Showing posts with label Webcasts. Show all posts
Showing posts with label Webcasts. Show all posts

Thursday, December 22, 2011

SC Webcast: Top cyber threat predictions for 2012

Learn about the top (internal and external) security predictions of 2012

With the tremendous growth of workforce mobility, telecommuting, and enterprise social networking, 2012 is again likely to pose some complex cyber security challenges for businesses worldwide.

As such I thought you might be interested in SC’s upcoming webcast which will get to grips with what the experts predict to be the top cyber threats in the year ahead.

You can secure your complimentary place here - http://www.scwebcasts.tv/?btcommid=40027

LIVE WEBCAST: CYBER SECURITY IN 2012 – TOP 5 THREAT PREDICTIONS
Streamed live to your desk: 26th January 2012, 3pm GMT
http://www.scwebcasts.tv/?btcommid=40027

This webcast will enable you to:
  • Learn about the top (internal and external) security predictions of 2012 (from mobile threats to spear phishing)
  • Understand the impact of social networking's impact on enterprise security in 2012 to help you prioritise your response
  • Develop ideas for a 360 degree cyber security strategy that keeps up with the sophistication of attacks in the year ahead
Speakers:

Aaron Sheridan, Senior Security Engineer, FireEye
Clive Longbottom, Founder and Industry Analyst, QuoCirca
View more information at http://www.scwebcasts.tv/?btcommid=40027

Wednesday, November 23, 2011

Will hackers continue to dominate in 2012? Join the discussion by participating in live webinars

Hackers and Threats Summit l Free Online Event

Calling 2011 the year of hackers would not be an overstatement. With high-profile system intrusions constantly making headlines worldwide, hackers, good and bad, exposed security system vulnerabilities across every industry, proving the necessity to better protect and monitor networks and data.

Will hackers continue to dominate in 2012? Will organizations be better prepared by then? Join the discussion by participating in live webinars with industry experts to prepare for a smarter 2012.

Sign up to attend the live interactive webcasts on December 7, 2011, or view them afterward on demand here: http://www.brighttalk.com/r/FLP.

PRESENTATIONS INCLUDE:

‘Advanced Persistent Threats - The Hacker's Latest Weapon or Just Marketing Spin?’

Ron Condon, Editor, SearchSecurity.co.UK (Moderator); Warwick Ashford, Editor, ComputerWeekly.com; David Perry, Trend Micro

‘Exploring the Digital Underworld: Botnets, Zero Day Threats and Phishing’
Daniel Ayoub, SonicWALL

‘Global Info Sec Landscape: Recapping 2011 and Looking Ahead to 2012’
Jay Bavisi, President, EC-Council

‘Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT’
Cameron Camp, ESET

You can view the full lineup and sign up to attend any or all presentations at
http://www.brighttalk.com/r/FLP.

This summit is part of the ongoing series of thought leadership events presented on BrightTALK(TM). I hope you are able to attend.

Monday, November 7, 2011

Free Webinar and Virtual Summit on various Information Security Issues

Mobiles, PCI, that big old cloud – what’s your poison?

I know there are so many resources out there in our profession, making it hard to know where to go for the really worthwhile insights on key issues like personal devices in the workplace, PCI, cloud security etc.

As such I have spoken to a few folk to give you a list of the 3 upcoming online events in these areas that have had the most sign-ups from people like you and have pasted details below. Take a look and see what you think….

1. Webcast: PCI DSS Demystified for SMEs

Streamed live to your desk on 17th November 2011 | 3pm GMT or 10am EST

Why is everything in Info Security always aimed at the big guys? No longer, thanks to this SC magazine webcast which was inspired by the spate of smaller companies being caught out recently by PCI loopholes and incurring massive reputational and financial damage as a result.

Ensure you don’t join the list by tuning in to the Barclaycard and Dell speakers at http://www.scwebcasts.tv/?btcommid=36601 .

2. Virtual Summit: Tackling the Big 3 - Cloud Security, Personal Devices and the Human Factor

Join CISOs from Skype, Vodafone, Canon, Travelex, HSBC and more in SC’s first truly Virtual World, which has set the information security world alight. Network with hundreds of other IS professionals (or avatars!), access whitepapers and tune into the sessions to give you everything you need to know to stay safe in 2012.

View the demo and create your own avatar now by visiting (it’s great fun!)
http://www.scvirtualsummit.com .

Or if you are a vendor interested in enquiring about speaking opportunities you can drop nicola.fulker@haymarket.com a line.

3. Webcast: Mobile Device Management - Locking down the mobile front

Streamed live to your desk on 23rd November at 3pm GMT or 10am EST

It is the big issue that many people are still wrestling with – what should we do as iPads, Smartphones and their friends continue to proliferate the workplace. Tune in to this SC webcast to hear realistic and practical advice to keep the mobile front secure, without hamstringing your productivity.

Take a look and secure your place at http://www.scwebcasts.tv/?btcommid=35629

……………………………………………..

I hope these are of relevance to you and your team! SC’s stuff tends to be very good because they take time to research the content and ensure that vendor involvement is always to the benefit of their audience (not just the vendor in question’s back pocket!).

Wednesday, November 2, 2011

WebCast: Hacking Web Servers and Countermeasures

Learn how to secure webserver!

In this on-demand IT security webcast, EC-Council Master Certified Instructor Eric Reed will address the subject of Hacking Webservers. The webcast will cover topics such as webserver architecture, webserver attack methodologies, footprinting tools, and many more critical concepts. The webcast also includes demonstrations on performing a directory traversal attack, fingerprinting a webserver with HTTPRecon, and web-based password cracking with Brutus.

This webcast is available on-demand at http://www.careeracademy.com/ceh-m12-infosec.aspx

Please feel free to forward to others in your organization who may be interested this type of training.

Details:

This free module is a part of CareerAcademy.com’s EC-Council Endorsed CEH Certification course, which gives each student in-depth knowledge and practical experience with current essential security systems.

When a student completes the course they will have hands on understanding and experience in Ethical Hacking and be fully prepared to pass EC-Council Certified Ethical Hacker Exam 312-50.

You can attend this complimentary webcast right now at:

http://www.careeracademy.com/ceh-m12-infosec.aspx

Tuesday, October 18, 2011

How to mitigate the major threats and fully secure both private and public cloud?

Cloud Security Summit | Free Online Event

The adoption of cloud-based solutions has become a necessity for most enterprises. While a growing number of companies enjoy the agility and flexibility achieved through the cloud, security experts emphasize a number of risks and vulnerabilities related to this trending technology.

Attend this summit to hear from world-class thought leaders, analysts and experienced end-users on how to mitigate the major threats and fully secure both private and public cloud.

Sign up to attend the live interactive webcasts or view them afterward on demand here: http://www.brighttalk.com/r/D9v .

Presentations include:

‘Application Security for Cloud-Based Companies’
Jim Manico, VP Security Architecture, WhiteHat Security

‘Privacy in Public: How Organizations are Securely Managing Sensitive Assets in Cloud’
Imam Sheikh, SafeNet

‘Effectively Communicating the Value of Cloud Security’
Michael Santarcangelo, The Security Catalyst

‘Is Your Data Safe in the Cloud?’
Eran Feigenbaum, Director of Security, Google Enterprise

‘Distributed Denial of Service — War Stories from the Cloud Front’
Michael Smith, Security Evangelist & John Buten, Senior Manager Enterprise Marketing, Akamai

‘The Missing "S" in Cloud’
Professor John Walker, CEO and Founder, Secure-Bastion

You can view the full lineup and sign up to attend any or all presentations at http://www.brighttalk.com/r/D9v .

This summit is part of the ongoing series of thought leadership events presented on BrightTALK(TM). I hope you are able to attend.

Friday, October 14, 2011

No Charge: Two Live Online CISSP Exam Prep Clinics

Earn Your CISSP in 2011

At no charge, you can attend TWO live online CISSP Exam Prep Clinics taught by a leading (ISC)2® instructor!

Register at: http://www.ufairfax.net/cissp-2011-hlist/
  • CISSP Clinic I: Domains 1 – 4
  • CISSP Clinic II: Domains 5 – 10
Both clinics are available live online and on demand following the webinar*.

If you’ve been studying for the CISSP exam, you’ll want to attend these TWO live online CISSP Exam Prep Clinics sponsored by University of Fairfax, Information Security Community, 1105 Media-- FOSE & GovSec-- and Tenacity.

You’ll discover strategies to increase your chances of success! You’ll learn techniques to help you quickly assess which questions to address first, which to delay answering and how to eliminate the less likely answers. The Clinics include tips for all 10 domains covered in the exam.

Register today so you pass the CISSP Exam in 2011!
http://www.ufairfax.net/cissp-2011-hlist/

When:

Thursday, October 20, 2011, 2 – 3 PM ET

Both clinics are also available on demand following each webinar*. There is No Charge for you to attend! Register now to prepare for your CISSP Exam.

Register Now: http://www.ufairfax.net/cissp-2011-hlist

Monday, October 3, 2011

Free CISSP On-Demand WebCast by Shon Harris

WebCast on Information Security and Risk Management

CareerAcademy.com has offered a free On-Demand CISSP WebCast with Shon Harris to try out their training delivery platform.

The course offered is on CISSP Domain 1: Information Security and Risk Management, and is intended for IT professionals. The course description is below, along with a link to try it out.

Please feel free to forward to others in your organization who may be interested in this type of training.

Sign up for the free training course:
http://www.careeracademy.com/download/freeinfoseccissp.html

Course Description:

This free course module of Domain 1 of our CISSP Certification Training will give the student in-depth knowledge on such topics as: security definitions, vulnerabilities, regulations, risk management, data collection, security enforcement issues, and many more critical concepts. Test drive Career Academy's CISSP training today.

Whether you are a security professional, a seasoned engineer, or are looking for a career change, the Shon Harris CISSP Series brings together all the materials, tools, and study aids you need to take your career to the next level. Our superior technology based course curriculum, strictly adheres to all of (ISC)2 exam objectives. We have invited the foremost CISSP trainer and author, Shon Harris, to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for the CISSP certification exams.

Use the link above to sign up, and or more information, visit http://www.careeracademy.com

Thursday, July 14, 2011

Mobile Security Summit

Free Online Event

Consumer-oriented devices are used to access the enterprise network, email and applications on the move. While the productivity gains and strategic opportunities of accessing data remotely are real, enterprise decision makers are increasingly challenged by cost and security.

Join industry experts, analysts and end users as they identify the key vulnerabilities you should be aware of and the solutions that will allow you to keep your business running securely.

Sign up to attend the live interactive webcasts on Wednesday, July 13, 2011, or view them afterward on demand here: http://www.brighttalk.com/r/Grz .

Presentations include:

‘Thriving in the Era of the Mobile Workforce’
Christian Kane, Forrester Research; Gaston Brown, Hobart Brothers Co.; Matthew Dieckman, SonicWALL

‘Strategic Mobile Security: A Practitioner Panel’
Chenxi Wang, Forrester; Anil Karmel, Los Alamos Nat'l Lab; Terrell Herzig, UA Medical Center

‘The Composition of Mobile Security – Risks and Results’
Daniel Miessler; Principal Security Consultant, HP Application Security

‘Top 10 Mobile Risks’
Vladimir Jirasek, Senior Enterprise Security Architect, Nokia

‘Leveraging Mobile Devices for Strong Authentication’
David Mahdi, Product Manager, Entrust

You can view the full lineup and sign up to attend any or all presentations at http://www.brighttalk.com/r/Grz . This summit is part of the ongoing series of thought leadership events presented on BrightTALK(TM). I hope you are able to attend.

Wednesday, July 6, 2011

Webcast: Cloud Security and Smart Security

Security in the cloud – where are we now?

Cloud security is now a very different proposition compared to a year ago with expanding access points, more personal devices, and increasingly sophisticated threats.

In light of this, I thought you might be interested in SC’s upcoming webcast which will give you a valuable, real-world update on where we are today.

The full session and sign up can be found at http://www.scwebcasts.tv.

I have pasted a few more details below though for your reference.

SECURING THE CLOUD - LOCKING DOWN 2011’s MULTIPLE ACCESS POINTS

Going live on 14th July 10:00 am ET / New York, 3pm / London @ http://www.scwebcasts.tv

The webcast will give you tools to:
  • Facilitate strong end user and multifactor authentication in public and private clouds to secure identity and protect your business
  • Keep up to date with current cloud technology and gain architectural perspectives to manage user activity and log ins
  • Gain visibility across the multiple layers of cloud security and assure data protection and ownership in storage and encryption
  • Integrate outsourced IT services with in-house programmes to maximize staff productivity and reduce costs
You may also be interested in another 2 of SC’s recent projects which have proved very popular with group members:
  1. SC WEBCAST: Smart Security for SMEs: Key Cyber-Threats And How To Tackle Them – Going live on July 12 at 10:00 am ET / New York, 3pm / London at http://www.scwebcasts.tv.
  2. SC STUDIO SHOW: The Risks and Rewards of Archiving – hard-hitting video available now at http://www.scstudio.tv.
If you can’t make the live date of the webcasts, you can of course watch them on-demand in the archive at your leisure at http://www.scwebcasts.tv .

As always, feel free to get in touch with any questions.

Wednesday, May 11, 2011

Application Security Intelligence

Free Online Event

Forward-thinking organizations have begun to adopt a holistic approach to securing applications rather than investing in perimeter defenses like firewalls and intrusion prevention systems.

Join on May 19th for a full day of interactive webcasts to hear leading IT security experts discuss the role of application security intelligence in enabling software security assurance programs to proactively reduce business risk across the enterprise.

About the event:

"Traditionally, organizations have responded to security threats by investing in perimeter defenses like firewalls and intrusion prevention systems. While effective in the short-term, this approach is simply a bandage that offers reactive protection only, falling short of proactively and programmatically securing the applications and assets that are the lifeblood of any modern business. Recently, some organizations have begun to adopt a holistic and strategic approach to securing their applications. Join us to hear leading software security experts discuss the role of application security intelligence in enabling software security assurance programs to proactively reduce the business risk of insecure software across the enterprise."

Presentations include:

"Application Security Intelligence: Managing Application Risk"
Roger Thornton, CTO & Founder, Fortify Software, an HP company

"Optimizing Security in Software Development: Secure at the Source"
Derek Brink, VP & Research Fellow, Aberdeen Group

"Application Security Strategy in a Mobile World"
John South, CISO, Heartland Payment Systems

"Cloud Security and Its Impact on Application Security"
Dennis Hurst, Founding Member, Cloud Security Alliance

"Addressing the Top 5 Web Application Security Threats"
Dave Wichers, OWASP Board Member & COO, Aspect Security


Sign up to attend any or all of the May 19 webcasts at: http://bit.ly/mPYS1V

Thursday, March 31, 2011

SC Magazine’s recent study of less-shouted-about THREATS

Risks and Rewards of Archiving!

Cloud and social media security are much discussed areas of focus within our profession but what about some of the less shouted-about threats? I thought you might be interested in SC Magazine’s recent study of some of these, which will be discussed in greater detail in 3 of their upcoming webcasts; found at http://www.scwebcasts.tv and http://www.scstudio.tv respectively.

Below is a little more info on the 3 topics to help you assess their relevance to your organisation:

STAMP OUT COSTLY SECURITY DEFECTS IN SOFTWARE DEVELOPMENT
Going live at 2pm GMT, 30th March


The Coverity Scan found an alarming 50,000 defects in just 300 open-source software products. This webcast will give you an instant understanding of the secure coding practices that you should adhere to to eliminate these increasingly costly security vulnerabilities.

Speakers: Robert Seacord, Secure Coding Director, CERT - Software Engineering Institute, Michael White, Technical Director, Coverity

You can secure your free place at: http://www.scwebcasts.tv

ARE RISKY APPLICATIONS UNDERMINING YOUR BUSINESS SECURITY?
Going live at 3pm GMT, 12th April

With 75% of new attacks (CERT) targeting applications and with the lines blurring between personal and business devices, this webcast will shed vital light on the real security repercussions of risky apps in the workplace and what you can do to secure them.

Speakers: Tim Mathias, Director of Security, Thomson Reuters Chris Wysopal, Co-founder & CTO, Veracode

You can secure your free place at: http://www.scwebcasts.tv

THE RISKS AND REWARDS OF ARCHIVING

This webvideo is live now on SC’s site at http://www.scstudio.tv

83% of the 200 IT professionals that SC spoke to (representing both SMEs and larger enterprises) reckoned the cost of email downtime to their business to be over $500,000. This interesting SC Studio show which you can watch right now at http://www.scstudio.tv , offers some interesting pointers on one of the most effective ways to reduce this risk/cost – archiving.

Speakers: Brian Shorten, Risk and Security Manager, Cancer Research UK Giovanni Alberici, Archiving & Continuity Specialist, Symantec.cloud

I hope the shows are relevant to your organisation. As always, do feel free to get in touch with any thoughts on these topics or ideas for future ones.

For the webcasts, if you can’t make the live date of the webcasts you can of course watch them live in the archive at your leisure at http://www.scwebcasts.tv. The studio show you can watch whenever you like at http://www.scstudio.tv .

Thursday, March 3, 2011

SC Magazine - Upcoming Webcasts

Cyber crime costs over $1 trillion; join our webcast debates

As you may have read recently, Cybercrime is now costing the UK $43.5 billion and around $1 trillion globally. Given the release of these statistics, I thought you might be interested in 3 of SC magazine’s upcoming webcasts (http://www.scwebcasts.tv/) which will offer valuable insights into the shape of these threats today and what can be done to avoid them.

I have pasted in details of the 3 webcasts below, SC have some great speakers lined up from companies including Capita and Vodafone so it may well be worth a listen:

1. BENCHMARKING YOUR SECURITY: HOW DO YOU MEASURE UP?
3pm, 29th March – view more info at http://www.scwebcasts.tv/
> As the cyber threat mounts and with mobile platforms changing the face of security, this webcast will give you some surprising statistics from real companies on how secure you really are next to your peers….

Speakers: Marco Ermini, Network Security Manager at Vodafone Group and Jim Acquaviva, VP of Product Strategy, nCircle
Register Now: http://www.scwebcasts.tv/

2. ONLINE VULNERABILITY MANAGEMENT: A 360º PERSPECTIVE
3pm, 6th April - view more info at http://www.scwebcasts.tv/
> With so many disparate online systems, this webcast will offer you a 360º insight into where companies are most commonly attacked and the PCI and other policy considerations you need to know about to stay safe online.

Speakers: Dave Whitelegg, Head of IT Security for Capita and Daan Dia, Director of Strategic Business Development for Outpost24
Register Now: http://www.scwebcasts.tv/

3. CYBERTHREATS: PUBLIC VS. PRIVATE SECTOR
3pm, 7th April - view more info at http://www.scwebcasts.tv/
> An interesting point to emerge from SC’s recent research with global IT Directors was the fact that online threats do differ from Private to Public sector. In this webcast you will hear more on the specific online security priorities of your particular sector to give you food-for-thought that will help streamline your efforts.

Speakers: Mark Jackson, security architect in Cisco's UK Public Sector operation & private sector focused colleague
Register Now: http://www.scwebcasts.tv/

Many of you have attended an SC webcast at some time or another but they involve a very easy one-off sign up process. They are also live to give you the ability to interact via questions and votes. If you can’t attend the live date by securing your free place to each webcast you will be able to access the archive.