Webinars

Webinars

  • The Latest Trends in API Security: Learn How to Stay Ahead of Attackers

    APIs are ripe and juicy targets for cybercriminals, and loaded with attack traffic that is invisible unless you have effective API security. APIs now consume as much as 60% of all internet bandwidth, but many of them have weak security architecture, which opens the door to data breaches, ransomware, malware, DDoS attacks, and other cyber threats. Enterprises commonly don’t know how many APIs they have or which ones are dormant. Their APIs are like black boxes, leaving enterprises with a problem: they can’t protect what they can’t see. Join this webinar to learn how cybercriminals are exploiting APIs, why the lack of visibility into API traffic is a serious problem for enterprises, and what you and your team should do now to mitigate risk. Presented by industry researcher and analyst Richard Stiennon, and API security expert Rob Dickenson, founder of Resurface Labs. Read More

  • Quantum Risk Is Here Now. Are You Ready?

    Quantum risk is the threat of capable quantum computers upending cryptographic methods, such as RSA or elliptical curve algorithms, widely used today for securing information flows through communication networks. A sufficiently capable quantum adversary would be able to decrypt sensitive data in short order disrupting the trust in the digital systems that increasingly undergird our society. Join us to learn: What is quantum risk and when will it impact my organization? How does encrypted data provide a false sense of security? How to protect against a “Harvest Now, Decrypt Later (HNDL) attack How threat actors can use quantum computer to decrypt your data Buckle up as we start your journey into quantum risk and understanding the coming storm. Read More

  • Top CISO Concerns for 2023 and How to Prepare For Them

    2023 is shaping up to be another challenging year for CISOs. A possible recession, CISO liability for breaches, cyber Insurance and ransomware trends are just a slice of issues CISOs will have to contend with in the near future. This presentation will provide a look ahead into what is on the horizon and how we can best prepare our cyber defenses to protect our people, customers, and assets. About the speaker: Mr. Zalewski, through his company S3 Consulting, provides the following security advisory services: • Executive advisor for early-stage security companies • CISO advisor to venture capital firms internationally • CISO for companies requiring a temporary or part-time CISO • International cybersecurity training and facilitation He is the former CISO at Levi Strauss & Co and has held senior security positions at Pacific Gas & Electric and Kaiser Permanente. Other positions Steve has held include senior engineering mgmt. roles in storage networks, data protection and enterprise operating systems. His credentials include multiple patents in data protection and multi-processor operating system design and CISSP, CISM and CRISC security certifications. Steve also co-hosts the CISOSeries Defense-in-Depth Podcasts and is a frequent speaker and panel moderator for webinars and industry events. Read More

  • 7 Dimensions of Cybersecurity

    Backed by decades of security experience, Towerwall learned that there is no single piece of technology or system that will keep your organization secure. That’s why Towerwall security experts developed a unique security approach that is not only consistent, repeatable and measurable, but also flexible enough to adapt to the changing threat landscape. In this discussion, Towerwall Founder & CEO, Michelle Drolet outlines how your organization can deploy the 7 Dimensions and stay secure. About the speaker: Michelle Drolet, founded and CEO of TowerWall, is a member of the Forbes Technology Council. The Software Report recently named Drolet one of the Top 25 Women in Cybersecurity in 2021; she's also been named one of the Top CEOs to Watch in 2020 by CIO Views and The 10 Most Powerful Women in the Channel by VARBusiness Magazine. She sits on the Framingham Foundation Board Events Committee and the MassBay Cyber Security Advisory Board and is past chair of the Mass Bay Foundation Board, MetroWest Chamber of Commerce, and Framingham ESL. She is the founder of the Information Security Summit at Mass Bay Community College, New England’s premier event that gathers top security and risk management professionals for open dialogue on the latest threats, developments and trends occurring in information security. Read More

  • Entering a Risk-Free Cyber Zone

    Technology plays an important role in our day-to-day life. Whether it is working from home, managing our work schedules, or tracking personal routines and daily activities, we are majorly dependent on technology. With this reliance comes the biggest challenge of securing our information and preventing the risk of opening the doors to intrepid hackers. Tune into this presentation to hear TD Bank's Pankul Chitrav discuss some of the cyber security and risk mitigating techniques to achieve a risk-free cyber zone. Read More

  • Ransomware Preparedness: Cyber Resiliency for 2023

    Ransomware continues to be a top security concern for cybersecurity teams, with no signs of abating in 2023. Instead, businesses must learn to live with the reality of expecting to be attacked and taking the right measures to react quickly when it happens. In this keynote presentation, ESG will present its latest findings on the prevalence of ransomware and provide best practices to help organizations make strides toward readiness, develop a plan for response, and recover quickly. Read More

  • Process Intelligence unlocks the potential of AI and automation in ITSM

    AI and automation support ITSM by optimizing high-volume processes for better and more consistent outcomes, delivered faster, at a lower cost. Key challenges in unlocking these technologies are: Identifying and prioritizing opportunities Documenting the current state (as-is) Finding or generating data for modeling and designing the to-be state Validation, change management and deployment Benefit realization rate analysis Process Intelligence, which automatically creates transparency around digital processes, bridges many of these key gaps reducing the risk of AI and automation projects and most importantly, provides a mechanism for systematically scaling such efforts, including providing evidence of the high ROI achieved. It is therefore an essential tool for unlocking the fly wheel required to succeed with digital transformation. Join us for this session to learn how Skan’s Process Intelligence can be used for a systematic approach to succeeding and scaling AI and automation in ITSM. Read More

  • Leveraging AI in DevOps and IT Service Management

    More and more IT organizations are using AI/ML in their IT Service Management landscape. Think about: self-service using virtual assistants, AIOps, ChatOps, Service failure prediction, automated remediation, etc. But how mature are these AI capabilities for ITSM? What is possible today? Where to start? What is coming next? This presentation is about how Artificial Intelligence and Machine Learning can be used in your IT value streams, supporting your ITSM and DevOps transformation activities. Learn how you can leverage AI/ML in your IT organization to streamline and automate IT activities. Key questions discussed in this presentation: -How does AI/ML fit into your overall IT service management landscape (of processes and tools)? -What AI/ML features are currently available to support your IT value streams? -How can you benefit from AI/ML? -Where to start the AI journey in your IT organization? -What are the future developments and trends of applying AI/ML in DevOps and ITSM? Read More

  • Accelerating Service Management Automation via Next Gen AI-Assisted Operations

    Globe Telecom has been a leader in enterprise digital transformation since 2014, realizing clear benefits in the area of adaptive infrastructure to drive business agility at scale. This webinar will talk how Globe and Cascadeo works with its customers to achieve similar success, and how AI-Assisted operations leads to reduced human operational workload, downtime, tooling, and expense. This is achieved through our AIOps solution, cascadeo.io , an IT service intelligence platform, with data analytics at its core, covering all major public cloud platforms. Read More

  • Gain 360° Visibility for Modern App Performance: Deliver an Amazing UX

    The modern worker expects a flawless digital experience while working from the office, home, anywhere — nearly a third of employees have changed jobs due to poorly performing workplace systems and technology. While employee retention becomes a key corporate objective, IT operations are increasingly blind to the performance of modern applications: 42% of users report performance issues with SaaS solutions, but 39% escape detection by existing monitoring tools.* What’s changed? Modern, cloud-powered applications redefine app delivery by accelerating the adoption of cloud-powered security, access and networking with SASE, SWG, CASB and SD WAN that both enable and impact a distributed workforce. This session will explore how essential cloud technologies are creating this new visibility gap by illustrating it with live examples from global-scale enterprise networks in manufacturing, retail and eCommerce verticals. Learn how visibility can be reestablished across this new digital infrastructure by combining agentless real user monitoring with AI-enabled synthetic testing. See how correlating the dynamic traffic path with user-centric performance metrics reveals the digital employee experience, and empowers IT operations to optimise it. The live demonstrations in this session will be based on real-time data collected from over 100 global locations and over a billion daily user transactions. [* Statistics from NTT Global Services report 2021, ESG insights, EMA, Digital Enterprise Journal and Workfront 2021] Read More