Webinars

Webinars

  • Distributed Cloud Services: Key Considerations for IT Leaders

    Digital transformation has driven a rapid increase in the use of cloud, and as a result many organisations are re-architecting their core business software for a distributed application infrastructure. By exploiting modern, agile development concepts such as microservices and APIs, IT leaders are delivering more flexible and responsive application services. However, this distributed infrastructure puts an even greater focus on securing every element of the interconnected cloud and edge platforms. In this session, F5 Field CTO Bart Salaets and Computer Weekly editor in chief Bryan Glick will discuss the opportunities and challenges for IT leaders in deploying, securing, connecting, and monitoring modern distributed apps. They will cover: • The business drivers leading organisations to adopt distributed cloud services • The challenges this presents and how IT leaders are tackling them • The key technologies involved and how they fit together • Key distributed cloud use cases Read More

  • Distributed Cloud Services: Less Pain, More Gain

    Modern applications are no longer single, monolithic entities but are broken down into multiple microservices communicating through APIs – often deployed in different locations and clouds. As a result, deploying, securing, interconnecting, and monitoring modern apps has become more complex than ever before. In this webinar, Bart Salaets will explain how to efficiently address these challenges in a distributed cloud environment. He will cover: • Securing distributed applications through services such as WAF, DDoS mitigation, bot defence, and API protection • Interconnecting applications deployed across different environments through multi-cloud networking capabilities • Deploying applications across cloud and edge environments through a managed Kubernetes platform By watching this session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time. Read More

  • Best Practices on Web Application Security and Demo

    This session is a practitioner’s favorite - build and deploy web application security for multi-cloud and microservices architectures while minimizing complexity and manual operations. Understand why a unified approach for integration with cloud and container services is essential to protecting your applications. See a real-world demonstration of an application security solution in action. Learn: - WAF with point-and-click simplicity with unparalleled visibility and intelligence - Automation for your application security for ease of mind - Live demo of web application security deployment and protection Christian Treutler, Engineer Security, VMware Ashutosh Gupta, Senior Manager R&D Analytics & UI, VMware Read More

  • Design Principles for Application Security in Network Architectures

    Building robust application security for multi-cloud and microservices requires an integrated solution that is easy to implement and operationally manage. Learn how to design an application security platform to meet your organization’s business needs. Learn: - Best practices to apply to strengthen application security - Ease operations with simplified, integrated, and automated platforms - Key application security changes in multi-cloud and microservices environments Chad Herren, Solution Architect, VMware Nathan McMahon, Technologist, VMware Read More

  • Security Mindset for Application Delivery

    Join a panel of security experts who help customers protect applications in the multi-cloud and microservices architectures. Learn the issues customers face and how to address them to develop a robust application security infrastructure, including: - A debate on top real-world app security solutions - Key tips to securing applications across environments - Threat developments in application delivery and how to mitigate future attacks Frank Yue, Senior Product Manager, VMware Christian Treutler, Engineer Security, VMware David Zendzian, Global Field CISO, VMware Nathan McMahon, Technologist, VMware Read More

  • Tips to make your company cyber insurable

    The recent rash of ransomware attacks and evolving cyber security threats make cyber security insurance a necessity, both to protect the company and to reassure clients and investors of the safety of their data. In this presentation, Ralph Villanueva will leverage more than a decade’s IT security and compliance experience, and his intimate knowledge of cyber security insurance as a licensed agent and broker for property and casualty insurance, including cyber security insurance, to discuss how IT leadership can make their company more cyber security insurable. Tune into this webinar to learn: • Relevant information that cybersecurity insurance underwriters need. • Key areas that can affect the company’s cyber insurability. • Actions that the IT leadership can do to make the company cyber insurable. About the speaker: Ralph has been keeping his employers compliant with IT and cybersecurity requirements across numerous and diverse regulations such as the Nevada Gaming Control Board, Payment Card Industry, COSO-Integrated Framework, COBIT and ISO 27001 since 2007, and data privacy since 2017. His more than two decades of internal and IT audit and compliance work in the US and the Asia Pacific region provide him with insights not only in enforcing IT and cybersecurity requirements in light of changing regulatory and technical environments, but also in anticipating and dealing with future. Ralph has also earned numerous certifications such as the ISO 27001LA and ISO 27701LA, CISA and CISM, PCI-ISA and PCIP, CIA and CRMA, CFE, CPA and ITIL. Since 2010, Ralph has regularly spoken at over 40 conferences. Read More

  • Cyber insurance as a part of a cyber resilience program

    Historically, risk management has consisted of the controls over risk, acceptance of risk, and transfer of risk. Cyber resilience overlays those concepts with cyber-related security, business continuity and cyber insurance. This presentation from Risk Masters International's Executive Principal Steven Ross will examine how insurance fits into a cyber resilience program and what the challenges are in obtaining coverage that meets an organization’s needs. Tune into this webinar to learn: • How market forces, especially ransomware and cryptocurrency, have affected both resilience and insurance. • The technology challenges in acquiring cyber insurance. • How small and medium sized businesses are affected in their ability to be cyber resilient. • Inclusion of artificial intelligence in insurance decisions. About the speaker: Steve holds certification as a Master Business Continuity Professional (MBCP) as well as a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA). He is a specialist in business continuity management, IT disaster recovery planning, and information security and has implemented programs for numerous banks, government agencies, and industrial corporations. Before founding Risk Masters, Steve was with Deloitte & Touche as the leader of their Business Continuity Management practice. In recent years, his focus has been on the resilience of large business and technology environments. He is editor of the multi-volume series, e-Commerce Security, and author of several of the books in the series. Read More

  • Three-phase ransomware protection strategy

    Tune into this webinar session, presented by Boleaum Inc. founder Vincent Amanyi, to learn the three fundamental factors to consider when building a classic ransomware protection strategy for your organizational landscape. Key Takeaways: - How to prepare a recover plan. - How to limit the scope of damage from a ransomware attack. - How to harden your environment, making it harder for ransomware attacks to get in. Read More

  • Ransomware Preparedness Before, During and After

    Ransomware is by no means a new topic, but is relevant nonetheless, due to the continued prevalence with which bad actors engage in ransomware campaigns. As we enter the new year, the threat of ransomware attacks is certainly evolving, and new trends emerge. But what are these ransomware trends and how can you safeguard data against new attack vectors? In this upcoming fireside chat during BrightTALK’s Ransomware Summit, Pure Storage Principal Technologist, Andrew Miller, and Towerwall CEO, Michelle Drolet, will sit down to discuss ransomware’s latest, looking into current attack trends, and providing insight into the importance of ransomware resiliency. Tune in live for the full webcast and see what industry experts have to say about the state of ransomware, why building a resilient architecture is important, and how Pure Storage is helping customers respond and recover from attacks. Read More

  • 2023’s Must-Have Ransomware Recovery Components for Success

    From the WannaCrys and Bad Rabbits of 2017 to today’s Lapsus$ and Conti groups, ransomware remains one of the most pervasive—and unpredictable—attacks your organization faces. Considering ransomware attack frequency, it’s likely not a matter of if, but when, your company will be hit. In this situation, the best defense is an offense—and you’ll need more than frequent backups and basic malware detection to thwart ransomware threats today.   To equip your company for success, register for this upcoming webinar, sponsored by Rubrik at BrightTALK’s Ransomware Summit this month: Devising Your 2023 IT Strategy: Must-Have Components for Successful Ransomware Recovery. Don’t miss this opportunity to learn the best methods of defending against, mitigating, and recovering from a ransomware attack on your company’s behalf. Read More