Insights: Methodology for Cloud Certificate Lifecycle Management

Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it is creating a need for IT Organizations to become experts in areas they are not likely to be. During this presentation gain valuable insights into how adopting Entrust’s lifecycle methodology can provide valuable guidance regardless of the software or service you are currently using
Watch Now


Brad Prent, senior security consultant, ENCS discusses the nation state cybersecurity threats, the steps the energy industry can take to protect itself and the future evolution of cybersecurity.


Data-centric Security & Encryption: Keeping Your Critical Data Safe

Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches

State of Cybersecurity: Implications for 2015

ISACA and the RSA undertook a survey in early 2015 to understand the State of Cybersecurity and the implications on you, your role and your organization. The session will present the key results from the survey including the current threats and vulnerabilities, changes in the threat landscape and where the threats are coming from, how enterprises are responding and where are the gaps in the industry and with staff. The results will include implications including skills gaps for employers who are looking to solve their growing cyber challenges.

Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps

Trend Micro

Join Trend Micro’s Sr. Product Manager for Hybrid Cloud Security, Kyle Klassen, and Sr. Software Developer, Geoff Baskwill for our webinar: Security by Design—Full Life Cycle Container Security that Matches the Speed of DevOps. They will outline the key steps and tools that will help you artfully automate full life cycle container security, including useful APIs, image scanning and runtime protection to detect problems early and mitigate against attacks targeting your host, Docker®, and Kubernetes® platforms and containers.

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention


This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.