Webinars

Infosecurity magazine webinars are dedicated to bringing together the best in Information Security strategy, technology & insight. Each webinar includes high level industry speakers and analysts and aims to provide relevant information and advice which our viewers can take away and implement in the workplace or to further personal development. For every session attended viewers can earn CPE credits towards CISSPs, SSCPs and ISACA accreditations.
 
Webinar topics include- Application Security, Biometrics, Business Continuity & Disaster Recovery, BYOD, Cloud, Compliance & Policy, Data Loss, Encyption, Identity & Access Management, Internet & Network Security, IT forensics, Malware & Hardware Security, Public Sector, Wireless & Mobile Security and emerging technologies.

Forthcoming Webinars

The Virtual Backdoor: Protecting Your Digital Supply Chain

Date: 24 April 2014, 15:00 GMT
Duration: 1 hours

Securing the digital supply chain has risen up the corporate agenda in light of increased reliance on outsourcing, largely influenced by cloud computing, mobile technology and a change in cybercriminal focus and behaviour.

Are insiders still the biggest threat?

Date: 8 May 2014, 15:00 GMT
Duration: 1 hours

Insider threats have shifted to include both traditional insiders – individuals with access to critical data as part of their work, and privileged users -- and the compromise of legitimate users' credentials by sophisticated malware and advanced persistent threats (APTs).

Archive

Is SSL Secure? Cutting through the Paranoia.

Date: 10 April 2014, 2PM EDT
Duration: 1 hours

Available Now

SSL certificates are the foundation of internet security, but they are increasingly under fire and, when improperly setup, become an unwatched door for cybercrime and cyber-espionage. Users – and your customers – trust SSL by default, which is why the online security protocol is the perfect attack tool.

Diffusing the End of Life timebomb

Date: 27 March 2014, 15:00 GMT
Duration: 1 hours

Available Now

Depending on operating systems and software that have reached their end of life is a growing risk for IT. A product that has reached its end of life is no longer supported by the vendor, and may mean any security risks will not be addressed by updates. Every product you have in your environment that has reached its EOL date adds one more potential foothold for a hacker to gain access to your environment.

Intellectual Property: Cybersecurity's Next Front Line?

Date: 20 March 2014, 15:00 GMT
Duration: 1 hours

Available Now

Theft of intellectual property is one of the top three risk facing business today, according to the 2013 Advanced Threat Report from FireEye. And it is hardly surprising that companies and regulators are starting to take the issue more seriously.

See, Know, Act: How to Stop Cyber Attackers in their Tracks

Date: 13 March 2014, 15:00 GMT
Duration: 1 hours

Available Now

As conventional security technologies are proved time and time again to be insufficient to protect your network, complete visibility into your organisation’s network becomes absolutely crucial in order to mitigate the evasive attacks and zero-day vulnerabilities of today’s threat landscape.

Lurking Trust-based Vulnerabilities You Need to Investigate Now

Date: 13 March 2014, 14:00 EDT
Duration: 1 hours

Available Now

A recent University of Michigan scan of the Internet found 99% of websites using SSL were in fact advertising publicly known vulnerabilities.

Global Compliance and Data encryption: obligation, or opportunity?

Date: 6 March 2014, 15:00 GMT
Duration: 1 hours

Available Now

As recent cases have highlighted, data protection authorities in Europe are taking an increasingly hard line with businesses that lose personal data. And forthcoming EU data protection reforms will make the penalties even more severe.

5 Steps to Prevent Identity-based Attacks

Date: 27 February 2014, 15:00 GMT
Duration: 1 hours

Available Now

Identity-based attacks are a growing risk for all organsations. As security teams harden the corporate perimeter, hackers and criminals are looking for the weak spots – and that weak spot is all too often human.

Productivity or Security: Do you have a Choice?

Date: 20 February 2014, 15:00 GMT
Duration: 1 hours

Available Now

Effective collaboration is essential to every business. But collaboration between employees, contractors, and suppliers can produce a range of information security risks, such as privacy breaches, data loss, and the loss of intellectual property.

Testing Your Business’s Ability to Defend its Digital and Physical Workplace

Date: 13 February 2014, 15:00 GMT
Duration: 1 hours

Available Now

With the ‘Internet of Things’ firmly embedded as the one of the key information security topics of 2014 (confirmed by Google’s Nest Labs acquisition), technology’s ability to impact businesses physically has turned commonly accepted threats to client data and the consequent reputational damages on their head.

December Patch Update - Sponsored by Qualys

Date: 13 December 2013, 15:00 GMT
Duration: 1 hours

Available Now

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

From Villain to Hero: How Security Can Maximize Value from your IT Investments

Date: 12 December 2013, 15:00 GMT
Duration: 1 hours

Available Now

Can IT security inform and align with the innovation, capitalization and diffusion of your business’s new technology, processes and consequent regulatory requirements? Can it be done in a way that demonstrates to management that IT security is a business enabler, rather than inhibitor?

Threat Monitoring: Best Practice Today, The Law Tomorrow?

Date: 5 December 2013, 15:00 GMT
Duration: 1 hours

Available Now

According to analyst research, failing to prepare for a security breach will cost CISOs their jobs in the future. Preventing all security breaches might be impossible. But preparing a fully-documented and tested response plan is something CISOs can, and must, do.

Creating a Mobile Security Action Plan...

Date: 28 November 2013, 15:00 GMT
Duration: 1 hours

Available Now

...A Year From Now You May Wish You Had Started Today We’ve all developed very personal relationships with our smartphones and tablets. As we use them at work, at home, and on our travels, it’s only natural to see these useful gadgets as entirely benign.

5 Reasons Why Disaster Recovery Plans Fail & How To Fix Yours

Date: 21 November 2013, 15:00 GMT
Duration: 1 hours

Available Now

Did you know that natural disasters, such as hurricane or flood only account for approximately 3% of all business disasters while hardware failures and human error account for more than 70%? Join us for this webinar as we discuss the potential disasters within a disaster recovery plan and how you can avoid them and become the calm within the storm.

Take Back Network Control: Taming the Rogue Device Threat

Date: 19 November 2013, 15:00 GMT
Duration: 1 hours

Available Now

With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network.

Five Cloud Security Trends for 2014

Date: 14 November 2013, 14:00 EST
Duration: 1 hours

Available Now

As 2013 draws to a close, join Infosecurity magazine as we discuss the year that was and what may be in the world of cloud security. Among the topics we will cover are events over the past year that have impacted the cloud computing landscape – from regulations to revelations.

Hitting the Reset Button: Developing a Proactive, End-to-End Security Strategy

Date: 12 November 2013, 15:00 GMT
Duration: 1 hours

Available Now

Cyber-attacks are a business reality, and they are question of when your organization will be compromised, not if. Well-executed, better-coordinated attacks are today’s norm, and organizations must now take a different approach to protecting their people, assets and IP.

Penetration Testing: Staying a Step Ahead of the Hackers

Date: 7 November 2013, 15:00 GMT
Duration: 1 hours

Available Now

In today’s online world, where new technologies bring benefits, but also give rise to new threats, businesses need to stay a step ahead of the criminals.

APT Protection via Data-Centric Security

Date: 24 October 2013, 15:00 BST
Duration: 1 hours

Available Now

Traditional perimeter security is failing. The threat from advanced persistent threats shows no sign of easing, every business in its path.

October Patch Update - Sponsored by Qualys

Date: 10 October 2013, 15:00 BST
Duration: 1 hours

Available Now

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

Poison Ivy: Sniffing out the RAT

Date: 8 October 2013, 15:00 BST
Duration: 1 hours

Available Now

The Poison Ivy remote access tool (RAT) has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

WiFi, BYOD and Security: Where are the Devices, and Where are the Users?

Date: 3 October 2013, 15:00 BST
Duration: 1 hours

Available Now

Today's businesses need to secure the user reliably, and securely, in an environment where BYOD is replacing company issued computing.

Security, Mobility and Compliance: Can An Organisation Have It All?

Date: 26 September 2013, 15:00 BST
Duration: 1 hours

Available Now

In business, sharing information to get work done within, and between, organisations is more important than ever. But with the growth of both mobile workers and of mobile devices, can information transfer ever be secure?

How to Make Access to your Sensitive Data More Secure - The Easy Way

Date: 19 September 2013, 16:00 BST
Duration: 1 hours

Available Now

Sensitive data is shared more than ever, through cloud services and via remote access as more and more employees use their mobile devices for work. This brings practical advantages, but brings more risk of identity theft, data breaches and outages.

Webinar Week: Women in Information Security - In Association with (ISC)²

Date: 13 September 2013, 15:00 BST
Duration: 1 hours

Available Now

Female information security pros account for less than 10% of the industry’s professionals, yet talent is rife amongst those that have entered the world of information security.

Webinar Week: Access Denied- Is Authentication the Unsolvable Information Security Problem?

Date: 12 September 2013, 15:00 BST
Duration: 1 hours

Available Now

Industry experts are almost unanimous in their acceptance of authentication as the unsolved problem facing the information security industry. Passwords are both forgettable and inadequate, memorable information is easily sought out via social networking sites, two-factor authentication can be inconvenient, three-factor authentication is inconvenient, biometrics are treated with suspicion…

Webinar Week: Government Data Collecting, Sharing, and Protection

Date: 11 September 2013, 15:00 BST
Duration: 1 hours

Available Now

Edward Snowden has become a household name through his whistleblowing, but looking beyond the game of ‘Where’s Snowden’ that the world’s media seem to be playing, are questions about the UK and US government’s acquisition of data, and the reasons for the collection of data.

Webinar Week: Zero-day Attacks for Defense and Attack

Date: 10 September 2013, 15:00 BST
Duration: 1 hours

Available Now

The proliferation of hacking tools known as zero-day exploits is raising concerns at the highest levels in the information security industry and in government, even as U.S. agencies and defense contractors have been named as the “biggest buyers of such products”.

Webinar Week: Data Breach Detection and Remediation

Date: 9 September 2013, 15:00 BST
Duration: 1 hours

Available Now

2013 has been the year where there has been a real sea-change in the way the industry perceives data protection and data breaches. In the past, the focus has been on prevention, but it is now more widely accepted that the question of if you will suffer a data breach is now when you will suffer a data breach.

UK Webinar Week: September 9th – September 13th

Date: 9 September 2013, 15:00 BST
Duration: 5 hours

Available Now

We’re delighted to invite you to join us at Infosecurity's UK Webinar Week event. Especially for our dedicated UK readers we will be hosting five webinars across five days, Monday 9th September – Friday 13th September at 3pm BST every day, covering the latest global information security trends and challenges – all from the comfort of your own desk, whenever suits your schedule.

Advanced Cyber Attacks: Identifying The Culprits

Date: 5 September 2013, 15:00 BST
Duration: 1 hours

Available Now

In today’s cyber threat landscape, identifying your enemy is a crucial piece of any defense plan. Finding out who your attackers are, how they work, and what they want is critical to protecting your data and intellectual property

Moving the Security Perimeter to the Cloud

Date: 29 August 2013, 15:00 BST
Duration: 1 hours

Available Now

Moving IT to the cloud brings real benefits in cost and flexibility. But businesses need to balance these with web application security, availability and performance. And as IT moves outside the perimeter, this can create new risks and expose business data to new threats.

August Patch Update - Sponsored by Qualys

Date: 15 August 2013, 15:00 BST
Duration: 1 hours

Available Now

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

Data Protection Rules are Changing: What Can You Do to Prepare?

Date: 8 August 2013, 15:00 BST
Duration: 1 hours

Available Now

The European Union’s proposed new data protection regulation aims to update Europe’s data protection laws and to provide a more consistent data protection framework across the Continent.

Defending the Modern Network from Targeted Attacks

Date: 1 August 2013, 16:00 BST
Duration: 1 hours

Available Now

In the quest for new efficiencies, cost savings and on-demand access, enterprises have become their own worst enemy when it comes to security. From BYOD to virtualization, enterprises have created complex environments that cannot be secured like yesterday’s network. They have opened the door to a new breed of cybercriminals employing cunning, multi-stage targeted attacks that evade traditional defenses, as well as some of the latest advanced malware protection systems available today.

Is Cybersecurity Failing to Measure Up?

Date: 25 July 2013, 15:00 BST
Duration: 1 hours

Available Now

Security spending is one of the few parts of the IT budget that is still growing. But how effective is that spending really? Given the increasing complexity of the cybersecurity threat landscape, if security teams are to argue for even greater investment, they need to prove that money is being spent wisely — and that the investments really do improve the business' security.

Six Simple Steps to Arm your Organization against Advanced Threats

Date: 25 July 2013, 14:00 EDT
Duration: 1 hours

Available Now

Trust in the online world is a double-edged sword – your organization’s reputation is often based on it, but increasingly we operate in an environment where trust has come under attack and may soon no longer exist at all. Do we live in a “zero trust” world, or can organizations take simple steps – and deploy defence-in-depth – to avoid the scourge of advanced cyber threats and lost IP?

Passwords, SSO, and Beyond

Date: 11 July 2013, 15:00 BST
Duration: 1 hours

Available Now

Organisations of all sizes are looking to capture the benefits of cloud computing. But realising those benefits, without increasing risks to sensitive data is a major challenge.

How to Successfully Implement SIEM within your Organisation

Date: 4 July 2013, 15:00 BST
Duration: 1 hours

Available Now

There’s a growing need for organisations of all sizes to identify cyber threats and to meet their compliance demands. Could SIEM provide a solution? SIEM is often seen as just a security function and its real value is often overlooked. Should IT security teams look again at SIEM, how do organisations justify its cost, and what is the return on investment?

Mapping the Global Attack Landscape

Date: 27 June 2013, 15:00 BST
Duration: 1 hours

Available Now

During 2012, FireEye monitored more than 12 million malware communications and summarized the trends produce a broader picture of the global threat landscape, culminating in the launch of their interactive cyber threat maps and Advanced Cyber Attack Landscape report.

Lock Down: How to Keep your Important Data Safe in the Cloud

Date: 14 June 2013, 15:00 BST
Duration: 1 hours

Available Now

For security reasons, cloud computing presents a huge dilemma: How do you embrace the benefits of the cloud while maintaining security controls over your organization’s assets? It is difficult to determine whether the increased risks are truly worth the agility and economic benefits.

June Patch Update - Sponsored by Qualys

Date: 13 June 2013, 15:00 BST
Duration: 1 hours

Available Now

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

Network Access Control: What, Why, How, When and Where?

Date: 6 June 2013, 15:00 BST
Duration: 1 hours

Available Now

With all the talk around APTs, mobility and the cloud, you may have assumed that NAC was old news. But NAC is making a comeback. This webinar will take stock of the latest developments around NAC and see how it can address your organisation's most pressing network, security and compliance challenges.

Using Security to Promote Trust and Prevent Online Fraud

Date: 30 May 2013, 14:00 EDT
Duration: 1 hours

Available Now

Global e-commerce sales is projected to pass the $1.25 trillion mark by 2013. In this vibrant environment, there is huge potential for businesses to grow. Unfortunately, such an environment also attracts cyber-criminals to conduct nefarious activities for their own gain. Businesses that have been targeted typically sustain brand and reputation damage that could lead to damage costs and revenue loss from shopping cart abandonment.

Is Your Advanced Persistent Threat Strategy Still Leaving the Door Open?

Date: 23 May 2013, 13:00 EDT
Duration: 1 hours

Available Now

Today, every business and government is a target for data theft. Research shows 100% of all advanced attacks are a result of credential compromises and organizations are racing to add new layers of security to help detect and respond. But, are you still leaving the door open to advanced persistent threats (APTs) and targeted attacks?

Bring Your Own Device - Without Losing Your Data

Date: 16 May 2013, 15:00 BST
Duration: 1 hours

Available Now

Mobile is one of the hottest topics for information security officers. Executives and employees are demanding access to business content on their smart phones and tablets, and the race to deliver can expose organisations to serious risks.

Advanced Threats: How They are Developing, and Who is at Risk

Date: 2 May 2013, 15:00 GMT
Duration: 1 hours

Available Now

This webinar will provide an overview of the advanced threat landscape, evolving APT tactics and the level of infiltration seen in organisations’ networks today.

APT Protection via Data-Centric Security

Date: 18 April 2013, 15:00 BST
Duration: 1 hours

Available Now

The APT tornado is getting larger and gathering speed, and we're all in its path of destruction. Things like perimeter security and simple encryption don’t cut it; perimeter security is irrelevant when barbarians are inside and simple encryption gives a false sense of security because it lacks the policy control to protect against privileged user exploitation.

Future Proofing Your Infosecurity Strategy

Date: 12 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

As organizations adopt new technologies, they also open up new infosecurity vulnerabilities. The number of these "attack vectors" continues to grow, as industry develops new devices and applications – and as cybercriminals develop new hacks. The popularity of mobile and tablet devices, in particular, poses new risks.

April Patch Update - Sponsored by Qualys

Date: 11 April 2013, 15:00 BST
Duration: 1 hours

Available Now

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

Maximize Your Employability as an Information Security Professional

Date: 11 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

As information security becomes an increasingly acknowledged concern for organizations, it has become a field in which demand for qualified professionals exceeds supply.

The FBI is on the Phone…Something about a Data Breach?

Date: 10 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

What would be your response if you received this call? And if you think it will never happen, then think again.

New approaches to effective SCADA cybersecurity

Date: 9 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

It’s no secret that SCADA systems are vulnerable to compromise. Legacy industrial control systems weren’t designed with security in mind, emerging smart technologies are presenting new risks and new challenges are emerging as control systems migrate to IP networks.

US Webinar Week 2013 - 8th to 12th April

Date: 8 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

We’re delighted to invite you to join us at Infosecurity ‘s US Webinar Week event, in association with GeoTarget. Especially for our dedicated US readers we will be hosting five webinars across five days, Monday 8th April – Friday 12th April at 2pm EDT every day, covering the latest global information security trends and challenges – all from the comfort of your own desk, whenever suits your schedule.

Data Protection and Globalization

Date: 8 April 2013, 14:00 EDT
Duration: 1 hours

Available Now

Global businesses means complying with international law and regulations – and nowhere is the pressure greater than when it comes to data protection law.

Encryption: The Good, The Bad & The Ugly

Date: 4 April 2013, 15:00 BST
Duration: 1 hours

Available Now

Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry. Most organisations have no process for managing, removing, and changing access-granting keys. This violates SOX, FISMA, PCI, and HIPAA, all which require proper control of access to servers and proper termination of access.

Virtualization Security Risks: What Are They and How to Defend Against Them

Date: 28 March 2013, 15:00 GMT
Duration: 1 hours

Available Now

Virtualization has taken the computer world by storm, lowering costs and significantly speeding up many routine processes. But has your computer security processes and technologies kept up?

Is it Possible to Create a Culture of Secure Collaboration?

Date: 26 March 2013, 14:00 EDT
Duration: 1 hours

Available Now

Defending against employee-based risks doesn’t always involve monitoring those with malicious intent. Oftentimes, in their desire to move information and ideas more quickly and efficiently, employees will step outside the restrictions established by corporate IT and organizational policies. In doing so, many employees open up their organizations to a host of data security risks by using cloud-based information sharing tools that lack the compliance and risk controls often required by highly regulated industries.

Take Advantage of Advanced Threat Protection Available in Next-Generation Firewalls

Date: 21 March 2013, 15:00 GMT
Duration: 1 hours

Available Now

Next-generation firewalls include embedded threat protection features, such as IPS, which enable Information Security to stay ahead of increasingly advanced threats. Yet migrating and optimizing next-gen firewalls puts an undue burden on IT or information security teams, according to a recent survey conducted by Skybox Security.

Know Your Enemy: The Changing Face of Cyber Attackers

Date: 13 March 2013, 16:00 GMT
Duration: 1 hours

Available Now

Attacks have changed dramatically with the passing of each decade. Cyber attackers have evolved from lonely hackers passing time to fully "employed" online assailants who target their online assaults on an individual, an organisation or even a government. So who are these people? What is their aim? Who employs them?

Don’t Gamble With Your Data: Critical Questions for Data Security in the Cloud

Date: 7 March 2013, 14:00 EST
Duration: 1 hours

Available Now

The reasons for moving to the Cloud are as varied as the businesses that are deploying Cloud solutions: • Increased efficiency and reduced costs • Frees up the IT team from having to manage some or all of the IT infrastructure • Pay-as-you-go model - software, hardware and platform all as-a-service • It’s elastic - the Cloud allows businesses to quickly scale up or scale down, as business requirements dictate

Advanced Cyber Attack Analysis

Date: 28 February 2013, 15:00 GMT
Duration: 1 hours

Available Now

Following a number of recent high profile information security breaches, this webcast will explore the growing threat of advanced attacks and the risks they pose to enterprise organisations worldwide

Can Security Be Based On Trust, Not Fear?

Date: 21 February 2013, 15:00 GMT
Duration: 1 hours

Available Now

Trust is essential for building a sustainable business, but security is essential for building trust. To build trust in electronic networks, security needs to be built in, rather than being bolted on in a piecemeal fashion.

2020 Vision: Enabling and Securing the Enterprise of the Future

Date: 19 February 2013, 14:00 GMT
Duration: 1 hours

Available Now

The last 10 years have seen a fundamental shift in the ways we work, mostly driven by a desire for work/life balance and the increasing effectiveness of the web and its applications. So how might we be working in 2020? It’s never too early to start thinking about what the future may hold.

February Patch Update - Sponsored by Qualys

Date: 14 February 2013, 15:00 GMT
Duration: 1 hours

Available Now

Each month, our Patch webinar gives listeners a chance to stay up to date with the latest patches, and to look deeper at some of the issues around patch management.

Preventing a Data Loss Disaster: Encryption’s Role in Your Compliance Strategy

Date: 31 January 2013, 14:00 EST
Duration: 1 hours

Available Now

We here at Infosecurity see the reports constantly: a healthcare worker, taking their job home with them, misplaces an unencrypted thumb drive and with it thousands of bits of personally sensitive information.

Is Security Awareness a Waste of Time?

Date: 24 January 2013, 15:00 GMT
Duration: 1 hours

Available Now

The continued growth of successful spear phishing attacks against high-profile targets such as The White House has security experts debating whether security awareness efforts are a waste of time.

Agile and Secure Development - Can Secure Development Be Agile Too?

Date: 15 January 2013, 15:00 GMT
Duration: 1 hours

Available Now

Often, the needs of agile and secure development seem impossible to reconcile. But with pressure on businesses to deliver applications more quickly, agile is here to stay.

How to Take Control of End Point Security in the BYOD Era

Date: 11 December 2012, 14:00 EST
Duration: 1 hours

Available Now

The biggest challenge of the bring-your-own-device (BYOD) era is reconciling the need to keep your workforce equipped with the latest, most productive technologies while, at the same time, taking steps to mitigate organizational risks of data leakage – not to mention the compliance aspects nearly all organizations must consider.

Latest Patch Update - sponsored by Qualys - rescheduled for 14th Dec 2012

Date: 7 December 2012, 15:00 GMT
Duration: 1 hours

Available Now

In December, we are launching our monthly Patch webinar series, which will take a look at each month’s Patches from the major operating systems, browsers, and software providers.

Secure Collaboration for the Enterprise - sponsored by Axway & HP

Date: 6 December 2012, 15:00 GMT
Duration: 1 hours

Available Now

Businesses rely on the effective sharing of important information; internally and externally with customers and suppliers, transferring over 80% of business information in files.

Malware Update - sponsored by FireEye

Date: 5 December 2012, 15:00 GMT
Duration: 1 hours

Available Now

This webinar will look back at the malware trends of 2012, focussing on the facts and figures around the malware which affected the most computers and devices, and the most financially damaging malware.

Big Data - sponsored by Varonis

Date: 4 December 2012, 15:00 GMT
Duration: 1 hours

Available Now

Big data has presented some unique opportunities and challenges. While storage and analytic concerns are often discussed, the need to tackle problems related to the security and privacy of the data that is being collected is often overlooked.

Bring Your Own Device - sponsored by ESET

Date: 3 December 2012, 15:00 GMT
Duration: 1 hours

Available Now

Bring Your Own Device and consumerization have been on the CISO agenda for some time now, yet many are still confused about how to choose the right device management strategy for their organisation.

Mitigating risk in financial services

Date: 28 November 2012, 15:00 GMT
Duration: 1 hours

Available Now

Financial services firms face challenges around risk, compliance and data protection as well as the conventional infosecurity threats.

Does certification matter in infosec?

Date: 22 November 2012, 15:00 GMT
Duration: 1 hours

Available Now

The UK Government has introduced a new certification process for information assurance specialists.

How to turn a potential insider threat into an information security asset

Date: 15 November 2012, 15:00 GMT
Duration: 1 hours

Available Now

The right strategy for protecting your data and systems from malicious code and malicious people has always required the right blend of technological and human factors. Due to the growing industrialization of malware, getting this blend right is more critical than ever, particularly for small and medium enterprises.

You've secured the perimeter, but what about your apps and data?

Date: 8 November 2012, 15:00 BST
Duration: 1 hours

Available Now

Applications can be an open door for those wanting to break into corporate networks or to steal data, yet the link between application security and data security is too often overlooked. Moreover, in many cases security is not as central to the application development life-cycle as it should be.

Managing security – remotely: How to streamline your IT infrastructure

Date: 1 November 2012, 15:00 BST
Duration: 1 hours

Available Now

With more businesses relying on mobile and remote workers, keeping control of security can be a challenge.

The Changing Landscape: Latest Insights into the Global Web Threat Ecosystem

Date: 25 October 2012, 3pm BST
Duration: 1 hours

Available Now

Newly released research on web security identified a significant evolution in the threat landscape: the use of malware networks, or malnets, to launch highly dynamic web-based attacks. These complex infrastructures, which outlast any one attack, drove a 240% increase in the number of malicious sites during the year and are expected to launch as many as two-thirds of all new attacks in 2012. The Blue Coat Security Labs team first discovered the existence of these malicious networks early in 2011, and this webinar will provide insight into the malnet ecosystem in depth, examining user behavior, malnet strategies and tactics, as well as highlighting the best defenses against these aggressive infrastructures.

How to counteract the threats that your firewall, AV and IPS won’t pick up

Date: 11 October 2012, 3.00 pm BST
Duration: 1 hours

Available Now

Organisations typically spend $20 billion on information security defences that do not protect you against dynamic, stealthy and advanced threats. Signature-, reputation-, and basic behaviour-based technologies are increasingly being evaded by unknown threats and advanced malware. In this webinar, the results of the FireEye Advanced Threat Report 1H 2012, will be reported and analysed by industry experts.

No Boundaries Security: BYOD and Beyond

Date: 26 September 2012, 3pm BST
Duration: 1 hours

Available Now

For today’s mobile worker, the office can be almost anywhere – at any time. Whether it’s the home, a Starbucks, or even the beach, the ubiquity of network access and the explosion of mobile devices have made access to enterprise data and communications a 24-hour phenomenon. While this has made the life of our employees easier – and more productive – efforts to address the ensuing security challenges are remain an ongoing process.

Securing your business: passwords are no longer enough

Date: 13 September 2012, 3pm BST
Duration: 1 hours

Available Now

Consumers now have dozens of passwords they use across social media and the web, and there is growing evidence that they reuse those passwords at work too.

Cloud Control: Security and Compliance Issues You Must Address when Moving to the Cloud

Date: 16 August 2012, 11:00am PT / 2:00pm EDT
Duration: 1 hours

Available Now

Are you contemplating moving more of your resources into the cloud – whether it be data, applications, or infrastructure? Or have you already done so, but still have questions about security and compliance issues that never go away? The good news is that you are hardly alone.

Get Ahead of the Next Flame Malware: How to Protect Your SSL Certificates from Compromise

Date: 14 August 2012, 10am Eastern Time / 3pm BST
Duration: 1 hours

Available Now

SSL certificates and keys are widely recognized as the foundation of trust in securing data and authentication between systems. As the foundation of trust, they are targeted by those who seek illegitimate access to exploit your most valuable information. The compromise of MD5 certificates via the Flame malware is a good example of what can happen when SSL certificate management isn’t addressed.

From Mobile Device Management to Mobile Information Management

Date: 14 August 2012, 2pm BST
Duration: 1 hours

Available Now

Organisations are gaining competitive advantages by enabling new mobile usage models for their workforces, including BYOD and mobile apps. But sensitive data and the devices that access them still need protection and management. Symantec combines security and management with an extensive array of technologies from authentication and encryption to data loss prevention and application protection.

Industrial Espionage, Weaponized Malware, and State-Sponsored Cyber Attacks: How to Identify, Counter, and React.

Date: 31 July 2012, 3.00pm BST
Duration: 1 hours

Available Now

The information security industry has been issuing warnings of an increase in sophisticated state-sponsored cyber attacks in the wake of Flame. Neither the U.S. or Israel have denied their role in the use of recently discovered weaponized malware. Add in to the mix the fact that India recently announced the empowerment of its government agencies to carry out state-sponsored cyberattacks, and suddenly political – and thus industrial – espionage has never been more of a threat.

Evaluating Your Website for Security Vulnerabilities

Date: 26 July 2012, 11am Pacific / 2pm Eastern
Duration: 1 hours

Available Now

Data leaks. Downtime. Defacement. These three D’s are the most common outcomes resulting from website hacking incidents. Any of these alone can serve as a source of embarrassment for your organization; all three could lead to near-term disaster. And this is just a few of the examples of what can go wrong.

How to Overcome the Security Challenges of Implementing a Mobile Strategy in Your Organization

Date: 19 July 2012, 3pm BST
Duration: 1 hours

Available Now

A mobile workforce is no longer a luxury, it's a necessity. The mass adoption of smartphones, tablet computers and mobile applications has dramatically altered the mobile landscape.

Flame: The truth behind the cyber weapon, killer feature, and its relationship with Stuxnet

Date: 28 June 2012, 15.00
Duration: 1 hours

Available Now

Flame malware has fascinated the cybersecurity industry with its sophistication and the versatility of a Swiss-Army knife of cyberspying.

Social Engineering: The Sinister Truth Behind Spear Phishing Attacks

Date: 21 June 2012, 15:00
Duration: 1 hours

Available Now

Fighting malicious computer-based algorithms is hard enough, but in the battle against targeted APT attacks you’re fighting humans too.

You Don't Know NAC: Applications, Innovations and User Insights from Evaluation to Deployment

Date: 4 April 2012, 15:00 GMT
Duration: 1 hours

Available Now

According to some analysts, organizations only can account for half of devices on their network. With the influx of personal mobile devices and the drive to enable Bring Your Own Device policies, how can organizations manage the increased risks of data leakage, compliance and data privacy, and advanced persistent threats?

Out of the Blue: Responding to New Zero-Day Threats!

Date: 29 March 2012, 2pm GMT
Duration: 1 hours

Available Now

It's one of the worst scenarios IT security professionals face: Your CIO has just read about a new Zero-Day vulnerability and is asking if you're at risk. The next 24 hours are often a scramble to get signature updates, beg for scanning permission, and nervously waiting for results. If you'd rather be proactive than reactive when new threats emerge, this webcast is a must-attend event.

Protect Your Enterprise From Advanced Threats: Analysing Successful Malware and APT Attacks

Date: 15 March 2012, 10:00AM GMT
Duration: 1 hours

Available Now

Talk of advanced threats has dominated the industry in recent times. APT attacks, in particular, have been put in the spotlight. On the 15th February, FireEye published their Advanced Threat Report for the second half of 2011. The report unveiled some astonishing trends.

How to protect your organisation from multi-vectored threats

Date: 13 December 2011, 10 AM - GMT
Duration: 1 hours

Available Now

Multi-layered IT security used to be optimum method of raising the bar on your IT security defences, but the advent of multi-vectored threats, phishing and all manner of cyber- criminality means that a consolidated approach is now the best option – especially now that the latest appliances can be controlled from a single dashboard.

Defending mobile devices against the rising avalanche of security threats

Date: 6 December 2011, 3 pm GMT
Duration: 1 hours

Available Now

End point security has changed. Alongside laptops are a now wide range of portable devices – including smartphones and tablets – and they all need defending...

Infosecurity Virtual Conference Keynote: The Evolution of Security on the Smarter Planet

Date: 3 October 2011, ON DEMAND
Duration: 1 hours

Available Now

If you missed the Infosecurity Virtual Conference keynote address, we are pleased to announce that you can register – free of charge – to view it now, on demand.

The Sad State of Password Security

Date: 22 September 2011, 12pm ET
Duration: 1 hours

Available Now

All too often employees create weak passwords to login to work systems, as well as to access personal email and applications via the Internet while at work. The risks are great: hackers can quickly expose these weak passwords and gain access to corporate data via malware and related attacks.

Five Steps to Securing Cloud Servers

Date: 24 August 2011, 3 pm BST (4 pm CET)
Duration: 1 hours

Available Now

A structured methodology for extending an organization’s enterprise security infrastructure out to Amazon EC2 and other cloud environments.

Preventing data leakage in the real world

Date: 7 July 2011, 3pm
Duration: 1 hours

Available Now

Citibank, RSA, Sony - the list of organisations whose databases are being very publicly rifled is growing all the time. And the consequences - other than egg on the face of the management of these organisations are severe: share price dips, lawsuits and brand reputation damage. And that's just for starters...

Virtual machines vs real cybercriminals - is your v-security up to scratch?

Date: 28 June 2011, 14:00 BST
Duration: 1 hours

Available Now

Large numbers of corporates are migrating their IT resources to a virtual machine environment - largely thanks to the cost savings and convenience that the leading edge technology offers. But the security strategies required for this brave new virtual world are radically different to those most of us are experienced in. Join us for an informative 60 minute webinar in which our panel of experts - including key Symantec and VMware security experts - will explain what security planning strategies and technology solutions can assist IT professionals tasked with moving their business IT systems over to a virtual platform.

Defending the changing company Web security landscape

Date: 26 May 2011, 3pm BST
Duration: 1 hours

Available Now

The Web has changed immeasurably in the last few years and - along with it - the security threats posed to your company's IT resource. These changes demand a substantial change in the security posture of business IT resources that interface with the Internet, including email, Web and automated (machine-to-machine) systems. But whilst the cybercriminals toil to defraud your business from the comfort of their offices, many employees are unaware of the heightened security risk that the Web now poses. With major system hacks at the likes of Epsilon, Sony and many other companies with sophisticated IT defences, it's clear the security bar needs to be raised.

Analysing the findings of the brand new Ponemon Institute study to understand the real cost of a UK data breach

Date: 29 March 2011, 3pm GMT
Duration: 1 hours

Available Now

Symantec and the Ponemon Institute have joined forces to unveil the findings of the fourth annual study, UK Cost of a Data Breach. This in depth study - based on the actual data breach experiences of 38 UK companies from 13 different industry sectors, including the financial sector, government and telecommunications – highlights that the average data breach incident cost UK organisations £1.9 million or £71 per record, an increase of 13 percent on 2009, and 18 percent on 2008. The incident size ranged from 6,900 to 72,000 records, with the cost of each breach varying from £36,000 to £6.2 million. Hostile attacks reign as the most expensive data breach for UK organisations. The 2010 study found that malicious or criminal attacks accounted for 29 percent of all data breaches, increasing from 22 percent over 2009. The expenses associated with a data breach range from detection, escalation, notification, and customer churn due to diminished trust. Securing information clearly continues to challenge organisations at all levels, but the vast majority of these breaches are preventable through the implementation of policies and technologies. This webinar will help with understanding where your risks lie and how information practices can be integrated into business processes.

The role of application control in a zero-day reality

Date: 23 March 2011, 3pm GMT, 11am ET
Duration: 1 hours

Available Now

Welcome to the world of security in 2011, when there doesn't seem to be enough time to plan your patches and update your defences. But if you change your strategy, you can raise your security defence game. The problem: In today's always on, Web 2.0-connected work environment, end users often download unwanted and unknown applications without much concern for potential risk. Coupled with the fact that around 1.6 million new malware signatures are appearing every month and a rising tide of zero-day attacks, IT managers need to raise their security defences game. But whilst traditional endpoint security solutions are designed to deal with known attack vectors, there is no signature for zero-day threats. The solution: Application control/whitelisting allows organisations to block unknown and unauthorised applications from executing by default and prevent zero-day attacks automatically. While application control has traditionally been used more in static environments, it has evolved to provide IT and end users with the necessary flexibility in even the most dynamic endpoint environments, improving security without impacting productivity.

Effective patch management on a tight budget

Date: 15 March 2011, 3pm GMT
Duration: 1 hours

Available Now

Times are hard – but hackers and cybercriminals know this, so they have redoubled their efforts to gain access to your organisation’s systems, private data and customer information. Unpatched systems are a lot easier to hack into, but not all organisations have an effective security patch management strategy in place. Do you? If you’re looking for a little help on this subject, join us for 60-minute webinar in which our team of experienced presenters will explain how to develop an effective patch management strategy, as well as how to deploy a system at a time of budgetary cutbacks.

Making next-generation firewalls a reality

Date: 10 March 2011, 3pm GMT
Duration: 1 hours

Available Now

The speed with which data flows through today's IT systems is causing problems for conventional firewalls in terms of real-time bandwidth handling. As a result, a growing number of vendors have developed next-generation technologies to side-step the bandwidth issues. But, as analysts, have observed, some solutions are more adept than others. Join us for an informative and entertaining webinar in which our panel of experts will discuss the firewall issues that matter, as well as looking at some of the strategies and solutions available in the marketplace. Along the way you'll learn about next-generational firewall techniques and what makes Check Point's own firewall technology tick.

Generation Gmail: Is business email at risk?

Date: 8 March 2011, 10am GMT
Duration: 1 hours

Available Now

Email is arguably the most important of all applications used in business. It is certainly difficult nowadays to imagine any business functioning for more than a very short time without it. However, the management of corporate email systems is notoriously complex, and the way in which people use corporate email makes it even more complex. As the use of social media sites and mobile devices grow, a new generation of workers enters the workplace. New ways of working help and empower our users, yet far too often they can be the source of security breaches and data loss. And how much of that is via email?

Where Information Security Meets Physical Security: How to Protect Your Company’s Assets by Ensuring Nothing Falls Through the Gap

Date: 28 February 2011, 3pm GMT
Duration: 1 hours

Available Now

Information and physical security systems often operate as independent technology silos in enterprises, causing potential gaps between organisations’ networks, applications and building security. Consolidating the two disciplines can enhance security, as well as your company’s bank balance. Protecting information resources and data is one side of securing your organisation. Without the support of physical security, however, information security becomes a much harder job. Technological shifts, budgetary realities and government initiatives are now driving enterprises to integrate physical and information security and access. As well as enabling everything from secure access to facilities, strong authentication to desktops and network resources, and digital signature capabilities, convergence saves money in the process. It's also worth noting that, in the US, Homeland Security Presidential Directive 12 (HSPD-12) establishes a requirement for a common identification credential for government employees and contractors for both logical and physical access to government resources. And it's against this backdrop that this webinar will help you enhance your security controls, as well as assist you in extracting the best value for money from your systems.

Protecting the Remote Worker

Date: 17 February 2011, 3pm GMT
Duration: 1 hours

Available Now

This cold winter is starkly reminding us that remote working is essential when millions of people are forced to stay at home by freezing weather conditions. The cost to the UK economy has been estimated at £1.2bn per day and during the recent snow 73% of companies suffered staff shortages, while only 39-40% had the ability to let their staff work remotely. The effect on the economy on the whole and Retail in particular has even adversely damaged our GDP growth figures. With worldwide remote working expected to grow to 35% 1.19 billion workers in 2013 you can see that remote working growth has already outstripped its predictions and looks set to accelerate even faster with the use of even greater numbers of Internet connected devices.

Understanding virtualisation security for private and public clouds

Date: 3 February 2011, 3pm GMT
Duration: 1 hours

Available Now

Current research suggests that, by 2012 half of the typical enterprise workload will be virtualised – yet 60% of IT managers claim that securing virtual machines remains a challenge. Join us for an informative webinar on this topic, and learn how these challenges can be made to melt away with modern security strategies and solutions.

Application Security Starts in the Cloud

Date: 31 January 2011, 3pm GMT
Duration: 1 hours

Available Now

Whether it’s web apps, desktop apps, or mobile apps, the "cloud" is the key to starting a software security program Our world increasingly relies on software. Unfortunately, however, building secure software is not an established course in most universities, and the majority of developers don’t have enough experience to know the threats that exist. As a result, software today is filled with vulnerabilities. The consequences of insecure software can be found in the growing number of data breaches due to attacks against software.

Get one-touch secure mobile access to your corporate data

Date: 27 January 2011, 3pm GMT
Duration: 1 hours

Available Now

Are business users in your organisations pleading to use their smartphones or tablets to access corporate data, but you worry about their – and your IT systems - security? If so, join us for an informative webinar in which will help you understand the strategies and solutions needed to secure access from any mobile device, granting you peace of mind when it comes to data security.

Developing effective end-to-end security in the cloud

Date: 18 January 2011, 3pm GMT
Duration: 1 hours

Available Now

Everyone talks about the economic imperative of cloud computing, but the issue of security in the brave new cloud-enabled world is the biggest inhibitor to the adoption of the public cloud model. The security – and governance risk and compliance concerns – need to be addressed early in the strategic planning phase of cloud computing initiatives. If they are not, then organisations stand a good chance of wiping out the cost benefits by having to build costly private cloud alternatives to public cloud offerings or by having to secure insecure platforms later in the project lifecycle. Join us for an entertaining and informative webinar in which we'll explain how to develop a strategy for creating and maintaining a secure cloud environment from the outset.

Tapping the power of technology to stop data breaches

Date: 16 December 2010, 3pm GMT
Duration: 1 hours

Available Now

Data breaches seem to be everywhere at the moment, but whatever their cause, their results are the same: regulatory penalties, media embarrassment and a loss of public reputation. A recent study by the Ponemon Institute and Symantec found that 71% of UK business had suffered some form of data breach in the last 12 months. This is despite most organisations using a variety of IT security technologies to defend their digital data assets. But things are about to change, as we are starting to see the integration of silicon with security software to better protect mobile workers. An example of this is the new integration of PGP Whole Disk Encryption, from Symantec and Intel’s Anti-Theft technology. Want to know more?

Smart, Clean and Green Security for the Modern World

Date: 14 December 2010, 3pm GMT
Duration: 1 hours

Available Now

Everyone talks about implementing effective IT security, but efficient IT professionals also need to ensure their IT systems are smart, clean and green as well. Easier said than done, however - which is where this webinar enters the frame. In around 60 minutes we aim to summarise the key IT security challenges that face organisations today - and to what extent a transformation in security architecture can optimise their levels of protection against new threats and also reduce bottom line costs.

Understanding Single Sign-On for UNIX/Linux-based web applications

Date: 1 December 2010, 3PM(GMT) / 4PM (CEST)
Duration: 1 hours

Available Now

How to identify intranet, extranet, SAP and other applications that are ripe for SSO – and how to make it happen in 30 minutes.

Understanding the need for best practices in enterprise authentication

Date: 30 November 2010, 3pm GMT
Duration: 1 hours

Available Now

When an employee or partner accesses a corporate network through an extranet, remote access gateway (VPN) or desktop, they have effectively opened a door to the organisation's most sensitive data assets, intellectual property and customer data. The security of the network and desktops are only as strong as the authentication method implemented, highlighting the importance of executing this properly. And yet a one-size-fits-all approach to authentication does not work. Each organisation is unique, as are the requirements of its internal users, partners and customers. Join us for an entertaining and insightful webinar that will highlight some of the security issues – and solutions to those issues – as they relate to major company authentication.

Out of sight, out of mind? - Securing privileged account access in the data centre

Date: 25 November 2010, 15:00 GMT
Duration: 1 hours

Available Now

Whether you’re operating a private cloud or accessing services such as email and back-up/restore services from a public Internet-accessible resource, ultimately your data is only as safe as the trusted employees in the data centre. Do you really know what these systems administrators are doing when they access servers and systems containing your corporate data? How do you ensure that company policies followed by your own staff and systems administrators are equally rigorous on a remote resource? Compliance with regulations such as the Data Protection Act and guidelines such as the Financial Service Authority, ISO 27001 and PCI DSS 2.0, will be impacted if your third party suppliers are unable to manage the activity of their own privileged account users. This 60 minute webinar will address the issue of controlling and auditing privileged user access and cover the crucial questions to ask your provider before entrusting them with your data.

Understanding Single Sign-On for UNIX/Linux-based web applications

Date: 18 November 2010, 11am Pacific / 2pm Eastern
Duration: 1 hours

Available Now

How to identify intranet, extranet, SAP and other applications that are ripe for SSO – and how to make it happen in 30 minutes.

Best Practices for Dealing with Targeted Attacks

Date: 2 November 2010, 3pm GMT
Duration: 1 hours

Available Now

As malware proliferation continues, so do the instances of organised attacks, such as the recent Stuxnet threat against industrial control systems. The criminal intent on display is just one example of many instances that continue to impact enterprises, but go unreported by the media.

Email Security in the Cloud – It’s Time for Some Answers!

Date: 28 October 2010, 2pm BST
Duration: 1 hours

Available Now

For organisations considering moving applications to the cloud, security is more often than not the greatest concern. Questions that are invariably asked include: Will my data be safe? Where will it be stored? How easily could I get it back if I needed to? What sort of guarantees do I have that I’ll get the right levels of availability? Given how important corporate data is to businesses – with some 80% of intellectual property residing in email alone – it’s hardly surprising that there’s discomfort around these issues. And the situation isn’t helped by the lack of any widely accepted standards around cloud security, compliance and governance, despite the best efforts of organisations such as the Cloud Security Alliance. What’s needed is some straight talking, which is what you’ll get from this webinar.

The seven deadly sins of DLP: know your enemy and achieve success

Date: 28 September 2010, 3pm BST, 4pm CEST
Duration: 1 hours

Available Now

The threats that today's organisations now face have grown significantly more dangerous in recent times. At the same time, the pervasiveness of the Internet means that a large slice of a company's IT resources must be connected to the Internet for mobile, as well as remote workers - and, of course, customers too. It's against this backdrop that you need to defend your organisation's data and avoid any regulatory action, as well as the very real reputational damage that can ensure from a data breach, however it is caused. Join us for an entertaining and informative webinar that will explain why you need to defend your data - and how you can you can cost-effectively defend those digital assets.

Cloud-based Servers: Getting Security and Compliance Right the First Time

Date: 23 September 2010, 8am Pacific/11am Eastern
Duration: 1 hours

Available Now

Organizations moving their IT resources to the cloud are finding it a challenge to maintain the same security posture in their virtual environments that they have adopted in their physical data centers. Cloud platforms like VMware vCloud and Amazon EC2 enable the quick and easy creation of servers in response to end-user demand. In such dynamic environments, IT security and compliance managers need an automated method for consistently provisioning user accounts and privileges and enforcing system security policies. Other unique challenges include: isolating groups of servers for compliance reasons, protecting data as it moves across the public network, and auditing user activity on off-premise, virtual systems. Join our panel of experts for an informative webinar to learn how to consistently apply security policies in dynamic cloud environments.

Cloud-based Servers: Getting Security and Compliance Right the First Time

Date: 23 September 2010, 4pm BST, 5pm CEST
Duration: 1 hours

Available Now

Organisations moving their IT resources to the cloud are finding it a challenge to maintain the same security posture in their virtual environments that they have adopted in their physical data centers. Cloud platforms like VMware vCloud and Amazon EC2 enable the quick and easy creation of servers in response to end-user demand. In such dynamic environments, IT security and compliance managers need an automated method for consistently provisioning user accounts and privileges and enforcing system security policies. Other unique challenges include: isolating groups of servers for compliance reasons, protecting data as it moves across the public network, and auditing user activity on off-premise, virtual systems. Join our panel of experts for an informative webinar to learn how to consistently apply security policies in dynamic cloud environments.

Cloud security - protecting your data on the very public internet

Date: 7 September 2010, 3pm BST, 4pm CEST
Duration: 1 hours

Available Now

Cloud computing has gone from zero to hero in the space of just five years, largely as a result of the clear economic benefits it brings to most organisations. This webinar will explain why most organisations need to re-engineer their existing IT security infrastructure before adding the benefits of cloud computing to their business technology mix.

PCI compliance - are you ready for the change?

Date: 27 July 2010, 3pm BST, 4pm CET
Duration: 1 hours

Available Now

PCI compliance has continued to be a hot topic in 2010, mainly owing to the accelerating pace of PCI DSS governance requirements. For some time now, it has been mandatory for card-accepting companies to be compliant with the PCI DSS standards, but the playing field is changing once again, with new compliance requirements starting from this month onwards, and again in September.

Networking Data Archiving – it’s a whole new data retention ballgame

Date: 20 July 2010, 8am PDT, 11am EDT, 4pm BST
Duration: 1 hours

Available Now

Organizations around the world are using social networking to better their customer relationships (Facebook), prospect for new business (LinkedIn) and promote their events (Twitter) but what about the archiving and retention of these business communications? You don’t archive? So why bother archiving your email? It’s all about legal and regulatory issues. And then there’s the problem of litigation.

Defending your data in the modern corporate environment

Date: 15 July 2010, 3pm BST, 4pm CEST
Duration: 1 hours

Available Now

Internet-based business communications - including the transfer of files containing business-critical data - are central to most organisation's productivity in what is a highly competitive business marketplace. Despite the important nature of these communications, there are surprisingly few options for conducting this aspect of day-to-day operations easily, securely, and with the ability to centrally manage and track the transfers.

Social Networking: Roadblocks, Risks, Rewards

Date: 8 July 2010, 11am EDT, 4pm BST, 8am PDT
Duration: 1 hours

Available Now

Facebook and Twitter usage in the workplace is going through the roof, causing major security headaches at all levels, both inside and outside the boardroom. The security issues that Web 2.0 services create are far from simple - managers need to understand not just the IT risks of data leakage, malware propagation, but also the compliance and legislative requirements.

Unifying inbound and outbound content control: Secure your organisation’s web and email traffic

Date: 29 June 2010, 3pm BST
Duration: 1 hours

Available Now

Targeted digital threats - from both inside and outside the company firewall - are proving more of a challenge as businesses continue to evolve and new ways of working are explored. So, how do you effectively manage inbound and outbound content control across disparate user groups without introducing unacceptable levels of complexity and expense?

Data leak prevention - strategy and best practice explained

Date: 18 June 2010, 10am BST (British Summer Time)
Duration: 1 hours

Available Now

The media frenzy surrounding the Information Commissioner Office's (ICO) newly increased penalties seemingly know no limits, but what about the reality behind the hype? Join us for a thought-provoking webinar in which we will look at the new penalties, the Data Protection Act and how IT managers can take a practical approach to meeting the needs of the Act without falling foul of breaching ICO rules or, perhaps more importantly, breaking their own IT budgets.

Solving the PCI Security Puzzle: Putting the Access Control, Privilege Management, and Server Protection Pieces Together

Date: 27 May 2010, 3PM BST (British Summer Time)
Duration: 1 hours

Available Now

Complying with PCI regulations in heterogeneous environments can be a complex and costly initiative. Leveraging your existing IT infrastructure offers a simpler and cost-effective way to address the sections of the Payment Card Industry’s Data Security Standard (PCI DSS) that matter most to IT managers – and without sacrificing manageability and productivity. Join our panel of experts for an informative webinar to learn how you can address the regulatory requirements of the PCI standards by linking all your access rights, privileges, and audit logs into a single, definitive Active Directory identity.

How email archiving ‘in-the-cloud’ can benefit your organisation: The evolution of the archiving market

Date: 25 May 2010, 4pm BST
Duration: 1 hours

Available Now

Email use has exploded and is now the primary means of communication for organisations. Vital documents and information are passed to and from employees and the current regulatory environment means that this content needs to be archived.

Solving the PCI Security Puzzle: Putting the Access Control, Privilege Management, and Server Protection Pieces Together

Date: 20 May 2010, 3pm EDT (Eastern Daylight Time)
Duration: 1 hours

Available Now

Complying with PCI regulations in heterogeneous environments can be a complex and costly initiative. Leveraging your existing IT infrastructure offers a simpler and cost-effective way to address the sections of the Payment Card Industry’s Data Security Standard (PCI DSS) that matter most to IT managers – and without sacrificing manageability and productivity. Join our panel of experts for an informative webinar to learn how you can address the regulatory requirements of the PCI standards by linking all your access rights, privileges, and audit logs into a single, definitive Active Directory identity.

Addressing your identity challenges in a tough economy

Date: 18 May 2010, 3pm BST (British Summer Time)
Duration: 1 hours

Available Now

As economic and budgetary constraints bite, keeping control of data and application access in your organisation becomes a tough call. Do you really know who has access? How do you combat increased insider threats by disgruntled ex-employees? What role does access control play in addressing ever more rigorous governance and compliance requirements? How do you address access via mobile devices such as smart phones?

Avoiding the £500,000 fine: Four steps to continuous audit-readiness for GCSX Code of Connection and other public sector regulations

Date: 13 April 2010, 3pm BST (British Summer Time)
Duration: 1 hours

Available Now

The GCSX Code of Connection (CoCo) is an important step in providing a secure infrastructure for public sector business. While most - if not all - local authorities have achieved compliance with the Code of Connection, authorities must still undergo annual audits. As such, compliance should not be viewed as 'point-in-time', but as a continuous journey which can be used as a catalyst for an improvement in overall organisational compliance, as opposed to simply a 'tick in the box' from an auditor.

Tackling the mobile endpoint security issue

Date: 30 March 2010, 10am BST (British Summer Time)
Duration: 1 hours

Available Now

Modern workforces are becoming more and more mobile - data just released from iPass, for example, suggests that 40% of employees now access office IT resources on the move. But whilst accountants rub their hands at the prospect of reducing office overheads, IT managers are concerned about the security of the mobile workforce and, in particular, the mobile endpoint security issue.

Understanding the IT security total cost of ownership puzzle

Date: 18 March 2010, 3pm GMT
Duration: 1 hours

Available Now

IT security and the financial function are starting to become happy partners, now that key performance indicators (KPIs) and total cost of ownership (TCO) figures can be created for most IT systems and software. Join us for an entertaining and informative webinar in which we'll explain how to balance the requirement of future-proofing your IT security resource, whilst at the same time balancing the time and budget issues that also come to the fore.

End point security - How to stay out of the headlines and avoid a £500,000 fine.

Date: 16 March 2010, 3pm GMT
Duration: 1 hours

Available Now

April 2010 sees the introduction of new data breach penalties from the Information Commissioner's Office (ICO). Criminal penalties and data breach notification mandates are also on the horizon, so it's essential that you review your organisation's mobile data security strategy.

Password Management: Top Ways to Deal with the Necessary Evil

Date: 9 March 2010, 3pm GMT
Duration: 1 hours

Available Now

Password management sounds like a mundane aspect of IT security, but as recent high-profile media reports have proven, it's now a central part of effective company technology management. Anecdotal evidence in the industry suggests that the technology and techniques to handle password management is a black art. Not so. Join us for an entertaining and informative webinar in which our panel of experts will explain the strategies that are required for the efficient, secure and compliant management of passwords.

The 60-Minute IT Compliance Formula: Breaking Down Regulations to Their Essential Elements

Date: 4 March 2010, 3pm GMT
Duration: 1 hours

Available Now

Most security experts will tell you that the formula for success in passing regulatory compliance audits can be complex and expensive - but how complex and expensive is it really?

Securely defending your organisation's endpoints and reputation

Date: 23 February 2010, 10am GMT
Duration: 1 hours

Available Now

Swingeing new penalties for failures to protect corporate data are coming soon, courtesy of the Information Commissioner's Office, with the result that many organisations are looking to tighten up on their IT security.

The 60-Minute IT Compliance Formula: Breaking Down Regulations to Their Essential Elements

Date: 18 February 2010, 2pm Eastern Standard Time
Duration: 1 hours

Available Now

Most security experts will tell you that the formula for success in passing regulatory compliance audits can be complex and expensive - but how complex and expensive is it really? Join us for an educational and insightful hour-long webinar in which our panel of experts will explain how requirements such as PCI DSS, Sarbanes-Oxley, FISMA and others can be broken down into their constituent parts and each element tackled with commonsense principles.

High-speed networking - is your IT security hardware up to the task?

Date: 11 February 2010, 3pm GMT
Duration: 1 hours

Available Now

You might not realise it, but company networks now hum along at 10 Gbps - this is great for network users, but it also places a heavy load on your firm's Network Instrusion Prevention System (NIPS). At 10 Gbps, your company NIPS need to handle 30 million packets every second. This means the technology must analyse and decide whether to block or transmit each packet - that's a tall order when you only have 33 nanoseconds to make a decision. All these operations have to be performed transparently to the sender and receiver with minimal latency - and all this is just for one port!

The evolving malware threat: Is your organisation protected from all angles?

Date: 26 January 2010, 4pm GMT
Duration: 1 hours

Available Now

In 2010, we can expect to witness a battle, as mobile devices, laptops, netbooks and PCs compete to gain a prominent share of the technological market. This battle for dominance will also take place elsewhere - amongst cybercriminals. They will compete to deliver the fastest, strongest, most widespread and financially rewarding threat. And, in 2010, this means taking advantage of our reliance on email and the web.

Controlling your internal security risks

Date: 20 January 2010, 2:00pm Eastern
Duration: 1 hours

Available Now

As widely reported by the media, the insider risk is growing but - unlike external attacks from hackers and malware - internal security defense methodology is still in its infancy.

Enhancing your end point security on a tight budget

Date: 19 January 2010, 3pm GMT
Duration: 1 hours

Available Now

The threats your organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared.

Analyzing Top Malware in 2009 and Predictions for 2010

Date: 15 December 2009, 2pm EST
Duration: 1 hours

Available Now

It has been a busy year in network security — cybercriminals have been crafty and creative, while security vendors have worked hard to stay a step ahead. 2009 was the year for malware.

Securing your data against the latest multi-vectored security threats

Date: 8 December 2009, 2pm EST
Duration: 1 hours

Available Now

Data leaks, losses and thefts are now firmly on the boardroom agenda. Why? Because organizations are being embarrassed, sued and even put out of business because of this serious security issue. But this webinar can help your organization from becoming another victim.

The security and legal challenges of the mobile workforce

Date: 3 December 2009, 10:00 GMT
Duration: 1 hours

Available Now

As the new decade approaches, there are clear signs that business working practices have changed to the point where desktop PCs are fast giving away to laptops, Blackberries and other portable computing devices.

Stay Ahead of the Security Curve: How to Effectively Protect Your Mobile Data in a Mobile World

Date: 26 November 2009, 15:00 GMT
Duration: 1 hours

Available Now

Data leakage can come from almost any source it seems, but laptop loss and theft pose a severe security risk to any organisation. What's more, such data loss can do serious damage to an organisation's reputation and share price.

Next generation data centres and the realities of virtualisation security

Date: 24 November 2009, 3pm GMT
Duration: 1 hours

Available Now

The consolidation of IT infrastructure and virtualisation is being driven by demands for reductions in IT budgets and increasing compliance demands. This webinar reviews the challenges faced, particularly in data centres, and the role of ‘deep security’ in defending the new IT environment.

Cloud security - new threats on the horizon

Date: 17 November 2009, 3:00pm (US Eastern)
Duration: 1 hours

Available Now

Cloud computing means a range of different things to different people, but one thing that people are agreed on, and that is the need for cloud security. This webinar will explain why most organisations need to re-engineer their existing IT security infrastructure before adding the benefits of cloud computing to their business technology mix.

The evolution of web threats: Are your colleagues putting your business at risk?

Date: 12 November 2009, 3pm GMT
Duration: 1 hours

Available Now

Whatever the size or type of your business, your colleagues are opening up a ‘Pandora’s box’ full of security problems on a daily basis. A vast majority of users now use company issued laptops to visit social networking sites, download content, shop online, stream audio or video, and access the corporate network from home to finish that all-important project.

The Security Implications of Web 2.0

Date: 10 November 2009, 15:00 Eastern
Duration: 1 hours

Available Now

There can be no doubt - the collaborative benefits of Web 2.0 technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide.

Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

Date: 27 October 2009, 10am Pacific
Duration: 1 hours

Available Now

Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry’s Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges they need to perform their duties.

Virtualisation security - it's about time

Date: 22 October 2009, 10:00 BST
Duration: 1 hours

Available Now

Virtualisation has changed the way we approach IT and brings with it significant economies of scale and business efficiencies.

Protecting your data from always-prying eyes

Date: 13 October 2009, 10am UK Time
Duration: 1 hours

Available Now

Although the IT security headache that is data losses have been with us for several decades, the rapid ascendance of USB sticks and portable storage plus computing devices in the last few years has triggered a number of horror stories in the press.

Protecting your brand image in the Web 2.0 jungle

Date: 8 October 2009, 3:00pm UK time
Duration: 1 hours

Available Now

Web 2.0 services, including wikis, social networking portals and blogs, are powerful drivers in the B2B and B2C communications channel - for many companies, they open up new doors as never before.

Preventing data loss in the perimeterless IT environment

Date: 29 September 2009, 3pm GMT
Duration: 1 hours

Available Now

Data leaks and losses are the material of IT manager nightmares, with the prospect of lawsuits, regulatory fines and a tarnished brand image all resulting when your data security protection goes pear-shaped.

End point security is changing - can you cope?

Date: 22 September 2009, 3pm (BST)
Duration: 1 hours

Available Now

The world of end point security is changing rapidly. Microsoft is re-energising its Windows Mobile operating system, whilst the range of Apple iPhone's apps is soaring, as enterprise grade software developers get to grips with the highly flexible iPhone operating system that Apple has created.

Scaling your IT to meet your current and future IT security needs

Date: 17 September 2009, 10am BST
Duration: 1 hours

Available Now

Your organisation hopefully has an IT security system that meets your needs today, but what about in 12, 24 and 36 months time?

Protecting your critical data on a budget

Date: 17 September 2009, 3pm EST, 8pm BST
Duration: 1 hours

Available Now

The threats your organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared.

Pandemic planning - is your security and IT up to the challenge?

Date: 10 September 2009, 3pm BST
Duration: 1 hours

Available Now

The incidence of swine flu is easing after a few scares in the summer, but all the signs are that the illness will be back with a vengeance this Autumn when people start returning to school and work after the holidays.

Recent Trends in Data Protection and Security in the Cloud

Date: 30 July 2009, 3pm BST
Duration: 1 hours

Available Now

Cloud Computing is changing IT security - are you ready? In a recent survey of web and email security professionals, Webroot delved into the top issues facing IT and Security professionals today.

Tap into the power of access assurance

Date: 28 July 2009, 10:00 BST
Duration: 1 hours

Available Now

Access assurance may be a complex area, but Stuart Hodkinson, UK general manager with Courion Corporation - along with Fran Howarth, a principal analyst with Quocirca - has more than a few answers in this educational and informative webinar.

End point security - problems and solutions in 60 minutes

Date: 21 July 2009, 10:00am BST
Duration: 1 hours

Available Now

The rapid proliferation of mobile devices, from smartphones to netbooks, is creating a growing security headache for IT managers in companies of all sizes.

How IT can provide better mobility support and security

Date: 9 July 2009, 3:00pm BST
Duration: 1 hours

Available Now

The concept of anytime, anywhere working is now a reality, largely thanks to the spread of mobile broadband and WiFi, together with the availability of a wide range of diverse mobile devices.

Appliance-based IT security in the spotlight

Date: 7 July 2009, 10:00am BST
Duration: 1 hours

Available Now

Appliance-based IT security has enjoyed a resurgence in recent times, driven partly by the falling cost of hardware and the fact that processor speeds are now vastly more powerful and flexible than just a few years ago.

Critical corporate data - can you be sure your data won't leak?

Date: 2 July 2009, 3:00pm BST
Duration: 1 hours

Available Now

Critical corporate data - ranging from customer information to sensitive intellectual property - has never been at greater risk with 60 per cent of office workers (Source: Cyber-Ark) saying they would take their firm's data with them, if they were made redundant or sacked for any reason.

UK Government Data Handling – A Clear Direction for the Future

Date: 30 June 2009, 3pm UK time
Duration: 1 hours

Available Now

‘The Data Handling Procedures in Government’ report (“the Report”) sets out clear and mandatory procedures to be followed by all UK government employees that have access to - and responsibility for - citizen data.

Boosting your IT security to cope with next-generation internet threats

Date: 23 June 2009, 10:00am BST
Duration: 1 hours

Available Now

The internet has changed. For some, Web 2.0-driven services are for the better. For IT security managers, the changes are tumultuous, usually requiring a rethink on security strategies to keep the darker side of the Net at bay.

Addressing the Unique IT Security Risks Posed by the Virtual Data Center

Date: 23 June 2009, 3:00pm EST
Duration: 1 hours

Available Now

As noted by analysts such as Gartner, virtualization technology is becoming not only increasingly ubiquitous but also increasingly heterogeneous in nature as organizations deploy bare-metal hypervisors from vendors such as VMware and Citrix.

Next-generation IPS technology in the spotlight

Date: 18 June 2009, 10:00 BST
Duration: 1 hours

Available Now

Intrusion Protection Service (IPS) technology has been around in the IT security industry for some time, but software, rather than hardware/firmware-based systems are fast becoming a reality.

End Point Security in the spotlight - the holistic approach

Date: 3 June 2009, 10:00am BST
Duration: 1 hours

Available Now

Mobile broadband and WiFi have changed the minor IT security end point security headache for managers that is end point security and turned the issue into a new and expended area that requires significant attention in many organisations.

What security professionals can learn from real-world network data

Date: 2 June 2009, 10:00am (EST)
Duration: 1 hours

Available Now

Internet traffic and applications now account for more than 50% of the total traffic on today’s corporate networks. Here’s your chance to learn more about these specific applications – and the risk they pose to your business.

What security professionals can learn from real-world network data

Date: 2 June 2009, Live Broadcast will be replayed at 11 AM (PDT)/2 PM (EDT) with Live Q&A to follow at 12 PM (PDT)/3 PM (EDT)
Duration: 1 hours

Available Now

Internet traffic and applications now account for more than 50% of the total traffic on today’s corporate networks. Here’s your chance to learn more about these specific applications – and the risk they pose to your business.

Mitigating access control risks in a modern IT security environment

Date: 28 May 2009, 3:00pm UK
Duration: 1 hours

Available Now

Access control is the cornerstone of good security practice, but is an issue that is often overlooked as companies constamtly seek to bolster their IT security defences against an onslaught of multi-vectored attacks and malware methodologies.

Software Blades - a new generation IT security architecture revealed

Date: 7 May 2009, 10am BST
Duration: 1 hours

Available Now

Say hello to a new security architecture called `software blades,' a new architecture that allows companies to select from a library of over 20 software-driven systems to create a tailored security gateway for specific environments.

Tapping into the power of Unified Communications securely

Date: 5 May 2009, 2pm EDT
Duration: 1 hours

Available Now

Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few conventional IT security products can completely counter.

Securing Your smartphone with endpoint security

Date: 21 April 2009, 14:30 BST
Duration: 1 hours

Available Now

Handheld wireless communication devices have become an indispensable part of modern business. But, as workers continue to adopt and use handheld devices to check email, surf the Web, and access corporate resources, the potential for serious and potentially devastating security breaches will also increase.

SECURITY COMPLIANCE: HOW CAN YOU STOP YOUR WEBSITE BEING THE NEXT-ONE HACKED?

Date: 16 April 2009, 3pm UK time
Duration: 1 hours

Available Now

Recent high profile hacks into public facing web sites are causing severe embarassment and financial pain to many companies. Panasonic, Monster.com and the Govt have all recently been hacked with varying results.

Top IT Security Threats: How to Protect Your Users from Increasingly Sophisticated Attacks

Date: 16 April 2009, 3:00pm EST
Duration: 1 hours

Available Now

High-profile data breaches frequent the headlines, with countless smaller incidents happening almost daily. Your data is under attack, and the frequency of assaults and sophistication of the methods employed are increasing. Rather than targeting the network directly, hackers often exploit the most vulnerable part of your security ecosystem - your users.

Virtualisation Security and PCI Compliance

Date: 7 April 2009, 10am UK time
Duration: 1 hours

Available Now

This joint Check Point Software Technologies Ltd and VMware webinar will help you to learn how to maintain the separation and isolation of servers in a virtualised environment in order to meet PCI Compliance requirements.

Preventing data leakage in an economic recession

Date: 31 March 2009, 3pm UK time
Duration: 1 hours

Available Now

Stopping data leakage in an organisation is no easy task at the best of times, but in the current economic climate, when IT budgets are constrained and hackers are even hungrier than usual for a slice of your company's revenue, it's an uphill task, to say the least.

Web 2.0 security in the spotlight

Date: 25 March 2009, 10:00 am
Duration: 1 hours

Available Now

The Internet has changed. It's no longer just about Web browsing. Today, it's dominated by Web 2.0 applications such as instant messaging, social networking, P2P, voice and video.

Engendering effective Web security on a tight budget (or how to have your security cake and eat it)

Date: 24 March 2009, 3pm UK time
Duration: 1 hours

Available Now

The Internet has changed beyond anything could have foreseen just five years ago. It is no longer a browsing medium: it is full of Web 2.0 applications, real time communications challenges and a whole range ofthreats that are designed to piggy back on this new usage.

Taking IT security to the next level

Date: 17 March 2009, 3pm UK time
Duration: 1 hours

Available Now

There is a major battle taking place in the IT security marketplace because, with the current economic downturn, organised criminal gangs are taking a much more robust approach to generating extra income.

Staying one step ahead in the IT protection wars

Date: 10 March 2009, 3pm UK time
Duration: 1 hours

Available Now

The Internet security landscape has changed dramatically. The days of `hobbyist' virus writers causing outbreaks as a nuisance or show of bravado have passed.

Anatomy of an Attack - Fraud Revealed

Date: 5 March 2009, 3pm UK time
Duration: 1 hours

Available Now

Financial fraud is on the increase and has, for the first time in seven years, outpaced virus attacks to become the most costly category of computer crime loss experienced by businesses in the USA, according to data released in September 2007 by the FBI and the Computer Security Institute.

Shifting from Manual to Automatic: The Changing Face of Penetration Testing

Date: 17 February 2009,
Duration: 1 hours

Available Now

The process of penetration testing is rapidly evolving from a specialized field dominated by highly-trained experts and consultants into a practice carried out internally by organizations using automated software solutions. In this presentation we will highlight the benefits and challenges of this transition and the advantages of reduced cost and increased efficiency offered by these developments.

How to protect your IT assets and stay ahead of the curve

Date: 17 February 2009, 3pm UK time
Duration: 1 hours

Available Now

Data theft and loss reports can do serious damage to an organisation's reputation and share price, but firms continue to hit the headlines with lurid reports of lost laptops, hacker incursions and all manner of embarrassing IT problems.

Implementing effective end-point security and data encryption in the modern IT environment

Date: 27 January 2009, 3pm UK time
Duration: 1 hours

Available Now

The IT security world has changed. Web 2.0, hybrid malware and advanced hacking techniques are now part of the threat landscape.

From Web Browsing to Social Networking: Securing Employee Internet Use in a Web 2.0 World

Date: 22 January 2009,
Duration: 1 hours

Available Now

The Internet has changed. It is no longer about e-mail and web browsing. Instead Internet traffic is dominated by Web 2.0 applications such as Video, Voice, IM (Instant Messaging), P2P, and social networking.

Making Threat Management More Manageable

Date: 18 November 2008,
Duration: 1 hours

Available Now

Human factors, often unaccounted for and masked by IDS products, and operations in the trenches, can create holes in intelligence coverage and performance gaps in incident operations.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×