HP Webinar: Tips for Securing Sensitive Documents from Breaches

Date: August 25, 2011
Time: 2:00pm ET

Federal Computer Week has announced a free upcoming webinar entitled, “7 Effective Tips for Securing Sensitive Documents from Internal Breaches“:

Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly over-looked at-risk areas of vulnerability in your agency.

Attendees will learn:

  • an overall strategy encompassing a range of solutions that provide effective protection while lowering costs;
  • how to implement a strategy to secure and control your print infrastructure using the latest industry applications; and
  • technology to help you achieve energy savings and operational cost reductions at the same time.

The Speaker will be Michael Howard, World Wide Business Development Manager For Security Solutions, Hewlett Packard, Imaging and Printing Group.

Security Webinar – McAfee: Exploiting the Cloud and Virtual Machines

McAfee is hosting an interesting looking webinar tomorrow at 2pm EST.

Hacking Exposed Live — Exploiting the Cloud and Virtual Machines

Subject (From host’s site):

During this live webcast, you’ll see exactly how hackers are exploiting cloud computing and virtual machines to harm businesses. We’ll demonstrate the use of commonly available tools they use and how they use them. We’ll reproduce real-world hacks using the same approaches that the hackers used and demonstrate what you can do to prevent them from being used against you.

From the e-mail notification, McAfee will be showing one of the latest hacking techniques used to attack the cloud and VM’s.

Check it out!

Upcoming free Security Webinars – March 23, 2011

A couple interesting webinars are coming up ( All information from presenters website):

For today, a must see is:
Pen Testing Perfect Storm Part VI “We Love Cisco!

Guest Speakers: Ed Skoudis, Joshua Wright, and Kevin Johnson
Date: Wednesday, March 23, 2011
Time: 2PM EDT / 11AM PDT (GMT -4:00, New York)

About this webcast:
During this webcast, security swashbucklers Ed Skoudis, Joshua Wright and Kevin Johnson will return with more penetration testing madness and demonstrate techniques that you can use to proactively assess the security of Cisco networking equipment throughout your organization. 

You’ll learn how to…

  • Use XSS vulns and Project Yokoso to discover Cisco-centric management interfaces
  • Abuse web interfaces for infrastructure control
  • Leverage SNMP-to-telnet access escalation for switch pwnage
  • Conduct privlege escalation with switch mirror ports
  • Engaged in VLAN hopping for fun and profit
  • Set up your own virtual routing lab for practice and testing

Avoiding Data Breach Catastrophe – Beyond 2 Factor Authentication

Join the FS-ISAC and Voltage for a complimentary webcast:
WHEN: Wednesday, March 30, 2011
TIME: 11:00 am EDT / 8:00 am PDT

Recent data breaches at public and private corporations have shown that reliance on perimeter level security is not sufficient – once hackers find a way in they are able to collect data unimpeded. A breach at a notable security company has resulted in potential risks to customers using two-factor authentication however data protection that relies on secrecy or obscurity may not be a good approach.  This session will examine potential risks and suggest strategies for pro-actively protecting data in all its forms inside the enterprise.

And finally Upcoming SANS webinars:

March 23, 2011:
Analyst Webcast: Managing Insiders (Contractors, Vendors, and Employees) in SCADA Environments
Sponsored By: ArcSight, an HP Company, Industrial Defender , waterfall security
March 24, 2011:
Web 2.0 Security: Same old but different
Sponsored By: SonicWall
April 07, 2011:
Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall audits
Sponsored By: Skybox Security, Inc.
April 13, 2011:
Internet Storm Center Threat UpdateISC Webcast
Sponsored By: Core Security Technologies
April 14, 2011:
Analyst Webcast: Addressing the Top 20 Critical Security Controls with SIEM
Sponsored By: ArcSight, an HP Company

Hacking Exposed Live – Mobile Threats Webinar

McAfee will be presenting a free mobile threats seminar from their Hacking Exposed series today at 2pm EST.

Information from Website:

“Jailbroken,” “rogue devices,” and “data loss” are terms that will make even the most seasoned information security officer take notice, in addition to external threats posed to mobile devices, today’s mobile workforce are becoming the enterprise’s next line of exposure.

This Hacking Exposed webcast will focus on mobile devices and demonstrate how hackers are intercepting mobile data, gaining control over smartphones and tablets using SMS scams, and unleashing Trojans and malware like Zeus and Zobit to exploit users and gain access to their records.

This is the second conference in as many days that I have seen addressing “jailbroken”, or “rooted” mobile devices. It really looks like this is becoming a serious issue in the corporate environment.

To sign up, go to:


Definitely looks like it is worth checking out. See you there!