Sign up for our weekly newsletter!
REGISTER NOW
Webinar Archives
Webinars are free sponsored educational seminars that are accessed over the Internet. You can register for upcoming Webinars or view archived presentations via the links below.
Leveraging a Risk-Based Approach to Vulnerability Management to Unify Security and Operations
Date: 2/20/2019
View archived webinar

Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams.

For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.

What you will learn:

  • What will replace KPIs and why
  • How risk can be calculated beyond what your vulnerability scanners provide
  • How to formalize a risk-based approach to vulnerability management with Key Risk Indicators (KRIs) as your foundation
  • Why building workflows into your security and operations team processes reduces time, effort and results in building collaboration

Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Date: 2/12/2019
Sponsors:
OPaQ
View archived webinar

Companies of all sizes are modernizing their networks to meet today’s business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies – and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:

  • Understand what top security vulnerabilities are plaguing companies as they modernize their networks
  • Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
  • See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security

12 Ways to Defeat Two-Factor Authentication
Date: 2/5/2019
Sponsors:
KnowBe4
View archived webinar

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's data-driven defense evangelist and security expert with more than 20 years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.

The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.

You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:

  • 12 ways hackers get around two-factor authentication
  • How to defend your two-factor authentication solution
  • The role humans play in a blended-defense strategy

Machine Learning: Data Protection’s Next Frontier
Date: 1/24/2019
View archived webinar

Machine learning, artificial intelligence and deep learning are terms that many IT security professionals are bombarded with when it comes to identifying and protecting their sensitive data. Yet many are asking these important questions:

  • What's the difference between machine learning and these other terms?
  • How can they help my organization comply with numerous data privacy/security challenges?

Join Ovum Analyst Maxine Holt and TITUS Senior Vice President of Strategy Mark Cassetta as they discuss the differences in these emerging technologies. Maxine and Mark will also cover key factors to consider when deciding whether machine learning is an approach you should introduce in your data protection strategy. And, if it is, how do you start?

12 Ways to Defeat Two-Factor Authentication
Date: 12/11/2018
Sponsors:
KnowBe4
View archived webinar

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's data-driven defense evangelist and security expert with more than 20 years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution.

The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.

You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:

  • 12 ways hackers get around two-factor authentication
  • How to defend your two-factor authentication solution
  • The role humans play in a blended-defense strategy

SD-WAN Adoption Drives Greater Demand for Integrated Branch Security
Date: 11/8/2018
Sponsors:
Versa
View archived webinar

With the rise of SD-WAN there is now an increased urgency for service providers and customers to implement SD-WAN with integrated security.

In response to this market demand, many service providers have implemented a managed SD-WAN model that simplifies security for their enterprise customers. Not surprisingly, managed SD-WAN- services have been widely adopted, utilizing either an outsourced or SaaS-based service.

This webinar will discuss:

  • The rise of SD-WAN as an alternative to traditional enterprise WAN; what is driving its growth
  • The security challenges inherent in SD-WAN vis-à-vis traditional WAN
  • The options for meeting this challenge (built-in, a second box or cloud-delivered security)

What You Can Do To Strengthen Security Over Your Clouds
Date: 6/26/2018
Sponsors:
Keysight
View archived webinar

Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to learn more about how cloud expands your attack surface and how your security architecture needs to adapt, to keep pace with cloud adoption. Find out how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.

Future of CASBs: Securing the Expanding Cloud Footprint
Date: 6/21/2018
Sponsors:
Bitglass
View archived webinar

The cloud security landscape is evolving rapidly as platform providers expand their offerings. Where needs were once limited to identifying high-risk data outflows and malicious users, today cloud security requires a comprehensive suite of capabilities that provide actionable analytics and a single point of control for all apps. Cloud access security brokers (CASBs) have already made waves as the next-generation solutions capable of true cloud data protection.

Join Rik Turner, Analyst at Ovum and Salim Hafid, Product Marketing Manager at Bitglass for a deep dive on the future of the CASB market as cloud platforms like Office 365, G Suite, and AWS continue to make inroads into the enterprise. Learn how this segment of the security market has grown to encompass data protection, threat protection, mobile security, and more.

SD-WAN: Best Practices for Application Delivery & Multi-Cloud Security
Date: 6/20/2018
Sponsors:
Aryaka
View archived webinar

As enterprises embrace digital transformation, their vulnerability to security breaches increases as their attack surface expands. With cloud platforms, SaaS applications and more connections across diverse locations, global enterprises are finding that they require a defense in depth security strategy to protect both mission-critical applications and data.

So what SD-WAN strategies can be applied to maintain best-in class security across a global network?

This webinar explores SD-WAN architectures in depth and the best practices and essentials for delivering multi-layered, defense in depth security through your global enterprise WAN, while also enhancing application performance required to improve productivity at the speed of today’s business environment.

In this webinar, you will learn about:

  • How a global manufacturing leader applied layered security to their network
  • Challenges in protecting mission-critical applications for global enterprises
  • The importance of deploying multiple layers of security to protect business-critical data
  • Integration best practices that provide global enterprises with enhanced security infrastructure and faster application performance

Cloud Access Security Brokers in the Wild
Date: 5/30/2018
Sponsors:
BitGlass
View archived webinar

Cloud applications like Office 365, Salesforce and AWS have taken enterprise IT by storm. Some have embraced the cloud, creating corporate instances of these widely used platforms in order to maintain some control over cloud data. Others are wary of the security and compliance challenges posed by these new services. Enter cloud access security brokers or CASBs – purpose-built solutions that provide real-time data and threat protection for the cloud.

To date, hundreds of organizations in every major vertical have deployed CASBs as a means of addressing gaps in their security. In this webinar, presented by Rik Turner, analyst at Ovum, and Rich Campagna, CMO and SVP Products at Bitglass, we’ll explore real-world security use cases. Learn how your peers – in healthcare, financial services, tech, manufacturing and other industries – are leveraging next-generation technologies to achieve comprehensive control and visibility across all cloud platforms.

Making the Case for a DevSecOps Transformation
Date: 4/26/2018
Sponsors:
BMC
View archived webinar

The explosive growth of public cloud and DevOps adoption has transformed how businesses deliver products and services to their customers. The quickening pace of business agility, coupled with innovative new cloud technologies and the negative press of high-profile cloud data breaches, has ratcheted up the pressure on development, IT operations and IT security. Join us for this webinar where Roy Illsley of Ovum and Rick Bosworth of BMC will share how you can enable DevSecOps in your organization.

Attend this webinar to:

  • Explore the current state of the DevOps market
  • Discover the benefits of integrating security into the software development process
  • Establish the groundwork for a successful DevSecOps transformation

CASBs: A Primer on Securing Your Cloud Environment
Date: 3/29/2018
Sponsors:
BitGlass
View archived webinar

Rapid proliferation of cloud services has turned the security landscape on its head. Where firewalls and device management solutions were once enough to protect corporate data, today enterprises must contend with access from unmanaged BYO devices, file sync and share platforms, and new workflows. Traditional security solutions are ill equipped to protect data in this new cloud- and mobile-first environment.

Changes in corporate infrastructure have necessitated a change in approach to security, one that is more focused on data protection across multiple applications. Join Ovum analyst Rik Turner and Bitglass VP of Product Management Mike Schuricht as they explore the challenges of migrating to cloud and widely used solutions like cloud access security brokers (CASBs) that have emerged to solve these challenges.

Latest Articles
It's an internal matter – but it could affect millions of the social network's users.
The FIN7 group of cyber criminals is still going strong.
Radio silence after reports of a headline-snagging ransomware payment in Jackson County, Ga., presents a possible case study in the pros and cons of paying ransomware attackers.
IBM's X-Force has found that intertwined relationships exist between the Trickbot, Gozi, Ramnit and IcedID malware families – and that spells trouble.
The findings from Positive Technologies aren't that, erm, positive.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with