Securing Your Enterprise Infrastructure Date: Oct 27, 2016 View webinar As enterprises add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to networks and servers and how your organization can mitigate them.
Insider Threats & Preventing Data Leaks Date: Oct 20, 2016 View webinar Major data leaks such as Edward Snowden's release of NSA data are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing valuable insider information - not only through malicious leaks but through unintentional, accidental violations of security rules. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers some essential advice on stopping data loss from within.
Security For the Internet of Things - The Missing Link Date: Oct 19, 2016 View webinar Whether your business makes connected cars, uses connected medical devices, or employs any other "Internet-enabled" technology, you could be a target for online attackers. As the Internet of Things becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices. How can Information Security and DevOps develop and manage an effective security strategy for technology? Join IoT security expert John Pironti to discover the five key ways you can make your IoT-connected devices less risky and more secure.
Fooling The Hacker - What Your Enterprise Can Learn Date: Oct 18, 2016 View webinar Enterprises spend most of their time avoiding deception and exploits from online attackers. But what happens when the tables are turned? Many are improving their cyber defenses by using "honeypots" and other deceptive techniques to go on the offensive against hackers, gaining insight on their methods before they can do damage to enterprise data.
The Real Risks of Mobile Technology In the Enterprise Date: Oct 13, 2016 View webinar Everyone is saying that the introduction of mobile devices and bring-your-own-device (BYOD) policies is a security risk to the enterprise. But exactly where do those risks come from? In this session, a top expert will debunk some of the myths about mobile security while raising up some threats and vulnerabilities you may not know about.
Identify & Remediate Vulnerabilities Hiding In Your Applications Date: Oct 13, 2016 View webinar Fixing vulnerabilities isn't just a job for your in-house development team and the giants of Silicon Valley. It's a job for all the developers of the third-party software components embedded in countless applications and services - from open-source, to commercial off-the-shelf, to custom. When there's a vulnerability in one of those libraries, languages, or frameworks - it could be lurking in scores of your applications...do you know which ones? And how do you identify the affected systems, remediate the problem, and secure your company?
Visualization: Let Your Data Speak Date: Oct 13, 2016 View webinar Your data analytics project doesn't really achieve a successful completion until you deliver the results to decision makers, whether the recipients are top executives, business unit leaders, or even the public at large. More and more data science teams are delivering those results through data visualization, forsaking those spreadsheets and static charts in printed reports. One of the key advantages to using dataviz is the interactivity and the dynamic nature of data visualizations. But you want to do it right, and remember that your data is telling a story. Get it wrong, and your data just confuses everyone. Be sure to join All Analytics Radio when Berinato shares his advice on best practices -- and bad practices -- in data visualization on Thursday, October 13, at 2 pm ET.
Building Your Next-Gen Security Operations Center (SOCs) Date: Oct 11, 2016 View webinar To handle the skyrocketing volume of malware and cyber exploits that hit them each day, many enterprises are building security operations centers (SOCs) that provide a central place for detecting, diagnosing, and remediating online attacks. But thanks to the development of new capabilities and technologies, today's SOC looks very different than those that were built even a few years ago. In this webinar, top experts on building and managing security operations centers will discuss best practices for building and staffing today's SOC, as well as some of the essential tools needed to make the SOC effective.
Endpoints & End Users - Strengthening Your Weakest Links Date: Oct 06, 2016 View webinar Most major data breaches start with the compromise of a single endpoint - a PC, a mobile device, a user who unwittingly gives up credentials. What can your organization to protect its endpoints? How can you create and enforce end user policies that protect your corporate data? In this session, a top expert discusses how endpoints and end users are most frequently compromised - and how to keep your end users from falling victim.
Digital Transformation: How Far Along is Your Financial Institution? Date: Oct 06, 2016 View webinar The banking industry is undergoing unprecedented changes due to channel proliferation, increasing customer expectations and an increasingly competitive marketplace. Banks must continue to innovate and gain efficiency amidst a flood of incoming data - all while keeping down costs. In order to do this, digital transformation needs to be a priority. Many obstacles stand in the way of this digitalization: evolving business requirements, complex technology and data integration, and long development cycles, slowing speed to market. Banks need to quickly navigate their way through these barriers to achieve digitalization, or risk falling behind the competition.
Core System Testing: How to Achieve Success Date: Oct 06, 2016 View webinar Property and Casualty Insurers have been investing in modernizing their core systems to provide flexibility, improve product speed-to-market, support customer growth, and improve underwriting profitability. Many carriers are currently on this transformational journey; and stakes from these transformation initiatives are high, given the large amount spent on initial rollouts and ongoing maintenance of these platforms. It's up to the QA team, with support of IT and business leaders, to focus on quality to achieve the realization of benefits outlined in the business case. Improving the overall quality profile, speed to market, and reduction in costs rely heavily upon automation and application-specific testing approaches.
[Social Media Fraud] Uncovering Tactics & Trends for Cybercrime on Social Media Date: Oct 06, 2016 View webinar Social media has taken the world by storm. The number of social media users is expected to grow to a third of Earth's population by 2018 and organizations are expected to spend 21% of their marketing budgets on social media in the next 5 years. Unfortunately, cybercriminals are creating fraudulent accounts to masquerade as corporate brands and defraud unsuspecting fans. In order to stay protected, you'll need to understand how social media threats can impact your organization.
Make IT Security Part Of Your Business Culture Date: Oct 04, 2016 View webinar Join us for this webinar as top speakers on social engineering and security awareness discuss how to increase IT Security for your enterprise. Attend and you will understand how to raise consciousness about IT security across your enterprise, discover unique ways your organization can educate users on security threats and appropriate responses, learn to build effective programs that can enable employees to be aware and willing to report potential threats, go beyond basic classes to truly change the thinking in your organization so employees and executives become more aware of IT security.
Making the Most of Your Security Budget via an Inline Security Fabric Date: Sep 29, 2016 View webinar You cannot protect your organization from the constant threat of cyberattacks with best-efforts security monitoring. You need 100% data access and visibility, and the intelligence to evaluate vast volumes of network traffic, without slowing or disrupting your network. A resilient security fabric does all this, and helps scale your security infrastructure as needs change. Attend and you will walk away with components of an inline security fabric, six criteria for evaluating fabric components, key product specifications and features, and tips for making the most of your security budget.
Protecting Your Data In the Cloud Date: Sep 29, 2016 View webinar Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply can't pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.
What IT Security Tricks Can Your Enterprise Learn from the Deep/Dark Web? Date: Sep 29, 2016 View webinar Most enterprises struggle with IT security because they don't know when attackers will strike next - or what data they will be targeting. But recently, security researchers have found that by studying the behavior and activity in places where the bad guys go - the Deep Web and the Dark Web - they can gain insight that can improve their defenses. Join us for this eye-opening webinar, along with experts on the Deep Web and the Dark Web who will provide an overview of how these specialized and anonymized environments work, the types of data they contain, and how cyber criminals might use them to attack an enterprise.
How To Effectively Analyze Threat Intelligence Data Date: Sep 28, 2016 View webinar Today's enterprises have a wide variety of threat intelligence available to them: threat feeds, internal security event information, CERT and other vulnerability reporting sites. How can you correlate this information to identify sophisticated cyberattacks? What processes can you use to ferret out the relevant threat data and stop the most complex exploits before they result in a data breach?
Solve Your App Sprawl Headaches! Date: Sep 28, 2016 View webinar Join us as we explore the challenges and benefits of democratizing app development, Attend this webinar and you will learn why business colleagues no longer want to wait for IT to develop their apps, which departments are most likely to take app development into their own hands, and how that affects business, what pitfalls and security dangers lurk in letting the business develop apps without IT's involvement, and how IT can work with the business to make tools available that will democratize app development while adhering to IT best practices.
How to Do More with Less for a Better Incident Response Date: Sep 28, 2016 View webinar In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be shared, as well as actionable tips and tricks, to help you begin to gain control of your incident response process and keep you secured against advanced threats.
Outsmart Hackers with Deep Learning Artificial Intelligence (AI) Date: Sep 27, 2016 View webinar Join us on September 27th to learn how AI evolved from old rule-based systems to state-of-the art deep learning, understand key differences between machine learning and deep learning, discover the unprecedented results exhibited by applying deep learning in various domains, hear background on the first application of deep learning AI to cybersecurity, and learn how deep learning enables real-time prediction of unknown threats with unmatched accuracy.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."