in emails as well as provide access to it in your email archive – whenever the data subject asks for it? 

    Learn how to build a cyber resilience strategy that reduces GDPR risks for email  ahead of the new fines coming into force

     


    More Info

    Sponsored by: Mimecast

    20/20 Webcast

    Fighting Cybercrime with Cognitive Security: Transforming the Security Operations Centre

    This 20/20 webcast looks at how cognitive technologies have the potential to revolutionise the way security analysts work

    x

    Fighting Cybercrime with Cognitive Security: Transforming the Security Operations Centre

    The volume of threat data can exceed the capacity of even the most skilled security professional. Analysts can reduce hundreds of thousands of security events every day to those that need further investigation, but it still requires a lot of manpower to identify priorities, then analyse, decide  and implement appropriate responses.  To consider some of the potential solutions to overcome this problem, SC’s editor in chief will be talking to Mike Spradbery, IBM Security's UKI technical leader, to learn how cognitive technologies have the potential to revolutionise the way security analysts work, allowing them to confidently respond to threats at unprecedented speed and scale.

     

    More Info

    Sponsored by: IBM

    Vendor Webcast

    The New Enterprise Security Model: How to Prevent, Detect and Respond

    In this webinar, we’ll review the current landscape of security challenges.

    x

    The New Enterprise Security Model: How to Prevent, Detect and Respond

    In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing and CISOs are faced with a monumental challenge: securing information wherever it resides, without interfering with the productivity of the increasingly mobile and connected workforce. The ramifications of poor cloud security decisions have become a boardroom issue. In this webinar, we’ll review the current landscape of security challenges and discuss:

    • How adopting cloud solutions improves your security posture;

    • Why effective security measures start with a great user experience;

    • Why contextual user access data is the key to unlocking smarter security policies

    More Info

    Sponsored by: Okta

    Vendor Webcast

    Lessons from the field: How are skilled technical testers infiltrating networks?

    Hear from two of SecureWorks' most skilled technical testers who will share lessons learned from some of their most challenging engagements and the trends they...

    x

    Lessons from the field: How are skilled technical testers infiltrating networks?

    Many organisations have technical testing performed a couple of times a year for reasons such as identifying network vulnerabilities or satisfying industry compliance requirements. Unfortunately, the results and lessons learned are typically limited. Wouldn't it be interesting to learn about the tactics and techniques the most skilled technical testers out there are utilising across different industries and levels of scope? Think of it as an opportunity to learn from the good guys simulating the bad guys, without your organisation having to suffer a genuine breach.

    Join this webcast and hear from two of SecureWorks' most skilled technical testers, Nate Drier and Trenton Ivey, who will share lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defence practices.

    Key topics covered include:

    • Examples of real-world engagements
    • Tactics and techniques commonly used to achieve their objectives
    • Trends and weaknesses they are seeing in defences
    • Lessons learned
    More Info

    Sponsored by: Dell SecureWorks

    Vendor Webcast

    Secure Digital Business Transformation: What every CIO or CISO should know

    According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies.

    x

    Secure Digital Business Transformation: What every CIO or CISO should know

    Digital transformation is a powerful business enabler that is compelling business leaders to fundamentally change their technology ecosystems. However, such a transformation significantly impacts security, network traffic flows, applications, user experience, and cost, which is why it is top-of-mind in C-suites and the boardroom. Digital business transformation is no longer a question of if, but WHEN.

    According to IDC, by the end of 2017, two-thirds of CEOs in the Global 2000 will have digital transformation at the centre of their corporate strategies. Enterprises that are able to adapt to this digital transformation will see a sustained competitive advantage over the ones that aren't. How ready is your enterprise? 

    Join Michael Sutton, CISO of Zscaler, for a compelling webcast discussing the lessons learned and insights gained as a result of leading a number of Global 2000 organisations through a massive cloud transformation

    More Info

    Sponsored by: Zscaler

    Vendor Webcast

    How a reliable CA can help with the Certificate Lifecycle

    Gain expert knowledge and insight

    x

    How a reliable CA can help with the Certificate Lifecycle

    Managing your SSL certificates doesn't have to be difficult. Join us for a complimentary webinar that covers, in-depth, how a reliable CA helps with the certificate lifecycle.
    • Learn the importance of selecting a reliable Certificate Authority for all your digital certificate needs. 
    • Discuss what to look for when choosing your certificate provider. - 
    • Explore the components of a good certificate management solution and how it implements a Secure Service Lifecycle.
    More Info

    Sponsored by: Entrust

    Editorial Webcast

    EU GDPR Planning - Prioritising your checklist

    Join us for this 60 min webcast and check your EU GDPR plans against best practice to ensure you are ready by 25th May 2018

    x

    EU GDPR Planning - Prioritising your checklist

    Will YOU be EU GDPR compliant on 25th May 2018? If you draw up your plan today you'll have 18 months to implement it.  here are no extensions or extenuating circumstances – it's the law and applies to everyone with data on EU citizens.

    Brexit won't have happened, so even if the UK eventually draws up ‘adequate' alternative laws, you need to take action now. But what's your priority, and are there any short-cuts? How can encryption reduce your breach reporting liability? Is anonymisation appropriate?  

    Join our webinar to check your plans against best practice and by attending you will be able to:
    • Participate in a live Q&A session via the interface
    • Download presentation slides
    • Gain expert knowledge and insight
    • Earn one CPE credit 
    More Info

    Sponsored by: Tripwire

    Vendor Webcast

    Stay out of the headlines: A Planned Path to Reducing Risk

    Gain expert knowledge and insight

    x

    Stay out of the headlines: A Planned Path to Reducing Risk

    Today's breaches all have a common attack vector – stolen usernames and passwords.  Attackers are making major headway into our businesses with simple tactics that exploit our weakest points.  It's clear that we need to bolster our defences, but prioritisation can seem daunting.  

    Join us for this 60 min webcast as we walk through some proven practices for prioritising a risk mitigation strategy. First starting with the easy gaps that most often lead to data breach, and moving to sophisticated and comprehensive control.
    More Info

    Sponsored by: Centrify

    Vendor Webcast

    Stop Ransomware In Its Tracks

    Learn how ransomware threats work and how to stay secure against them.

    x

    Stop Ransomware In Its Tracks

    Ransomware has become one of the most widespread and damaging threats internet users face today.

    Since CryptoLocker first appeared in 2013, we've seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organisations. And in 2016 alone it's cost over $1 billion.

    Gain expert knowledge and learn how ransomware threats work and how to stay secure against them. Join us for this 60 min webcast as we discuss the following:
    • Why these attacks are so successful
    • Common ransomware attack paths
    • Critical security features to stop ransomware
    • Nine practical steps to protect your organisation
    More Info

    Sponsored by: Sophos

    Editorial Webcast

    Breaches or compliance - what's the key driver for security in the cloud?

    Everyone knows that compliance is not the same as security, but the key driver to get the board to spend on security or adopt money-saving technology has traditionally...

    x

    Breaches or compliance - what's the key driver for security in the cloud?

    Early concerns about the security and efficiency of cloud storage are being overcome by the spread of robust solutions, leading to their mainstream acceptance. 

    Hand in hand with the rise of cloud is the adoption of mobile devices and remote working, which is undermining the hard-won security of cloud solutions by multiplying the number of access points. 

    It's a complex picture, so how do you present this to the board? Traditionally, achieving minimum compliance standards has been a way to get the board to spend on security or adopt money-saving technology.

    And that's fine – until you get hacked. In a classic case of shutting the stable door after the horse has bolted, budgets are suddenly unloosed as the board wakes up to the potential downsides of the technology – whether that be mobile devices or cloud– that they have adopted. 
    More Info

    Sponsored by: IBM

    Vendor Webcast

    Businesses Held Hostage: Are You Ready for a Ransomware Attack?

    We'll discuss how a three-pronged strategy of prevention, business continuity and email archiving can help defeat ransomware before it take your business hostage...

    x

    Businesses Held Hostage: Are You Ready for a Ransomware Attack?

    No organisation is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.

    The motivation to pay can be strong, particularly given issues such as criticality of business assets, digital infrastructure, or even safety of life in some cases - but a far better strategy is to be prepared for the threat before ransomware strikes.

    How ready is your organisation to face a ransomware attack? Join 451 Research and Mimecast during this webinar to explore:
    • The impact of ransomware: Just how serious a threat is it?
    • How could ransomware get into your organisation?
    • Why is ransomware happening more now than ever before?
    • How can you best defend against a ransomware attack ... before it locks up your critical information assets?
    More Info

    Sponsored by: Mimecast

    Vendor Webcast

    Activated Charcoal - Making sense of endpoint data

    Learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.

    x

    Activated Charcoal - Making sense of endpoint data

    Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues. 

    This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralise advanced threats.

    You'll discover:

    • Why endpoints are the new perimeter
    • How employees can strengthen your security operations strategy
    • Techniques to test and validate security awareness programs
    • How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralise threats using the LogRhythm security intelligence and analytics platform

     

     

    More Info

    Sponsored by: LogRhythm

    Vendor Webcast

    How Trusted Identities can help you accelerate your Digital Business Transformation

    This webinar takes a look at some of the security challenges created by today's cloud-centric and mobile- enabled environment.

    x

    How Trusted Identities can help you accelerate your Digital Business Transformation

    We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof. Now your enterprise must provide secure access to employees, customers and partners who work outside the perimeter and who rely on a wide range of cloud apps and mobile devices. The traditional security and enablement solutions built for enterprises with a controllable perimeter, simply will not work. The only truly effective way to solve today's security dilemma is to take an identity-based approach – Trusted Identity.

    More Info

    Sponsored by: Entrust

    Vendor Webcast

    From Hummingbad to worse - are targeted androids attacks becoming a trend?

    Without the ability to detect and stop suspicious behaviour, millions of Android devices and the data on them remain exposed.

    x

    From Hummingbad to worse - are targeted androids attacks becoming a trend?

    Yingmob uses HummingBad to control 10 million devices globally and generate $300,000 per month in fraudulent ad revenue. This steady stream of cash, coupled with a focused organisational structure, proves cyber criminals can easily become financially self-sufficient.

    Emboldened by this independence, Yingmob and groups like it can focus on honing their skill sets to take malware campaigns in entirely new directions, a trend Check Point researchers believe will escalate.  For example, groups can pool device resources to create powerful botnets, they can create databases of devices to conduct highly-targeted attacks, or they can build new streams of revenue by selling access to devices under their control to the highest bidder.

    Join NTT Com Security and Check Point Software Technologies for this webinar and you will learn
    • What were some of the findings from the research team
    • What is the risk to organisations from Hummingbad and similar Malware campaigns
    • Are these types of attacks becoming the most common form of mobile threat
    • How can organisations protect themselves
    More Info

    Sponsored by: NTT Security

    Editorial Webcast

    Understand the threats to your BYOD strategy, and how you can ensure success

    How effective can BYOD security be?

    x

    Understand the threats to your BYOD strategy, and how you can ensure success

    Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. 

    • Learn what are the biggest threats to your network from staff mobile devices
    • Discover how attackers undermine your policy
    • Identify the leading mistakes made by your users.
    • Adopt an approach that delivers what your policy promises.
    More Info

    Sponsored by: IBM

    Vendor Webcast

    There will be attacks - Prepare your email defenses

    Email threats are evolving, dangerous and real. A whopping 91% of cyberattacks start with an email*. But hey, 9% don't, right?

    x

    There will be attacks - Prepare your email defenses

    Learn about the latest threat trends and the newest addition to Mimecast, Targeted Threat Protection, Impersonation Protect.

    Webinar agenda:
    • Discover how your email could be hacked by any number of threats
    • Examine the damaging impact attacks have on businesses 
    • Learn why your employees could be the weakest link in email security
    More Info

    Sponsored by: Mimecast

    Vendor Webcast

    PKI: Essential security and enablement for today's digital business

    The session will also look at typical use cases, alternative deployment models and key considerations when selecting and deploying a PKI.

    x

    PKI: Essential security and enablement for today's digital business

    In Digital Business today, with traditional barriers falling away, trust in every entity on your network becomes crucial. Cyber threats are at an all-time high and all cyber threats are fundamentally an attack on identity, whether that be an individual, a device or an application. All need to be strongly identified and differentiated in in terms of privilege and permissions. 

    PKI is the ideal vehicle for this, enabling strong identity across the enterprise. In this session, Josh Jabs, Vice President, Strategic Marketing at Entrust Datacard will look at the drivers and challenges of today's digital business and discuss how PKI can build a profoundly secure architecture for the digital enterprise.

    More Info

    Sponsored by: Entrust