Webinars

Webinars

  • A Discussion on Mitigating Risk from Insider Threats

    At present, Insider threat issues are a significant risk to organizations. In this talk, I will cover the methods of educating employees on mitigating risks from insider threats. Key Take-Away: • Insider Threat and Types? • Indicators of Insider Threats • Mitigation Techniques to prevent Insider Threats Read More

  • The Future is Hybrid and Multi-Cloud: How Does that Look?

    In this fireside chat, ESG senior analyst Paul Nashawaty and OVHcloud’s GM, Jeffrey Gregor, explore: * The rise of the alternative cloud providers – one-size no longer fits all * Reasons to look for alternatives – complexity of migration, talent to support proprietary applications, cost of re-engineering applications, cloud operations, compliance and data sovereignty * The future isn’t “cloud,” it’s hybrid and multi-cloud. What does that look like? * How OVHcloud leverages the market-leading capabilities of VMware in a unified architecture using familiar tools to address use cases such as on-demand capacity, disaster recovery and back-up * New product/service announcements – Introducing Platform as a Service Read More

  • Cross-Cloud Services and Taming the Complexity of Multi-Cloud

    Although sovereign cloud is not new, interest in adopting sovereign cloud services for regulatory compliance and data privacy reasons is growing within organizations across numerous different industries. But what is a sovereign cloud exactly and what problems can sovereign cloud services help solve? In this fireside chat, ESG senior analyst Mark Bowker and VMware’s VP of Cross Cloud Solutions, Vittorio Viarengo, explore: * Multi-Cloud Complexity * VMware Approach to Multi-Cloud * Cross-Cloud Service Strategy * Sovereign Cloud * Cross-Cloud Services Announcements and Innovation at Explore * Customer Stories * VMware ESG Commitment Read More

  • Defeating Ransomware: Security Controls That May Surprise You

    Ransomware has plagued a wide range of organizations for several years and instead of getting better it’s getting worse. On the surface it appears the controls organizations are deploying aren’t working. But more correctly, organizations are failing to deploy the right controls. Attend this session to learn how to stop ransomware and all the *wares. You will leave this session with a manageable list of actionable steps to secure your environment and ensure your organization vaults above the cybersecurity poverty line! About the speakers: Jon Villanti is the Chief Information Security Officer for Allegiance Bank, a 600-employee, $7.1-billion community bank headquartered in Houston. Jon is responsible for the strategic direction and alignment of the bank’s Information Security Program. He is a former instructor for the SANS Technical Institute, teaching courses on information security, cyber warfare and hacker tactics. Lieutenant Colonel Villanti (Ret) honorably served the United States Air Force for 29 years as a member of the Intelligence Community, F-16 pilot and Cyberspace Operations Officer. Jon holds a B.S. in Business Administration from the University of Vermont and a number of cybersecurity certifications. Andres Ruz is Chief Information Security Officer at 5 Factor Technology and has over 20 years of global experience in IT and information security. He has an MBA in MIS, a Bachelor’s in computer science and eight certificates in information technology management and information security. He is the founder of the Houston Banking Information Sharing and Analysis Organization (ISAO), where he collaborates with leaders in this sector, helping each other to better protect their companies. He is also the part of the Board of Directors and Sector Chief for the Telecommunications Cross Sector Council (CSC) of the InfraGard with the FBI. Read More

  • The Year of Zero Days – Defending Against the Million Dollar Threat

    The 2022 SonicWall Cyber Threat Report revealed more than 20,000 Common Vulnerabilities and Exposures (CVEs) were published in 2021, the first time in history that the number of CVEs has passed the 20,000 mark. The most serious of these vulnerabilities, those scored above nine on the 10-point scale, become entry points for cybercriminals, and attackers are increasingly utilizing this means of entry to deploy ransomware and steal data. This talk will: provide coverage of top exploited threat vectors and what to look out for, Dive into critical zero days used to wreak havoc on businesses and governments, and What you and your organization can do. Read More

  • Lessons Learned from Securing Web Apps and API’s at Internet Scale

    Applications Security for Billions: Lessons Learned from Securing Web Apps and API’s at Internet Scale Whenever you hear people talking about web and application security, you’ll often learn about the latest way to make sure you’re not ingesting user supplied input the wrong way, or how to write secure code to prevent cross site scripting, etc. But, have you ever wondered what it’s like to secure business critical websites, and the ever-evolving growth of API’s and bespoke applications that are developed every day across thousands of websites in dozens of countries around the world? In this webinar, Tony Lauro, Akamai’s Security Technology and Strategy Director, will cover: - What defenders are doing at scale to defend the evolving threats targeting websites - Methods for cutting out the noise of benign, but annoying vulnerability verification requests - Best practices for managing large scale security configurations - Some of the ways that defenders are winning against these unimaginable odds, as well as how attackers are targeting these very same applications hoping to bypass security by obscuring their attack techniques Read More

  • Lessons Learned from Securing Web Apps and APIs at Internet Scale

    Application Security for Billions: Lessons Learned from Securing Web Apps and APIs at Internet Scale Whenever you hear people talking about web and application security, you’ll often learn about the latest way to make sure you’re not ingesting user supplied input the wrong way, or how to write secure code to prevent cross site scripting, etc. But, have you ever wondered what it’s like to secure business critical websites, and the ever-evolving growth of API’s and bespoke applications that are developed every day across thousands of websites in dozens of countries around the world? In this webinar, Tony Lauro, Akamai’s Security Technology and Strategy Director, will cover: - What defenders are doing at scale to defend the evolving threats targeting websites - Methods for cutting out the noise of benign, but annoying vulnerability verification requests - Best practices for managing large scale security configurations - Some of the ways that defenders are winning against these unimaginable odds, as well as how attackers are targeting these very same applications hoping to bypass security by obscuring their attack techniques Read More

  • Life’s a Breach: Understand Threat Intelligence, Cyber Maturity and Resiliency

    Tune into this webinar to discover the basics of threat intelligence and how to acquire it. We will also dive into cyber maturity -- what it means and how to best measure it -- as well as the five best steps to improve cyber resiliency. Attendees will also learn the dire consequences that come with deprioritizing cybersecurity in the organization so they can ensure they don't fall victim to a breach. Audience takeaways: • The value of threat intelligence for organizational security. • Measuring your cyber maturity. • Steps to improve your cyber resilience. • Turn threat intelligence into business intelligence. Read More

  • Cybersecurity for Edge AI & Edge AI for Cybersecurity: Synergies and Challenges

    A deep transformation has been happening these past three years in every aspect of the modern workplace, with the widespread introduction of remote work practices, the increasing pressure on supply chain, and globally, modifications in every aspect of the industry. In most cases, this transformation has been digital in nature. And in many of such cases, while this mutation has brought significant improvements in autmation, rationalization, and thus efficiency or productivity, it has also brought new sorts of vulnerabilities and a new level of exposure. This webinar will list the multiple relationships between Edge AI and Cybersecurity. In particular, we will list the traditional but also the specific vulnerabilities of Edge Computing and its declination, Edge AI, and we will present some proven strategies allowing enterprises to address these vulnerabilities. But we will also adress the counterpoint of these vulnerabilities, as the industry can also leverage Edge Computing and Edge AI as an opportunity to secure their digital infrastructure, and thus, their entire operational process. The presentation will thus cover subjects such as Edge AI specific vulnerabilities and strengths, End Point Security practices and tools, Deep Data generation, and other modern considerations linked to Edge AI and cybersecurity in the modern workplace. Read More

  • Fireside Chat with Invicti and Clarify360 on Application Security

    During this exclusive fireside chat, moderated by Jo Peterson, Sonali Shah, will look to address the following topics: - Are unsecure applications just plain easy targets maybe even easier than email? - What are the top 3 application security challenges organizations face today? - Why web applications will continue to be a main vector for external attacks - With Open source continuing to grow, what can organizations do to put themselves in a better position in 2023. Read More