Tips to Endpoint Management, Security and Compliance Challenges
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.
BYOD & Mobile Security: How to Respond to the Security RisksChris Chevalier, Group Product Manager & Chris Merritt, Director of Solution MarketingBring Your Own Device (BYOD) is a popular topic in 2013. The trouble is that IT is trying to understand the security risks and prepare strategies to either adopt employee-owned mobile devices or decide against it for security and data control reasons.
The 160,000 member Information Security Community on LinkedIn conducted the survey “BYOD & Mobile Security 2013” to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.
Participate in this interactive webcast to learn:
•Current Mobile Security Threats
•Top Trends & Drivers in BYOD & Mobile Security
•Necessary Features to Minimize these Security Risks
•Live, Interactive Q&ARead more >
Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.
Join this expert panel webcast to learn how to:
1)Understand your business audiences and evaluate their risk tolerance
2)Leverage reputation management services that are appropriate for your organization
3)Utilize realistic change management to secure prioritized data depositories
Many organizations are jumping on the “Death to Java” bandwagon, ranting about turning off Java to eliminate risk. However, it is important to put the issue in the proper context. The reality is that a Java vulnerability is not the end game for a cyber criminal, it is merely a delivery mechanism in the quest to install and execute bigger malware.
There is no “one size fits all” recommendation for eliminating Java risks. But, you do want to eliminate as much exploitable surface area as reasonably possible on your critical endpoints. This should be the philosophy engrained in every organization’s security culture. If you’re not having this conversation about Java - and quite frankly all of the third-party applications in your environment - you are missing the mark and not calculating your risk. Join Paul Henry and Russ Ernst as they bring us up to speed on the Java vulnerabilities and how to limit your exposure without going overboard.
Businesses large and small continue to struggle with malware. As a result, 50% of endpoint operating costs are directly attributable to malware alone. Traditional approaches to malware protection, like standalone antivirus, are proving themselves unfit for the task. Something has to give.
In this roundtable discussion, independent information security expert Kevin Beaver and Lumension Security’s Chris Merritt will talk about what can be done differently, including:
• How to get a better grasp of the weaknesses in endpoint security that continue to get overlooked,
• Examining whether or not anti-virus as we’ve known it is effective, and
• A comparison between a proactive versus reactive approach to fighting the malware fight.
 Ponemon Institute, 2011 State of Endpoint Risk, December 2010
In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.
During this webcast we look at each of data protection trends, helping you define your organization’s best practice guide to address the top concerns. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
What are IT pros most concerned about heading into 2013? The annual State of the Endpoint Report sponsored by Lumension and conducted by Ponemon Institute reveals APTs and mobile devices pose the biggest security threat to organizations in the coming year. Unfortunately, respondents also demonstrated a disconnect between their identified risk and planned security spend as well as a significant need for improved internal collaboration.
Join Larry Ponemon of the Ponemon Institute and Paul Zimski of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2013 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on today’s Top 3 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
Well-organized, highly sophisticated cyber attacks continue to make headlines, hitting major U.S. banks and global companies like Adobe to name a few. In support of October as National Cyber Security Awareness Month, Lumension CEO Pat Clawson, Prolexic CEO Scott Hammack, security industry expert and author, Richard Stiennon and industry analyst and webcast moderator Eric Ogren will share their unique insight into these recent news-making attacks and what they mean for enterprises everywhere.
In this webcast, you will learn:
•The latest, seemingly extraordinary attacks;
•How these attacks could escalate to the point where they matter to you and;
•What you should be doing to secure against them.
The proliferation of USB flash drives and other removable storage devices has increased the porosity of the network perimeter. This has resulted in sensitive corporate and customer data leaking through the corporate firewall, exposing the organization to data loss, data theft and malware propagation. Understanding the powerful data protection tools available to your organization can help you mitigate these risks, while still enabling the flexible and managed use of these productivity devices.
Join this webcast to learn the practical steps to guide you in the deployment of device control and encryption technology as we dive into a technical discussion of what the critical items to address, including:
•Laying the Groundwork for Data Security
•Preparing for Technical Enforcement
•Enforcing Your Data Protection Policies
•Managing Your Secure Environment
The need to protect digitized health information is a top priority in the healthcare industry. HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet or exceed industry best practices in guarding healthcare information?
Join this webcast as Eric Ogren, President of The Ogren Group, and Chris Merritt, Solution Marketing Director at Lumension come together to take you through:
• What PHI breaches are currently documented by the US Department of Health and Human Resources (HHS) and why these breaches are occurring
• How a healthcare organization can mitigate costs with encryption technologies
• What to look for in device control and full disc encryption solutions
The U.S. has not denied their role in the use of weaponized malware and already, other countries are jumping on board. India recently announced they are empowering government agencies to carry out similar such actions.
State sponsored malware attacks are officially out of the shadows and mainstream for organizations and end users alike. In fact, Google recently announced an alert service for gmail users for “state sponsored attacks”. How exactly did we get to this point and what are the factors and threats that you need to be aware of?
Join this complimentary webcast during this roundtable discussion by IT security industry experts as they answer the following questions:
*How did we get to this point?
*Why should the enterprise care?
*What should the enterprise do?
Walk away from this webcast with the knowledge and approach to help defend your enterprise against weaponized malware.
Make no mistake, consumerization of the workplace is one genie that is not about to go back into the bottle.
With the BYOD movement overwhelming IT, and the convergence between personal devices and the corporate networks set to increase, the ability to restrict-and-ban the network is doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement.
During this webcast we look at each of these aspects, helping you define your organization’s best practice guide. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.