You've requested...

Atos Workplace Solutions and PCs with Intel vPro Technology

If a new window did not open, click here to view this asset.

Download this next:

Case Study: French national research centre insources with Rubrik backup

France’s national research organisation wanted to insource IT back from Atos and built its private cloud on VMware across two locations with Rubrik appliances for backup.

These are also closely related to: "Atos Workplace Solutions and PCs with Intel vPro Technology"

  • Protect against account takeover attacks with Barracuda CAP

    Protect your web applications and APIs from cybercriminals, including Account Takeover (ATO) attacks against personal and business email accounts. Don’t miss this informative new webinar about all the benefits of Barracuda Cloud Application Protection (CAP). Be in the know about evolving ATO attacks and how to protect against them See how machine learning identifies and stops even the most sophisticated bots Get a first-hand look at the new Privileged Account Protection capabilities that detect risky logins and block attacks in real time Join Barracuda application security experts for this webinar about Barracuda CAP and all the latest strategies, solutions, and suggestions to defend your business from bots and ATO attacks.

  • APAC webinar: Understanding the Threats and Gaps in Commerce

    Join us for this English-only webinar to decode the distinctive cybersecurity landscape of the Asia-Pacific (APAC) region from recent research findings: ATO Attacks: 73% of APAC organizations faced ATO threats last year. However, with a deployment rate for ATO solutions at just 60%, is APAC lagging behind in safeguarding its assets? Bots and Their Impact: APAC saw bot attacks lower than the global average, yet the region's deployment and benefit rates for combating these threats also remain the lowest. Discover why. Script Protection and Audience Hijacking: Understand the depth of the challenge with malicious scripts and audience hijacking, and why the region is under-equipped to tackle them.

Find more content like what you just read:

  • How to prevent GenAI attacks on your IT Helpdesk

    Ori Eisen will describe the new threat that Gen AI presents to IT Helpdesk and showcase Trusona’s ATO Protect tool that can quickly and easily prevent such attacks 1. Understand the nature of Gen AI attacks on IT helpdesks 2. Know who is on the other end of the call, wherever in the world the call comes from 3. Detect sophisticated ATO attacks like Man-In-The-Middle and SIM Swap

    Download

  • Prevent Account Takeover Fraud and Keep Customer Trust

    It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO

    Download

  • Prevent Account Takeover Fraud and Keep Customer Trust

    It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO

    Download

  • Prevent Account Takeover Fraud and Keep Customer Trust

    It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO

    Download

  • Prevent Account Takeover Fraud & Keep Customer Trust

    It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO Register Today

    Download

  • Cybersecurity Awareness 2021: #BeCyberSmart about Account Takeover Attackers

    Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. Attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. How can companies that are the intended targets for ATO innovate to learn from attacks, anticipate attackers’ next moves, and apply new techniques and detections to stop them? You’ll gain an understanding of: · Underground criminal economy of stealing and selling credentials and accounts · Purpose-built ATO attack tools that bot operators use to target your business · Innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover

    Download

  • Cyber Monitoring & Defense for Critical Infrastructure

    This talk will detail the tools we use to develop a NIST CSF-compliant platform and set of ATO-supporting artifacts and discuss how they can improve the cybersecurity of the manufacturing process.

    Download

  • 10-Min Webinar: How Identity-Focused Security Can Drive Digital Business

    Alongside the rise in remote work, there’s been a staggering increase in security threats, in particular account takeover (ATO) attacks. Even minor incidents can threaten monetary loss, chargebacks, regulatory fines, and reputation loss. Many organizations see the looming threat that ATO attacks pose to their business, but don’t understand the most important place to start for prevention: identity security. Join this webinar with IDG and Okta, where you’ll learn: • Why identity-focused security is a critical element in driving digital business • Survey insights on global IT leaders’ identity and access management objectives, practices, and challenges • The perceived threat of account takeover attacks and methods of prevention

    Download

  • Making Sustainability a Successful Strategic IT Initiative

    As environmental matters remain increasingly relevant, it's crucial that organizations adapt their business strategies to prioritize environmental, social, and governance (ESG) principles. In a recent survey conducted by Enterprise Strategy Group*, nearly a third of respondents already had mature ESG programs in place that impacted their purchasing and operational decision making. Through streamlined data management, organizations can achieve an integrated data strategy to measure and verify their ESG commitments. While data transformation is key to achieving operational efficiency and net zero ambitions, it can be difficult to navigate existing programs and align departments to realize ESG goals. Join this panel to learn more about how Veeam and Atos can help organizations further their ESG initiatives as guest panelists discuss: - The benefits of adopting ESG data protection practices for hybrid cloud environments - How Veeam and Atos work together to enhance your organization’s existing digital transformation initiatives and ensure sustainable digital interactions - How Veeam and Atos can help organizations create an end-to-end sustainable IT strategy to modernize infrastructure and reduce carbon emissions *ESG Complete Survey Results: The Role of ESG Programs in IT Decision Making, SEPT 2022

    Download

  • How to Stop Account Takeover and Human Fraud

    The use of stolen payment details remains the largest fraud cost to online businesses. Emerging quickly from its shadow, however, is account takeover (ATO), which has increased significantly since the pandemic began — with a 134% increase in malicious login attempts detected on our platform during 2020. This webinar will take a deep dive into how to stop ATO before it happens by detecting and mitigating attacks, credential stuffing, and account hijacking. It will also include a demo of Akamai’s new account protection feature, which is a forthcoming extension of our industry-leading bot management solution. What we will cover: • Details of the fraud kill chain • How to get smarter bot detection using machine learning • What a risk score is and how to apply it on credentials usage • How to mitigate fraud by preventing account takeover attacks

    Download

  • Managing account takeover risks

    How is your business defending against the massive rise of Account Takeover (ATO) attacks? Don’t miss this informative webinar with everything you need to know to protect against sophisticated email threats that can wreak havoc if they aren’t detected and mitigated right away.

    Download

  • Imperva: Protección contra bots y account takeover: Casos de Usos (Español)

    n esta sesión exclusiva para nuestros socios y distribuidores en español, cubriremos como capitalizar y detectar oportunidades con estas dos tecnologías de imperva, y sobre todo poder distinguir los casos de uso para Account Takeover y Advanced Bot Protection. La sesión no es para usuarios finales o prospectos. Cubriremos los siguientes tópicos: -Definición y tipos de ataques de apropiación de cuentas, o Account Takeover. -¿Cuáles son las verticales y organizaciones que son más vulnerables a los ataques de ATO? -Detección de oportunidades para Account Takeover (ATO) y Advanced Bot Protection. Las diferencias entre ambas tecnologías y casos de uso. -Cómo hacer demostraciones para prospectos y/o clientes: para protección contra bots (ABP) y del modulo de account takeover, sobre los clientes de base instalada de Cloud WAF y prospectos nuevos. -Modelos de licenciamiento para el modulo de ATO, y de Advanced Bot Protection.

    Download

  • Changing the Future: Outmaneuver Sophisticated Bots and ATO Attackers Now

    Akamai Customer Panel: Automated attacks and account takeovers (ATO) continue to rise in sophistication, severity, and pervasiveness. And attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. Companies that are the intended targets can anticipate attackers’ next moves and apply new technologies and detections to stop them. In this panel session with customers from various industries (e.g. CTS Eventim, Zalando SE, and Next PLC), we’ll discuss the underground criminal economy of automated scraping and buying, as well as stealing and selling credentials and accounts. We’ll also talk about innovations that organizations use to change the future from one where attackers have the upper hand to one where they fight back against the disruptive nature of automated threats and ATO.

    Download

  • Employee Experience of HR - Where Real Impact Can Be Made

    We invited Atos' Global Director for Employee Experience, Sam Ellis, to explore the pitfalls many organisations make in focusing efforts in the wrong places, and how prioritising areas of accountability and influence can transform employee engagement, encourage better tool and process adoption, save money as well as valuable time and effort.

    Download

  • Outmaneuver ATO Attackers Now

    Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover

    Download

  • Outmaneuver ATO Attackers Now

    Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover

    Download

  • Vença os invasores de ATO agora mesmo

    As ATOs (apropriações indevidas de contas) continuam aumentando em gravidade e disseminação, principalmente em setores em que os objetos de valor digitais estão sendo criados com mais velocidade que os objetos físicos. Além disso, os invasores estão sempre inovando para tentar aumentar suas taxas de sucesso, esforçando-se para contornar as tecnologias de detecção e mitigação em sua cadeia de destruição. Mas o futuro não é constituído apenas por ataques. As empresas que são os alvos desejados de ATO também podem inovar e aprender com ataques, prever os próximos movimentos dos invasores e aplicar novas técnicas e detecções para detê-los. Nesta sessão, exploraremos: A economia criminosa e clandestina de roubo e venda de credenciais e contas Ferramentas específicas para ataques de ATO que os operadores de bot usam para atingir empresas Inovações que sua organização pode usar para mudar o futuro, fazendo com que os invasores percam sua vantagem e passando a lutar contra a natureza disruptiva da apropriação indevida de contas.

    Download

  • Understand Cross-Platform Account Takeovers & How to Protect Your Organization

    Recent research from Abnormal Security shows that account takeovers (ATOs) are a top concern for security leaders, with 77% ranking it among their three most concerning threats. To boot, 83% of Abnormal survey participants reported that their organization had been directly impacted by an ATO attack within the past year, and nearly 1 in 5 have been impacted more than 10 times. Given the frequency of these attacks you likely have a few questions: 1. How and why are account takeovers increasing? 2. Which applications are the most vulnerable? 3. And why is it difficult to detect and remediate compromised accounts? Abnormal Security CISO Mike Britton and Enterprise Strategy Group Principal Analyst Dave Gruber tackle these queries in the following 2024 RSA Conference session. Register and watch the session for Britton and Gruber’s indispensable takeaways, as well as an explanation of how Abnormal Security’s unified Account Takeover solution detects malicious activity to kick out hijackers across dozens of cloud applications.

    Download

  • Digital Panel Series #4 Digital Ecosystems

    This is the third event in the digital panel series looking at how businesses have and will continue to change through digitisation. During this live panel webinar, we will explore how digital ecosystems create value, the challenges they can present, and what examples we can learn from. This episode was hosted by Worldline’s David Daly who was joined by Rob Price from Worldline, Sophie Proust from Atos and Stephen Ingledew from FinTech Scotland.

    Download

  • Atos' Winning New Business through Deal-Based Marketing

    ITSMA’s Marketing Excellence Awards (MEA) webcast series showcases programs we awarded in 2020 for best performance in marketing B2B services and solutions in categories including, account-based marketing, brand & reputation, driving strategic growth, executive engagement, sales collaboration, and thought leadership. Join ITSMA’s Vincent Rousselet, Senior Associate, as he introduces guest speaker, Catherine Dutton, Global Vice President, Marketing, Atos, for the fifth presentation in this series. Learn about Atos' 2020 diamond award-winning program, Enabling Sales to Accelerate Growth, in the Enabling Sales to Accelerate Growth category. Hear how their deal-based model has delivered extraordinary business growth and has elevated the marketing function to align more closely with sales. ITSMA’s MEA program honors the pursuit of excellence in strategy and planning, innovation, execution, and business results—key criteria for success in any marketing program. The 2021 MEA Program will be open for submissions on March 2.

    Download

  • Supere a los atacantes de ATO tácticamente ahora mismo

    La apropiación de cuentas (ATO, por sus siglas en inglés) sigue aumentando en gravedad y dominancia, especialmente en industrias en las que los bienes digitales se crean a un ritmo más rápido que los físicos. Además, los atacantes innovan constantemente para intentar aumentar sus índices de éxito a medida que trabajan para evadir las tecnologías de detección y mitigación en la cadena de ataque. Pero el futuro no se trata solo de más y más ataques. Las empresas que son los objetivos previstos para ataques de ATO también pueden innovar, mediante el aprendizaje a partir de los ataques, la anticipación a los próximos movimientos de los atacantes y la aplicación de nuevas técnicas y detecciones para detenerlos. En esta sesión, exploraremos lo siguiente: Economía delictual alternativa que permite el robo y la venta de credenciales y cuentas. Herramientas de ataque de ATO especialmente diseñadas para que los operadores de bots ataquen a su empresa. Innovaciones que su organización puede utilizar para cambiar el futuro, de modo que los atacantes ya no tengan la ventaja y pueda combatir la naturaleza disruptiva de la apropiación de cuentas.

    Download

  • Digitalisation des ventes en période de crise sanitaire

    En cette période de crise sanitaire et économique, les consommateurs ont recours en masse à l'utilisation des services en ligne pour leurs besoins. PSA Finance a accéléré le développement de la vente et du financement de véhicules en ligne en transformant son SI. Pour se faire, Atos a développé un framework d’optimisation de la plateforme d’intégration webMethods de Software AG. Ce webinaire vous permettra de découvrir comment une plateforme d’intégration innovante peut venir enrichir les systèmes d’information traditionnels et répondre aux nouvelles attentes des clients. Avec les interventions de Matthieu Cantais, Responsable de la Stratégie Digitale, PSA Banque - Jean-Pierre Couderc, Architect solutions, Atos - Fabrice Hugues, Directeur Innovation & Solutions, Software AG.

    Download

  • How to Achieve Faster ATO on Cloud Native Applications

    Grounding containerized apps on a fully-integrated, DISA STIG certified, Kubernetes stack can speed the process of gaining ATO, achieving FedRAMP approval, and bringing secure, performant, high-quality software and services to public sector and adjacent demanding markets. In this webinar, Michael Tillman, Mirantis Principal Cloud Architect for Public Sector, explains the new DISA Kubernetes STIG for Mirantis Kubernetes Engine, and its relation to current STIGs for stack components like Mirantis Container Runtime and Mirantis Secure Registry. Michael will then illustrate how this fully-integrated, STIG-certified container orchestration stack -- backed by Mirantis engineering expertise -- can help software makers and service providers deliver value faster for demanding Public Sector, FinTech, and other customers. You will learn: - What a DISA STIG for a Kubernetes architecture represents, and how STIGs for Kubernetes, container runtime, and other components relate to one another. - What having a Kubernetes STIG means in terms of asserting fundamental platform characteristics and capabilities. - How to map these fundamental capabilities to specific requirements of your use-cases involved in gaining ATO, FedRAMP approval. - How to work with the platform provider to ensure approval, and what to expect from the process.

    Download

  • Ping Office Hours - PingOne Protect: Getting Started & Maximizing Use

    Join us Wednesday, August 23rd, 10 AM MT while we walk through the step-by-step process of getting started with PingOne Protect and maximizing its value in your platform. Agenda: 1. Short intro to PingOne Protect 2. Expanding beyond Risk-based authentication to New Account Fraud and ATO 3. PingOne Protect new capabilities 4. PingOne Protect demo 5. PingOne Protect roadmap 6. Integration and implementation options 7. Q/A

    Download

  • Goodbye, Passwords. Hello, Passkeys!

    Passwords are not only annoying from a user experience standpoint, due to the number of passwords we need to remember, but they are also one of the weakest forms of authentication. According to a recent study more than 60% of breaches are due to weak / compromised credentials. So why haven’t we moved away from passwords? Introducing Passkeys, a more secure passwordless solution to authentication that improves both user experience as well as security. Join this webinar to learn about: · The different types of password-based account take over (ATO) attacks · Passkeys and how they work · How you can enable a passwordless experience for your users

    Download

  • The top cybersecurity lessons learned from last year’s biggest headlines

    In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learned? And how can we better protect ourselves from cybercriminals? This webinar takes a deep dive into some of the year’s biggest security stories, including: • The continued rise of credential stuffing attacks and ATO • New phishing techniques and strategies • In the headlines: Ransomware and malware attacks that gained international attention • What the future threat landscape looks like • And more

    Download

  • How CTS Eventim Keeps Fraudsters Out and Trust Intact

    Trust is everything. Protect your customers from fraud. Want to find out who’s really logging in, account owners or impostors? Then register for this live webinar where we discuss with CTS Eventim, a leading international provider of ticketing and live entertainment, the challenge of account takeover and the steps they have put into place to protect their customers. You will learn how to: - Detect impostors and in turn stop human-driven fraud - Challenge fraudulent login attempts without impacting legitimate users - Recognise the steps in the ATO cyber kill chain and how to respond.

    Download

  • Unlocking reCAPTCHA’s Full Potential: Top 5 ways to maximize your bot & fraud protection

    Join us for a webinar designed exclusively for reCAPTCHA customers and learn how to fortify your bot and fraud defenses at every stage of the attack lifecycle. In this session, we'll unveil the top five proven methods to maximize the effectiveness of your existing reCAPTCHA implementation, enhancing your protection against evolving threats. Discover how to: > Improve Bot Protection > Protect Against Account Takeovers (ATO) > Detect Breached Accounts > Protect Against SMS Toll Fraud > Protect Against Payment Fraud By implementing these strategies, you'll gain a comprehensive understanding of how to leverage reCAPTCHA's full potential, empowering your business to combat sophisticated bot and fraud attacks effectively.

    Download

  • F5 Shape Enterprise Defense Demo

    F5 Shape Enterprise Defense protects your business from sophisticated cybercriminals that abuse applications in order to commit account takeover (ATO) and fraud. By defending the world’s most valuable brands, F5 has unique visibility into automated and human traffic. Using AI and machine learning algorithms trained on attack profiles and risk surfaces, F5 can accurately and reliably protect against motivated attackers and fraudsters that retool to bypass your security countermeasures. In this demo, you’ll learn how Shape Enterprise Defense protects organizations from sophisticated attacks that would. Watch '5' min demo video

    Download

  • Upgrading to Google's reCAPTCHA Enterprise in 10 minutes or less

    Upgrading to reCAPTCHA Enterprise has never been easier, and can now be done in 10 minutes or less! During this webinar, you'll hear from our security specialist team on the benefits of having unlimited monthly assessments and get a step-by-step demo on how simple it is to go through the migration process yourself. Google has been defending millions of sites with reCAPTCHA for over a decade. reCAPTCHA Enterprise is built on the existing reCAPTCHA API and it uses advanced risk analysis techniques to distinguish between humans and bots. With reCAPTCHA Enterprise, you can protect your site from spam and abuse without creating any customer friction and detect the most common forms of fraud, such as credential stuffing, account takeover (ATO), and automated account creation. Watch our webinar to learn more.

    Download

  • Upgrading to Google's reCAPTCHA Enterprise in 10 minutes or less

    Upgrading to reCAPTCHA Enterprise has never been easier, and can now be done in 10 minutes or less! During this webinar, you'll hear from our security specialist team on the benefits of having unlimited monthly assessments and get a step-by-step demo on how simple it is to go through the migration process yourself. Google has been defending millions of sites with reCAPTCHA for over a decade. reCAPTCHA Enterprise is built on the existing reCAPTCHA API and it uses advanced risk analysis techniques to distinguish between humans and bots. With reCAPTCHA Enterprise, you can protect your site from spam and abuse without creating any customer friction and detect the most common forms of fraud, such as credential stuffing, account takeover (ATO), and automated account creation. Watch our webinar to learn more.

    Download

  • FIPS Enabled Ubuntu Pro on AWS (FedRAMP, GovCloud and more)

    Developing and running Linux workloads in regulated and high-security environments require a long and expensive validation process. As a result, U.S. government agencies and companies that are required to meet government standards and/or deploy to meet their RMF, ATO or FedRAMP or GOVCloud demands will typically need to make large investments, ensuring that they run on robust and secure infrastructure platforms. Thanks to Ubuntu Pro and AWS you can have highly secure and FIPS enabled Open Source Linux instances running in no time. Having confidence in your federally regulated CVE’s not only for your Ubuntu Linux O/S, but also your Installed Application packages is something that many have asked for in the Open Source community. The flexibility and instant elasticity offered by the Ubuntu Pro within AWS will give you peace of mind while quickly scaling your cloud infrastructure. In this webinar, we will look at Ubuntu Pro with FIPS and additional security controls we provide at a higher level for agencies or missions to help you meet your security and compliance requirements. The session will also include a demo that shows how easy it is to start securing the Ubuntu Operating System within the AWS cloud. The webinar will cover the following topics: What does it mean to have a FIPS enabled Operating System? Application of FIPS, FedRAMP, DevSecOps, RMF, ATO and/or GovCloud What is Ubuntu Pro with CVE updates in relation to the Repo’s? Security for the O/S and your Application Packages How can you start using Ubuntu Pro on AWS How security controls and processes are used within agency missions Demonstrate how easy some of these controls are implemented

    Download

  • FIPS Enabled Ubuntu Pro on AWS (FedRAMP, GovCloud and more)

    Developing and running Linux workloads in regulated and high-security environments require a long and expensive validation process. As a result, U.S. government agencies and companies that are required to meet government standards and/or deploy to meet their RMF, ATO or FedRAMP or GOVCloud demands will typically need to make large investments, ensuring that they run on robust and secure infrastructure platforms. Thanks to Ubuntu Pro and AWS you can have highly secure and FIPS enabled Open Source Linux instances running in no time. Having confidence in your federally regulated CVE’s not only for your Ubuntu Linux O/S, but also your Installed Application packages is something that many have asked for in the Open Source community. The flexibility and instant elasticity offered by the Ubuntu Pro within AWS will give you peace of mind while quickly scaling your cloud infrastructure. In this webinar, we will look at Ubuntu Pro with FIPS and additional security controls we provide at a higher level for agencies or missions to help you meet your security and compliance requirements. The session will also include a demo that shows how easy it is to start securing the Ubuntu Operating System within the AWS cloud. The webinar will cover the following topics: What does it mean to have a FIPS enabled Operating System? Application of FIPS, FedRAMP, DevSecOps, RMF, ATO and/or GovCloud What is Ubuntu Pro with CVE updates in relation to the Repo’s? Security for the O/S and your Application Packages How can you start using Ubuntu Pro on AWS How security controls and processes are used within agency missions Demonstrate how easy some of these controls are implemented

    Download

  • State of the Internet / Security – 2021: A Year in Review

    In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learnt? How can we better protect ourselves from cybercriminals? Join us for a lively discussion of this year’s top security stories, where we’ll talk about … -The lasting impact of the transition to a virtual world -How credential stuffing attacks and ATO continued their rise following growth in 2020 -How ransomware and other malware also gained international attention, as the actors behind many of those groups became front-page news -The zero-day vulnerability in Log4j We'll also offer thoughts about what the threat landscape might look like in 2022.

    Download

  • 2021 - A Year in Review

    The top cybersecurity lessons of 2021 In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learnt? How can we better protect ourselves from cybercriminals? Join us for a lively discussion of some of the year’s biggest security stories, including: - How credential stuffing attacks and ATO continued their rise following growth in 2020 - How criminals developed new techniques and strategies in their various phishing attacks - How ransomware and other malware also gained international attention, as the actors behind many of those groups became front-page news We'll also offer thoughts about what the threat landscape might look like in 2022.

    Download

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

    Download

  • Stop Account Takeover with Okta and PerimeterX

    80% of login attempts are from bad bots. Cybercriminals use malicious bots that bypass CAPTCHAs and legacy defenses to execute account takeover (ATO) attacks that result in fraudulent purchases and stolen loyalty points and personal data. IT and security professionals will want to stay ahead of these malicious attacks to protect brand reputation and competitive edge. Register for this live webinar brought to you by Okta and PerimeterX to learn how to: -Stay ahead of bot attacks with Okta’s strong identity engine -Beat bad bots with PerimeterX’s proprietary algorithmic modeling -Customize with wide range of infrastructure, including cloud-services, middleware, load balancers, and CDN solutions

    Download

  • Stop Fraud Without Friction: How to stay ahead of motivated attackers

    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud

    Download

  • Stop Fraud Without Friction: How to stay ahead of motivated attackers

    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud

    Download

  • Stop Fraud Without Friction: How to stay ahead of motivated attackers

    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud Register Today

    Download

  • Standardize and Automate Security Compliance in Public Sector Agencies

    Federal agencies are improving their cybersecurity posture to some degree, particularly as they develop better basic cyber hygiene and modernize their legacy systems. At the same time, hackers are getting better at finding new ways to attack and access federal IT. Yet certain pain points remain, particularly around managing compliance and achieving Authority to Operate (ATO) while implementing the Risk Management Framework (RMF) principles. This session will discuss current challenges faced in dealing with emerging threats, securing a more remote workforce and sharing strategies for staying ahead of adversaries. • Building efficiencies in your existing Risk Management Framework
 • Automating the implementation of security control to achieve a continuous Authority to Operate process • Hearing how your peers are implementing new ways to expedite compliance and audit lifecycles

    Download

  • Thinking Beyond User MFA: Digital Identities for Secure Networks

    Public Key Infrastructure (PKI) is the industry-proven, most secure, and cost-effective way of implementing security solutions for machine authentication, digital signatures, and encryption. It helps the organization to authenticate their digital identities of the users, which can range from individuals to computer systems to servers. It also prevents falsified entities and manages the life cycle of any given number of digital certificates within the system. However, there are some common misconceptions and problems to avoid while evaluating and implementing your own PKI solution. Join our webinar and learn more around: • The industry best practice for machine identity management and the critical benefits for PKI implementation. • How to adopt a scalable and future-proof PKI solution that can support your enterprise growth every step of the way. • Insights from a case study demonstrating how Axiad and Atos implemented their joint solution to protect our customers.

    Download

  • How Business Processes & Non-IT Services Must Change For A Post-COVID Workforce

    There is no longer such a thing as ‘normal’. The world has changed. Full stop. Many of the changes of the last 18 months are now permanent, particularly in our workforces. Digital disruption in our workplaces happened in 2020 along with a forced change in service mentality, particularly in parts of companies that didn’t see themselves as service providers before the pandemic. The COVID-19 springboard meant that companies had to reinvent and redesign services to be ready for the workplace now. Join our 4 experts - Andrea Kis, Principal Consultant and Christina Biangslev from Devoteam, ServiceNow's Melanie Lougee, and Sam Ellis from Atos - as they discuss how hybrid working and digitisation is now driving the future of Enterprise Service Management and what the priority for IT and non-IT leaders should be for 2022. Under the spotlight will be how IT leaders can extend a helping hand and support their enterprise counterparts such as HR and finance in their digital transformation journey and service management journeys.

    Download

  • Understanding Bots: Protecting your Customer Experience… and Bottom Line

    Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedented shift to life online, retailers and specifically those in ecommerce have struggled to gain visibility into their online traffic – both legitimate and malicious. That’s why being able to quickly detect and block malicious bot activity – like credential stuffing, content scraping and inventory hoarding – not only improves customer experience during the path to purchase but also protects against online revenue loss. Join us as we discuss: - Why enhancing visibility into online traffic is critical for safeguarding customer trust - The damaging effect of malicious bot activity on customer experience and conversions. - The latest tools available today to combat malicious bots - Understanding the account takeover (ATO) kill-chain to prevent fraud - The benefits of real-time analysis into bot traffic - Reducing the risk of being impacted by malicious bots

    Download

  • Securing Government Contractors under CMMC with Phishing-resistant MFA

    Over the past year, complex cyberattacks have skyrocketed—and it is no surprise that the U.S. defense industrial base and government contractors are primary targets. In this context, following the DoD Cybersecurity Maturity Model Certification (CMMC) is now more important than ever. Typically seen as phishing and account takeovers targeting digital identities, these attacks result in data exposure, denial of service, erosion of data integrity, and risk to critical assets. What if the solution was not to make passwords stronger, but rather to remove them entirely? Join Axiad and Atos on April 14th to learn why passwordless phishing-resistant Multi-factor Authentication is the most secure and practical defense. We’ll discuss: 1) General challenges of implementing CMMC identification and authentication controls 2) Actions to validate your workforce and machine identities in compliance with CMMC 3) What to look for in a phishing-resistant Multi-factor Authentication solution

    Download

  • Understanding Bots: Protecting your Customer Experience… and Bottom Line

    Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedented shift to life online, retailers and specifically those in ecommerce have struggled to gain visibility into their online traffic – both legitimate and malicious. That’s why being able to quickly detect and block malicious bot activity – like credential stuffing, content scraping and inventory hoarding – not only improves customer experience during the path to purchase but also protects against online revenue loss. Join us as we discuss: - Why enhancing visibility into online traffic is critical for safeguarding customer trust - The damaging effect of malicious bot activity on customer experience and conversions. - The latest tools available today to combat malicious bots - Understanding the account takeover (ATO) kill-chain to prevent fraud - The benefits of real-time analysis into bot traffic - Reducing the risk of being impacted by malicious bots

    Download

  • F5 Sponsored 'ISA' Webinar: How to Stay Ahead of Motivated Cyber Attackers

    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates eCommerce applications or manages user accounts of value is a potential target and the consequences are significant: account takeover (ATO), fraud losses, damaged brand, and other equally disastrous scenarios. In this webinar join Senior Solutions Engineer Shehzad Shahbuddin and senior Security Architect Rob Roj with f5 Shape Security to find solutions for vulnerability management. Then join ISA Cybersecurity Training Instructor Bryan Singer as he goes through a few case studies and shows exposure risks. Key Takeaways: 1) How attacks originate from automation. 2) Ways attackers adapt using imitation and human fraud. 3) Introduce practices to defeat your adversaries and protect your business from online fraud. 4) Case Study on Vulnerability Management

    Download