Sign up for our weekly newsletter!
REGISTER NOW
Webinar Archives
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Making an Intelligence-led Defense a Reality
Date: 6/26/2019
Sponsors:
ThreatConnect
View archived webinar

Intelligence-led defense is not exactly a new term, but few security teams have fully embraced it, despite its proven advantages. Why? The idea of getting started can be daunting. And getting the team behind the necessary changes is hard. In this webinar, we’ll explore the challenges of implementation, some tools to overcome them, and the best way to sell the concept throughout the organization.

You’ll learn how to:

  • Overcome common misconceptions of intelligence and demonstrate intelligence to your peers as a process, not just a thing you buy.
  • Start with the end in mind, with a staged holistic approach to implementing an intelligence-led defense.
  • Establish intelligence as a measurable service to the rest of the internal security team and executive staff with defined requirements, deliverables, and feedback that drive collection analysis and process.

We’ll also talk about technology and services that can help you on this journey.

Considerations in Selecting the Right SD-WAN Solution - The role of service providers and future planning
Date: 6/20/2019
Sponsors:
Versa
View archived webinar

Enterprises are being challenged by new business demands to build agile network platforms that can support digital operations and processes. The challenge for IT teams is to develop this flexible network and IT infrastructure to support a shift to cloud-centric applications while also reducing operational cost.

Enterprise IT departments need to ensure secure application delivery anywhere, with a high level of performance for critical business applications. The expectation is to provide continuous, high-quality, secure connectivity that extends out to remote sites, to mobile users, and to business partners that access applications hosted in a multicloud environment of private data centers and public software-as-a-service (SaaS).

Software-defined wide-area networking (SD-WAN) and virtualized network functions (VNFs) hosted on commercial off-the-shelf hardware are changing the economics and the architecture of the wide-area network (WAN). These new platforms make the network more dynamic and support enterprises in managing their operations with policy-driven application security, application visibility, application-aware routing, and application performance guarantees.

In this webinar, Ovum's Rik Turner discusses considerations for enterprises choosing a SD-WAN solution, in particular when considering outsourcing SD-WAN management to a service provider, and how to future-proof those decisions.

Levers of Human Deception: The Science and Methodology Behind Social Engineering
Date: 6/18/2019
Sponsors:
KnowBe4
View archived webinar

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

Join Erich Kron, Security Awareness Advocate for KnowBe4, provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating our users.

Key Takeaways:

  • The Perception Vs. Reality Dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
  • How we can defend ourselves and our organizations

Risk Buy-Down: Why Data Security is a Must
Date: 4/23/2019
View archived webinar

With cyberattacks inevitable and data breaches highly likely, companies are evaluating their investment in security by their ability to reduce risk. While endpoint and network security continue to grow, and identity management technology becomes well-established, securing data itself must be front and center of enterprise strategy. As threat actors continue to find ways through the corporate edge and to hijack the accounts of legitimate users, protecting sensitive data and ensuring that authorized data activity is appropriate are the cornerstones of mitigating risk.

Join this webinar on April 23rd at 11am ET and learn:

  • What is the most effective way to mitigate data breach risks
  • Why does security have to be data-centric
  • What are the shortcomings of perimeter-based security and IAM tools
  • How to enhance perimeter security, IAM, DLP, SIEM with modern database security

Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Date: 4/9/2019
Sponsors:
OPaQ
View archived webinar

Companies of all sizes are modernizing their networks to meet today’s business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies – and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:

  • Understand what top security vulnerabilities are plaguing companies as they modernize their networks
  • Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
  • See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security

Increase Operational Efficiency with Security Automation
Date: 3/28/2019
View archived webinar

Ask anyone and you’ll hear that most security teams today are facing the same issues: increasing attacks, the expanding security talent shortage, and a seemingly insurmountable volume of data. If this sounds like you (or your CISO), it’s time to give security orchestration and automation a serious look.

Join us in this webinar to learn how automation can help you evolve your security strategy for the challenges you face today (and tomorrow). By augmenting your capabilities and integrating into your existing tech stack, you’ll increase your team’s efficiency and level-up your security program to improve your overall security posture.

Leveraging a Risk-Based Approach to Vulnerability Management to Unify Security and Operations
Date: 2/20/2019
View archived webinar

Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams.

For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.

What you will learn:

  • What will replace KPIs and why
  • How risk can be calculated beyond what your vulnerability scanners provide
  • How to formalize a risk-based approach to vulnerability management with Key Risk Indicators (KRIs) as your foundation
  • Why building workflows into your security and operations team processes reduces time, effort and results in building collaboration

Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Date: 2/12/2019
Sponsors:
OPaQ
View archived webinar

Companies of all sizes are modernizing their networks to meet today’s business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies – and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:

  • Understand what top security vulnerabilities are plaguing companies as they modernize their networks
  • Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
  • See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security

12 Ways to Defeat Two-Factor Authentication
Date: 2/5/2019
Sponsors:
KnowBe4
View archived webinar

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's data-driven defense evangelist and security expert with more than 20 years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.

The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.

You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:

  • 12 ways hackers get around two-factor authentication
  • How to defend your two-factor authentication solution
  • The role humans play in a blended-defense strategy

Machine Learning: Data Protection’s Next Frontier
Date: 1/24/2019
View archived webinar

Machine learning, artificial intelligence and deep learning are terms that many IT security professionals are bombarded with when it comes to identifying and protecting their sensitive data. Yet many are asking these important questions:

  • What's the difference between machine learning and these other terms?
  • How can they help my organization comply with numerous data privacy/security challenges?

Join Ovum Analyst Maxine Holt and TITUS Senior Vice President of Strategy Mark Cassetta as they discuss the differences in these emerging technologies. Maxine and Mark will also cover key factors to consider when deciding whether machine learning is an approach you should introduce in your data protection strategy. And, if it is, how do you start?

12 Ways to Defeat Two-Factor Authentication
Date: 12/11/2018
Sponsors:
KnowBe4
View archived webinar

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's data-driven defense evangelist and security expert with more than 20 years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.

The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.

You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:

  • 12 ways hackers get around two-factor authentication
  • How to defend your two-factor authentication solution
  • The role humans play in a blended-defense strategy

SD-WAN Adoption Drives Greater Demand for Integrated Branch Security
Date: 11/8/2018
Sponsors:
Versa
View archived webinar

With the rise of SD-WAN there is now an increased urgency for service providers and customers to implement SD-WAN with integrated security.

In response to this market demand, many service providers have implemented a managed SD-WAN model that simplifies security for their enterprise customers. Not surprisingly, managed SD-WAN- services have been widely adopted, utilizing either an outsourced or SaaS-based service.

This webinar will discuss:

  • The rise of SD-WAN as an alternative to traditional enterprise WAN; what is driving its growth
  • The security challenges inherent in SD-WAN vis-à-vis traditional WAN
  • The options for meeting this challenge (built-in, a second box or cloud-delivered security)

Latest Articles
Researchers from Boston University found that the current version of Bluetooth Low Energy, as implemented by Apple iOS and Windows 10, leaked identifiers that allowed tracking of the device that was using BLE.
French security researcher Malekal delved into a murky world.
New variant shares most of its code with the BitPaymer ransomware operated by INDRIK SPIDER.
Building trust is key to the success of the European cloud market.
The National Cyber Security Centre, a part of the UK's GCHQ, has issued an advisory that deals with Domain Name System (DNS) hijacking by threat actors.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with