Webinars

Webinars

  • My team didn’t fail — the vendor did!

    What do you do when a third-party vendor has a data breach and exposes your data? In this talk, discover what happened when a third-party vendor was extorted after a ransomware attack, exposing private company data. 1) Do you launch your Incident Response Plan? Do you have an IR plan? Have you tested it lately? Does it cover a third-party data breach? 2) Do you call your Cyber Insurance carrier? Do you have Cyber Insurance? Do they cover this type of incident? What does it cover? Key takeaways: * Review your IR plan. If you don’t have one, make one. * Review your Cyber Insurance policy. What does it cover? If you don’t have cyber insurance, should you get it? * Review your Risk Registry. Do you have third-party risk identified? If so, does it have the right priority? Read More

  • What to Look Out For in Security in 2022

    Cybersecurity has proven to be more important than ever due to the continuous changes to work and everyday life brought on from the past two years. In 2022, cyber threats will only continue to evolve, making it imperative to keep up with the latest threats and solutions. During this discussion, we will cover four significant security topics that you should look out for this year to improve your cybersecurity. Join four Infoblox security experts to learn more about: 1. Endpoint 2. Visibility 3. Cyber Intelligence 4. Cyber Insurance Read More

  • Extract Value and Maximize Efficiencies From ITSM Integrations

    Many IT teams struggle because of the siloed nature of non-integrated IT solutions across their applications, networks, servers, mobile devices, and databases. A siloed approach means IT admins have to manually go through a multitude of reports, notifications, and alerts when a problem arises without gaining any visibility into what’s happening in their IT environment, often resulting in inefficiencies and increased costs. In this webcast, hear from Seyi Verma, director of product marketing, and Sean Sebring, senior sales engineer to learn how an ITSM solution helps streamline and automate processes to extract value from your IT investments through integrations an automations. They will cover common integrations that help bridge silos, improve time to resolution, reduce costs, and improve visibility and efficiency. Integration examples include: • Remote assistance • Networking solutions and IT operation management • Artificial intelligence and machine learning • Access and user management • Collaboration tools Read More

  • AI-powered Continuous Delivery: Autonomous teams need automated governance

    Building, maintaining, and releasing software is difficult with siloed teams using disconnected tools and disparate processes. While DevOps toolchains have made continuous delivery possible, manual governance processes have made it difficult to realize true continuous delivery. Not only that, planning and governance processes do not have the benefit of a business outcome feedback loop. What impact would the ability to measure, track, and gain insight from every step of the software delivery process have on your organization? DevOps Value Stream Management (VSM) solutions can enforce best practices and apply automated governance, enabling even regulated firms to engage in continuous delivery. Join featured guest Christopher Condo, Principal Analyst at Forrester, and Florian Schouten, VP of Product Management at Digital.ai as they discuss: -What is Value Stream Management (VSM) and how it complements DevOps toolchains -The latest Forrester research on VSM solutions and how software organizations are using them -Leveraging insights from across software delivery to automate governance -Optimizing software development by connecting it back to business value Read More

  • The state of endpoint security in today’s workforce

    Securing the endpoint is riddled with new challenges as most workforces have moved off premises and face a slew of new threats. Join this panel discussion to hear leading experts and thought leaders share their insights and tips for how companies can protect themselves using both known and newer methods and technology. We'll discuss: - Redefining the endpoint in 2022 - ZTNA and other emerging security frameworks - The challenge of BYOD devices, IoT devices in the modern workforce - Evolving strategies to protect the endpoint Panelists include: Ateef Mulla, Regional Senior Solution Engineer & Cybersecurity Expert - SonicWall Read More

  • Secure Browser or Browser Isolation 101

    Browsing is now an inherent part of our work and personal lives, from researching, shopping, social media, and accessing SaaS applications. Unfortunately, phishing attacks can strike when users click the wrong link. Ninety-four percent of malware is delivered via email and phishing attacks, making browser isolation an essential part of the Defense in Depth strategy to protect end users. The session will go over key points on how such technology can be used in your organization and why it should be included in your next budget as well as synergies with other products suites like SSE and frameworks such as SASE. Takeaways: • Use cases for browser isolation. • Achieving ZTNA using browser isolation. • Where browser isolation fits in my environment. • Risks and concerns the use of browser isolation can eliminate. Read More

  • Delivering a quality service to the enterprise

    While IT Service Management may be a key enabler of digital transformation and modernising efforts, it is not immune to the growing pains that a rapidly scaling organisation can be subject to. Spiralling user numbers and increasingly complex processes are only some of the challenges getting in the way of delivering quality service across your organisation. Automation is certainly one solution to streamlining processes and improving productivity but it's not always the right solution - there are other ways. In this talk, Richard and Phill will take you on an agile and iterative journey across people, processes and tools - examining how you can maintain delivering high-quality service even as you scale. They'll pay close attention to the ITSM specific challenges some of our biggest and most complex clients have faced, and provide the solutions that took their service desk solutions to the next level. Read More

  • Introduction to Just-in-Time Access with SSH and Database Credentials

    Ensuring users have access to only the resources they need, aka least privilege is great. But have you considered granting users only needed access? This talk will introduce the concept of granting ‘Just-in-Time Access’. Securing an endpoint is more than patching and vulnerability management. Granting access to who, when and what also secures an endpoint. Only when a user needs to connect to a system, can access be granted. Ports such as SSH do not need to be open for the world to connect and probe. Database credentials do not need to last forever. This approach limits the damage that can be caused by an account -- privileged or otherwise -- by reducing the amount of time an attacker has to gain access to the account, as well as the time they have to move from a compromised account before losing access. The short explanation for Just-in-Time Access is providing short-term access in real time. It is a relatively new term in the industry and is another way to practice the least privileged best practice. Key Takeaways: • The benefits to Just-in-Time access for security and operations o Improved visibility o Minimize damage from compromised accounts o Operational efficiency • How SSH can be replaced with AWS SSM sessions o Direct SSH replacement o SSH reverse proxy • How Just in Time Access for database credentials can help o Example: Hashicorp Vault o Example: Akeyless • Resources for learning more Read More

  • The Zero Trust Framework Applies to Endpoints Too

    The zero trust concept has been around for over a dozen years. For a long time it was just an aspiration for companies, but over the past few years it has become a reality. According to a number of surveys, a majority of organizations are working on zero trust projects. While zero trust is primarily regarded as a network security framework, the tenets of zero trust are applicable to all elements of the cyber security stack. This presentation will discuss why and how zero trust can be implemented at the device level. Attending the webinar will provide you with: o A deep understanding of the components of zero trust; o How a zero trust mindset fosters the development of a zero trust architecture; o The added value of including endpoints into this security framework; o The knowledge required to advocate for the incorporation of a zero trust architecture throughout the security stack. Read More

  • Securing a world in motion from any location, any device, or any cloud

    Security teams were once able to reliably understand the users, assets, data and applications they needed to protect. Today, current operating models have put workforces and workloads in motion, forcing security architects to rethink and rearchitect modern security strategies. As adversaries leverage sophisticated attacks that transverse both endpoints and cloud workloads, security teams require more sophisticated controls capable of working together to prevent, detect and respond to advanced threats within a highly dynamic attack surface. This research-led session will focus on how teams are responding, the end-user security controls at play, and the strategies shown to be most effective. Read More