In today’s global, fast-paced and complex business environments, organizations are continually facing uncertainties, disruptions and changes daily. Managing these risks and threats is no easy task, however it is of the vital importance in the data driven world we operate in. Join Patrick Potter, GRC Strategist, RSA as he discusses links between the objectives of Operational Risk Management and Operational Resiliency, integrating operational risks as part of a comprehensive GRC strategy, and understanding the risks in the context of your business today.
Ben Desjardins, vice president of product marketing for RSA, and his guests discuss Top Security and Risk Management Trends and implications for security and risk management leaders. Attendees will learn about the initiatives forward-thinking security and risk management practitioners are undertaking to support their organization’s business objectives and elevate their standing in their organizations.
Today’s executives are focused on accelerating the time required to bring products, services, and features to market. In the “innovate or die” economy, the risk manager’s imperative is to support this growth objective while minimizing risk. In many cases, this acceleration involves leveraging an innovative third party. While the objective of risk management is not changing, the pressure is on organizations to manage risk (both internal and external) in a better, faster, and less expensive manner.
In this webinar, RSA’s Steve Schlarman and The Security Ledger’s Paul Roberts explore the critical role risk management plays in the success of digital transformation initiatives. They share case studies of companies that are managing digital risk effectively and offer an approach for managing these risks. This webinar outpaced the first one in the series as our most popular webcast ever.
May 25th will mark the one year anniversary of The General Data Protection Regulation (GDPR) and it changed the way organizations worldwide had to meet their new compliance requirements. For many organizations, GDPR was a challenging undertaking that requires new processes, technology, skills, and oversight mechanisms. Organizations had to find new ways to embed privacy in what they do, encouraging collaboration across teams, and promoting a corporate culture that places their customers privacy at its core.
If your organization is pursuing digital transformation in any capacity, you’ll want to get ahead of the risks. This webinar—our most popular to date—serves as your introduction to the topic of digital risk. It will help you begin to identify the risks associated with your organization’s digital transformation, along with measures you can take to manage and mitigate them.
Building on the popularity of the highly technical Operationalizing Incident Response workshop, RSA is offering a special virtual version of this in-person event. During the webinar, Shane Harsh will describe a business-driven security framework for the fundamentals of operational threat hunting and incident response. This will enable your organization to understand the essential elements required to build an effective, repeatable, and cross-functional IR plan.
More than 200 survey participants shared their views on factors that influence the choice of technology, budgets for improvement and plans for change. Join the webinar to learn you can use the results of this survey to help you to make the business case for improving GRC technology use in your organization.
As organizations embark on their digital transformation journey, they require secure access that is convenient, pervasive and intelligent. The new release of RSA SecurID® Suite ensures that users have timely access to the resources they need—from any device, anywhere—and that users are who they say they are. Join us for this informative event to learn how RSA SecurID® Suite helps improve operational efficiencies with automation to gain valuable insight into user access and experience faster time to value.
As Europe settles into life under the General Data Protection Regulation (GDPR), the United States is grappling with potential legislation of its own to protect consumer information. Questions remain about what U.S. data privacy legislation might look like, but companies have already begun to strategize. Join the webinar for additional insights on the survey results.
Agencies are currently facing multiple security, identity and governance programs. For the most part, they tend to act as individual disciplines with siloed agendas, schedules, obligations, users and budgets. Most of these programs take severely different approaches to common challenges, such as inclusion, classifications for different types of users and specific technical details about target coverage models. Attend this webinar to learn how to architect a path forward and receive one (ISC)2 CPE credit.
Business disruptions from events such as cyber threats, natural disasters or third-party interruptions have the potential to cause serious harm to the organization’s operations, finances and reputation. Further, factors such as 24/7 service delivery and digital business transformations are putting greater pressure on business and IT resources, making it more important than ever to have effective recovery plans as a part of your organization’s resiliency programs. In this webinar, we will explore challenges to business and IT recovery, as well as discuss proven methods to get your business and IT disaster recovery efforts off the ground.
Do you want to know what’s next for RSA® Identity Governance and Lifecycle? Are you curious to see where the new user experience is heading and keen to know how you can further reduce the burden of managing Identity Risks? Join us for this live webinar to catch a sneak peek into some of the enhancements we are planning for this Winter
Is the obituary for the password premature? Depending on whom you speak to, the password is either still essential, it’s simply a useless precaution that’s absolutely necessary, or it’s obsolete and unneeded. Password management continues to be a controversial topic as experts can no longer agree on the value of passwords. This webinar looks at the state of the art in passwords and password, as well as alternatives to the username/password approach to security.
Explore how Dell EMC's Data Protection Suite and RSA's NetWitness can successfully secure your infrastructure, increase your platform efficiency, and simplify management processes. Both Dell EMC and RSA ransomware solutions can be found on Carahsoft's Continuous Diagnostics and Mitigation (CDM) Tools Special Item Number (SIN) 132-44 on our GSA IT Schedule 70. Join us on October 23rd to learn how these solutions can protect your workspace with threat detention and data protection
Do you find yourself thinking “I don’t have time for all of these alerts? It just takes me too much time to collect the data per incident?” Or “Why are my tier 3 analysts dealing with so many manual tasks instead of hunting?” Join RSA to learn about how Security Automation and Orchestration can help reduce alert fatigue, make your SOC team more efficient, and better leverage existing security investments than “just” adding new tools.
The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT), and diverse user groups freely exchange data across digital ecosystems, network, and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data. Join RSA identity expert Tony Karam to learn how MFA can transform how you provide secure access—to any application, from any device, anywhere, at any time.
The threat landscape continues to be aggressive, with the advantage on the side of threat actors. Attackers use ever evolving tools and techniques that evade signature based intrusion detection technology. Come hear how RSA NetWitness® Platform for threat defense applies the most advanced technology to detect, prioritize, automate, and investigate threats that have bypassed log-centric SIEMs and preventative controls in a fraction of the time of other platforms.
With new regulations like the EU GDPR, the California Privacy Law and the commonplace news of yet another company’s information systems breach – the world seems to be hyper-focused on privacy. In this webinar, we will explore the privacy challenges and obligations that organizations face and discuss proven methods to quickly get your data privacy program off the ground.
The EU's Payment Services Directive II (PSD2) is going to unlock many new opportunities for banks, service providers and consumers. However, there will also be new challenges to overcome. Learn more about the major technical requirements for implementing PSD2, how it will impact the incidence of fraud, and how adaptive authentication can be used to effectively combat it in this recorded webinar.
Would you ride in an autonomous vehicle if you knew it did not know where other cars were located while in motion? This is akin to asking your users to share data on the network with no idea who, what or when that data is being shared and how secure it is. Join this webinar to explore how to give security analysts the visibility they need in order to properly understand the risks and potential threats to the network, ultimately protecting information and the business itself.
Identity governance can be an expansive program with many ways to implement the people, processes and technology to effectively govern access. In this session, you will hear examples of customer success within key areas of identity governance using RSA Identity Governance and Lifecycle. Join us to hear how IAM leaders like you are implementing RSA Identity Governance and Lifecycle to achieve their identity governance goals.
Get a first-hand look at the capabilities that make RSA NetWitness Platform® a unique threat detection and response solution. Ask the experts how these capabilities can help your team leverage the people you have to be more effective, accelerate threat investigations, understand the full scope of an attack, and more.
The number and significance of third party relationships continues to grow for organizations across all industries and geographies. When an organization falters in some way, the root cause of the problem is often linked to a third-party relationship. Unfortunately, many organizations that are hit by third party problems didn’t see them coming and had no chance to steer clear. In this webinar, we will explore proven methods to quickly get your third party governance program off the ground.
RSA conducted a study on the convergence of IT Security and Business Risk teams, to see if and how these teams collaborate to help reduce risk and strengthen threat detection and response. This webinar reviews key findings from a survey of 175 IT Security and 131 business risk (e.g. GRC, governance, risk, compliance, auditing, legal, IRM, integrated risk management) professionals. The findings highlight the challenges organizations face and the actions they’ve taken to improve collaboration—between people and also across goals, processes, tools and metrics—between their IT Security and Business Risk teams.
Customers across industries and around the world rely on RSA Identity Governance and Lifecycle to mitigate identity risk through a governance-first approach to access management. We’re excited to reveal several key enhancements and innovations designed to mitigate risk and strengthen security, governance and compliance during this live session. Join us to learn about these and other innovations and to get an inside look at our latest vision and roadmap for RSA Identity Governance and Lifecycle.
For many organizations, legacy and custom-built applications form the backbone of their businesses, powering core functions from finance to customer-facing systems. Yet often these applications are inadequately secured with just usernames and passwords, making them attractive targets for hackers and highly vulnerable to credential-based attacks. View part 5 of this 5-part webinar series to learn about an alternative approach to adding MFA to these custom and legacy applications.
With so many channels, both traditional and new, financial institutions are struggling with ways to offer a seamless customer journey while also managing digital risk. Join us for a live webinar where we will discuss current global trends in digital fraud, the market forces driving digital banking transformation, and success criteria for omnichannel fraud prevention, including case studies and demonstrated results.
Looking to make multi-factor authentication (MFA) more accessible to a wider range of users? View part 4 of this 5-part webinar series to find out how easy it is to use advanced mobile authenticators from RSA SecurID Access to provide your users with convenient, secure access to the VPN.
Organizations are turning to digital workspace platforms like VMware Workspace ONE to simplify users’ ability to gain access to the resources they need. Yet these digital workspaces—and the applications they support—also need to be secured without inconveniencing end users. View part 3 of this 5-part webinar series to find out how RSA SecurID® Access provides simple push or mobile biometric MFA for convenient access to these workspaces and applications.
How do you begin your journey to an Intelligent SOC? Start by evaluating where your dimensions of visibility, analytics, automation, and risk fall. With that knowledge you can build your roadmap in a sequence that delivers maximum impact and cost effectiveness. Join RSA experts to get tips on building your roadmap.
Protecting access to accounts and data is critical in today’s digital world. This is especially true for your organization’s most privileged accounts, which now extend beyond a root server or admin console to highly privileged users in the cloud. In part 2 of this 5-part webinar series, you will learn how multi-factor authentication from RSA SecurID Access can better protect privileged accounts across your enterprise, including admin access to critical infrastructure and privileged access management tools.
Gábor Varjas, the CISO of MOL Group, an international oil and gas company based in Hungary, speaks about his team’s journey to an intelligent security operations center (SOC) with members of the RSA Advanced Cyber Defense (ACD) Practice. Whether you have a full-blown SOC in place or a small security team, Varjas and the RSA ACD team share insights, best practices and “lessons learned” intended to help any security team improve its detection and response capabilities.
We all know we need more than just usernames and passwords to protect our organization’s data, especially data stored in the cloud. In part 1 of this 5-part webinar series, we will explore several concrete steps you can take to secure access to cloud applications—without impeding the user experience—using simple, convenient multi-factor authentication (MFA).
Join Patrick Potter, GRC Strategist for RSA Archer® for an interactive webcast where he will share why organizations with a strong focus on business resiliency will have a much better chance of not only enduring in the face of disruptions, but also find that they can use their ability to “bend but not break” as a competitive advantage.
3D Secure 2.0 is expected to have a profound impact on the payments industry by accelerating digital commerce and offering a better user experience with increased fraud protection for card-not-present transactions. Whether you have already started on the journey or are only just beginning, there are many considerations to help you get prepared to make a smooth transition. Tune in to this on-demand webinar to hear recommendations from a leading analyst for what you should be doing to prepare to move to 3D Secure 2.0.
Most security operations centers rely on a security information and event management (SIEM) system to understand what’s happening in their environment and detect malicious activity. However, traditional SIEMs were built for compliance and log management purposes, so they don’t give SOC analysts the full visibility or sophisticated capabilities they need to detect and respond to today’s advanced and targeted threats. Get tips for evaluating SIEM solutions.
In today’s perimeter-free world, deploying multiple, prevention-focused point products or focusing only on complying with regulatory guidelines is not sufficient to prove the comprehensive protection required by the government enterprise. Learn more about the five key function areas which define the Cybersecurity Framework (CSF): identify, protect, detect, respond, and recover.
Join us on April 4th for an informative and interactive webinar with the RSA SecurID team and see what’s new with RSA SecurID Access. You’ll see how RSA SecurID Access is strengthening its cloud offering with the integration of RSA Authentication Manager (AM) and Amazon Web Services (AWS). And, you’ll learn how to connect to anything with RSA SecurID Access and provide mobile optimized authentication methods including push notification, biometrics, FIDO, SMS/Voice and more.
Attend this webinar to discover what’s new with RSA Identity Governance and Lifecycle version 7.1, released February 2018. You’ll get a live demo of the solution in action plus you’ll learn about our new Recommended Practices and Implementation Blueprints that are designed to simplify key processes and integrations.
The process of securing public, private and hybrid clouds is not unlike training for a marathon. To be successful in either endeavor, preparation—having a training plan—is key. During this webinar, experts from RSA and Ixia will share strategies for securing your workloads in various cloud environments.
The market demands are more like “Have it your way!” for modern approach to authentication…that’s why many of the one-trick ponies that can only do one thing for certain apps will become obsolete or acquired as Access Management vendors will face the complex reality that enterprises who want modern authentication will also want access that’s pervasive, connected and continuous – not just 2FA or SSO.
The RSA Global Incident Response team will share a real-world, technical case study demonstrating how it used RSA NetWitness® Platform to contain and remediate a sophisticated attack perpetrated by the threat actor group Carbanak (also known as FIN7). You’ll come away with proven methods for threat hunting and incident response, as well as an in-depth understanding of how Carbanak intrusions tend to take place, so that you know what to look for in your own environment.
Let’s face it — when it comes to moving applications and data to the cloud, enterprises want to streamline operations and deliver a better user experience. However, they don’t want to sacrifice security or performance. In fact, modern enterprises expect a journey to the cloud that ultimately enables better security. Better access. Better performance. The question is: Is it possible?
RSA Web Threat Detection helps organizations respond faster to automated attacks, account takeover, fraudulent payments and many more high-impact cyber threats with zero impact on site performance. Join us for a live webinar where we will discuss the latest release of RSA Web Threat Detection which now offers enhanced flexibility for multi-tenancy enabling technology service providers to add it to their environment and provide it as a managed service to their customers.
As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this webinar.
Mass data breaches have created an abundance of verified credentials for sale and led to a spike in account takeover attacks. Join RSA as we peer into the dark web and explore the Sentry MBA toolkit, one of the most popular automated attack tools being used by cybercriminals to conduct account takeover on major popular websites.
The cost savings, agility and innovation capabilities associated with cloud computing are driving widespread adoption of cloud services among organizations of all sizes. At the same time, pressure to secure cloud environments is intensifying, and cybersecurity teams are feeling the heat from multiple sides: Not only are they under regulatory pressure, but securing the cloud often necessitates dramatic changes to the way they approach cybersecurity.
Every asset on your network and in the cloud has privileged accounts—everything from network devices like routers and switches to server operating systems to the databases and applications on those servers and, of course, all levels of cloud assets from IaaS to SaaS and in between. And with today’s risks, privileged sessions need more than passwords. If you pick and choose which assets to protect with multi-factor authentication (MFA), you are leaving layers of your network vulnerable.
As identity theft and credential-based attacks escalate, organizations wonder how this can be when they're investing so much time and effort deploying identity and access management solutions. Despite their best efforts, identity has become the most consequential attack vector to the modern enterprise. Organizations are essentially outmatched by increasing identity risks.
Each organization’s journey to the cloud is unique, but those journeys are more frequently being driven by business rather than technology needs. Consequently, security teams are put in an awkwardly reactive posture. The momentum driving organization’s deeper into the cloud, coupled with the need to secure a hybrid cloud and on-prem environment, present distinct challenges and threats.
Most organizations have implemented SIEM as well as identity and access management technologies. But, are these systems talking to each other? Join RSA and Ultimate Windows Security to learn about the event information generated by access management and authentication technologies and how that data can be leveraged once it’s in your SIEM.
Preparing for GDPR is no small task—the regulation places specific requirements on organizations, such as recording processing activities, demonstrating accountability and reporting a breach within 72 hours of discovery. In addition, organizations could be liable for fines of up to 4% of annual global revenue (or 20 million euros, whichever is greater).
The GDPR has important implications for every business, even for those that have no operations in Europe. However, Osterman Research has found that even with implementation of the GDPR just seven months away [at the time of the webinar], many businesses are not well prepared to meet the compliance obligations of this critical requirement. Join us to explore how the GDPR will impact your business and how you can comply with the key provisions of this landmark requirement before the May 25, 2018 deadline.
In today’s hyper expansive and unpredictable market, it isn’t sufficient to be ‘just good enough’ when it comes to managing risk. Every day, in organizations around the globe, risk, compliance, security and GRC champions are being asked questions they can’t answer. The pressure to provide your business with key insights into risk is building and, without a well thought out approach, you can unfortunately end up making insignificant progress and providing little value to the organization. View the on demand webinar for six major concepts you need to consider when building out your risk management strategy.
In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s seamless and easy for our users.
Now that so many applications have moved to the cloud, and users continue to embrace mobility, your organization must work toward fully embracing the new opportunities this boundaryless world presents. It’s time to shift traditional thinking away from authentication as a static one-time event and move towards a more modern authentication strategy that doesn’t require a trade-off between security and convenience.
The EU (European Union) General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. Join us as we share practical insights to help organizations start to prepare for the GDPR and demo our two new RSA Archer use cases that are designed to directly support organizations’ efforts to establish robust data privacy and data protection programs to address requirements of the EU General Data Protection Regulation.
The release of 3D Secure 2.0, and more recently, the PSD2 directive in the EU, has raised many questions as to what influence each holds for digital transactions, e-commerce, and consumer authentication. Both are expected to have a major impact on global payments and come at a perfect time. This webinar highlights the latest developments in 3D Secure 2.0 and PSD2, the impact on consumer authentication, and recommendations for what issuers and merchants can do to prepare.
Dive into RSA NetWitness Platform, and see why it's so exciting for analysts and security leaders, including:
- User interfaces built to help analysts respond to attacks
- A non-siloed analytics engine to find attacks that could otherwise go undetected
- Behavioral analytics and machine learning to automate the correlation of massive volumes of disparate data
- Visibility across the enterprise – from the endpoint to the cloud
The landscape of user authentication is changing rapidly. A vanishing perimeter and the continuing explosion of cloud-based applications and mobile devices are blurring old boundaries—creating more islands of identity and forcing organizations to reimagine identity and access strategies.
Technology trends, such as mobile, IoT and the open API economy, are forcing organizations to take a fresh look at how they protect their customers. In addition, industry and regulatory drivers, such as 3D Secure 2.0 and the EU’s Payment Services Directive II (PSD2), are helping to propel the adoption of convenient consumer authentication. This webcast brings together an expert panel to discuss the five key considerations essential to designing and executing a consumer authentication strategy, what it needs to accomplish, and the role of user experience in increasing fraud protection.
The RSA Adaptive Authentication ecosystem approach enables organizations to allow data from other anti-fraud tools to improve performance of the RSA Risk Engine and make more informed decisions about the probability of fraud. Now, RSA Web Threat Detection offers yet another integration point for Adaptive Authentication to improve fraud detection. Learn more about the integration between Adaptive Authentication and Web Threat Detection and how you can get more value out of your existing RSA investments.
Organizations are beginning to understand the role incident response plays in their broader cybersecurity strategy: The faster they can respond to a threat, the sooner they can limit its business impact. In this webinar, RSA and Forrester Research discuss the incident response services landscape, and RSA incident responders share their real-world experiences tackling some of the most complex cybersecurity challenges.
Look at information security through the lens of business risk, and you’ll begin to make decisions about security in light of their impact on the business. A GRC framework for business risk management can help you identify key business priorities and align them with security information and decisions.
The General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. As a regulation, as opposed to a directive, it will directly impose a uniform data security law on all EU members and will also apply to non-EU companies if they process personal data of EU individuals. The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the new law.
Identity is today’s most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Organizations are working to protect this threat vector and enforce strong access controls, address legislative requirements and keep data from getting in the wrong hands. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.
The General Data Protection Regulation (GDPR), taking effect in May of 2018, will reset best practices for data privacy and protection globally. Preparing for GDPR is no small task. This, in addition to the substantial penalties for non-compliance, has propelled data protection as a business risk directly into the boardroom. View the on-demand webinar for five tips to accelerate your GDPR readiness, improve your risk management strategies and help you fulfill GDPR obligations.
As the traditional network perimeters dissolve and users demand more convenient access to their applications and data, IT security teams are taking a new look at how authentication is delivered. Join Dave Taku, an RSA identity expert, to learn how to modernize your authentication strategy and take authentication to the next level with identity assurance.
Traditional identity and access management technologies leave IT security and operations teams ill-equipped to simultaneously ensure convenience and strong security without compromise. To address increasing security and compliance demands, organizations must ensure the identities of employees inside their protected network along with millions of users outside their walls. Join Jim Ducharme, VP of Identity Products at RSA, to learn how the right IAM technology can help you protect today’s most consequential attack vector.
While investigating a popular class of exploits, RSA Research detected a common thread running through multiple campaigns. Continued research led to the identification of a massive domain-shadowing operation underpinning numerous campaigns and a significant cross-section of criminal infrastructure. Join the RSA Research team as they discuss what they discovered and how they discovered it.
From cashout and account takeover services to digital currency exchange, fraud-as-a-service websites are offering a wide variety of cybercrime goods and services that have been traditionally thought to be reserved for underground marketplaces and forums. Learn about the phenomenon of fraud-as-a-service websites, the reasons for their increased popularity, and the most common goods and services for sale.
Across industries and at organizations of all sizes, CISOs are struggling with the scarcity of cybersecurity talent. With more than 200,000 security positions going unfilled in the U.S. alone, competition for the experienced analysts who can help keep your organization secure will remain high. In this webinar, a panel of experts will share their views on the cybersecurity skills gap and steps security leaders can take to address it.
Digital channels have become ground zero in the fight against fraud. However, translating the war against cybercrime into business metrics that senior leadership understands can be just as challenging as the battle against enterprise fraud threats. explore how organizations are addressing the respective challenges and motivations that come with defining success including the factors driving investment in fraud prevention technology and recommendations for measurin g fraud risk management performance.
From mobile devices and the Internet of Things (IoT) to public, private and hybrid clouds, the explosion in new technologies isn’t just transforming business; it’s also transforming traditional approaches to cybersecurity. This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.
Turning credentials into cash would not be possible without the help of money mules. Whether in the form of humans or accounts, fraudsters have built sophisticated mule networks, making them one of the most difficult parts of the fraud supply chain to detect. Learn how to write rules in RSA Web Threat Detection to uncover and investigate potential mule activity and how one organization is doing so with great success.
Defending against human ingenuity demands a new way of thinking. With countless dollars spent and infinite alerts you still don’t have a true picture of what is going on. So when a breach happens, can you answer THE question: “How bad is it?” The inability to do so is what RSA calls the “gap of grief.” To answer, you must connect your security strategy and business risks.
Money mules are a common fraud-as-a-service offering in the Dark Web and absolutely critical in enabling the cash out process. Whether in the form of humans or accounts, mules are one of the most difficult parts of the fraud supply chain to detect. Get an inside look at how fraudsters are running money mule businesses in the Dark Web and how RSA proactively seeks this intelligence on behalf of our customers.