Hi [[ session.user.profile.firstName ]]

SecurityWeek

  • Date
  • Rating
  • Views
  • Industrial Cyber Security: How Much Is Enough? Industrial Cyber Security: How Much Is Enough? Waterfall Security Solutions Recorded: May 18 2016 60 mins
    A cyber incident in a large, complex industrial control system can have serious consequences, and all security technologies have limitations. This means we can always be more secure, or less. How then, should we evaluate security funding requests for industrial sites? How do we know how much is enough?

    The abstract, qualitative models that most of us use for cyber threats are poorly understood by business decision-makers, and are not easily compared to risk models for threats such as earthquakes and flu pandemics. We could force-fit cyber risks into more conventional models by "making up" numbers for the probability of serious incidents, but "made up" numbers yield poor business decisions.

    Most business leaders though, do understand cyber attack scenarios and their consequences, and find them much more useful than qualitative models or "made-up" probabilities. To communicate industrial cyber risks effectively, an assessment process should distill complex risk information into a small, representative set of high-consequence attack scenarios. Business decision-makers can then "draw a line" through the set, selecting which combinations of attacks, consequences and risks to accept, and which to mitigate or transfer.

    Join us to explore using attack scenarios to communicate risks, consequences, and costs to business decision-makers.
  • 2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots 2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots Derek Brink, VP of Research at Aberdeen Group  & Rami Essaid, CEO of Distil Networks Recorded: Apr 5 2016 63 mins
    Distil Networks has produced their third annual Bad Bot Report. It's the IT Security Industry's most in-depth analysis on the sources, types, and sophistication levels of last year's bot attacks -- and there are serious implications for anyone responsible for securing websites and APIs.

    Join Derek Brink, Vice President of Research at Aberdeen Group  and Rami Essaid, CEO of Distil Networks as they dive into the data to reveal:

    • 6 high-risk lessons every IT security pro must know
    • How to quantify the risk and economic impact of bad bots for your organization
    • How bot activity varies across websites based on industry and popularity
    • The worst offending countries, ISPs, mobile operators, and hosting providers

    Bad bots are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.

    Register today to gain actionable insights on how to defend your websites and APIs for the coming year of threats.

    Bonus: All registrants will receive a copy of Distil Networks’ 2016 Bad Bot Reports and a copy of the presentation slides.
  • The Phantom Identity Menace The Phantom Identity Menace Chris Webber, Security Strategist at Centrify; Eric Hanselman, Chief Analyst at 451 Research Recorded: Feb 18 2016 59 mins
    Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data.  How can you strike back and stop breaches that attack your users far, far away?  
     
    • Stop fighting previous battles – Attackers have moved on to a new, more vulnerable target
    • Move Security techniques to a new future – Identity must be the core of security
    • Re-angle the deflector shields – Legacy perimeter security isn’t enough
     
    Join Chris Webber, Security Strategist at Centrify, and Eric Hanselman, Chief Analyst at 451 Research, as they discuss todays’ identity-based security risks, and how to arm yourself against them.
  • Industrial Control Systems (ICS) Cyber Incidents - Real But Not Being Identified Industrial Control Systems (ICS) Cyber Incidents - Real But Not Being Identified Joe Weiss- ICS Cyber Security Expert Recorded: Nov 18 2015 63 mins
    It’s often a challenge to address the ICS cyber security conversation in an organization that has yet to suffer a cyber incident. While the issue of defending against traditional IT cyber breaches goes uncontested ICS owner/operators still struggle to align traditional cyber threat vocabulary and remediation methods to their operational environments. Both malicious and unintentional cyber threats are not confined to data breaches and IT systems but they can be harder to identify in ICS environments. You have to know what you’re looking for.

    Joe Weiss has amassed a database of more than 700 confirmed control system cyber incidents. The database covers ICS cyber from around the globe. A vast majority incidents were not identified in official reports as being cyber-related but a review of the circumstances surrounding the event proves otherwise.

    During this webinar Weiss will discuss:
    • Differences between ICS cyber security and traditional IT security
    • Summaries of actual ICS cyber incidents from his database
    • Recommendations on how to tackle monitoring and protection at your facility
  • Designing Your Industrial Internet Without Sacrificing Security Designing Your Industrial Internet Without Sacrificing Security Brian Witten, Sr. Director for IoT, Symantec Recorded: Nov 5 2015 52 mins
    Big data analytics and smarter sensors are just two of many technologies leveraged by many companies enhancing their Industrial Control Systems (ICS) to reap the benefits of the Industrial Internet. However, as you design these smarter and increasingly connected systems, security must be built in from early stages, or else you risk others, with malicious intent, using your systems against you. This session will describe a process for helping you frame your security needs and meet them smartly to be sure that you are efficiently and effectively tackling security “end-to-end” and not leaving any weakest links unprotected as you evolve your ICS to capture the opportunities driving the excitement behind the Industrial Internet.

    About the Speaker: Brian Witten is a Senior Director for “Internet of Things” (IoT) at Symantec.
  • Why Cloud Security is No Longer an Option – It's a Necessity Why Cloud Security is No Longer an Option – It's a Necessity Zscaler & Forrester Research Recorded: Sep 30 2015 55 mins
    The Necessity of Cloud-Delivered Integrated Security Platforms,

    Cloud security is more secure than traditional appliance based solutions, especially in today’s social and mobile world. This is not just our view - this has been corroborated by several external analysts. New research from Forrester Inc., The Necessity of Cloud-Delivered Integrated Security Platforms, targeting 130 IT decision makers at firms with at least $250 million in revenue, identified that:

    98% of decision makers acknowledge that integrated platforms deliver better security
    Many organizations still have a plethora of legacy point solutions and appliances in their environment
    These organizations suffer from significant volumes of security alerts being triggered without effective response mechanisms

    Join SecurityWeek and Dan Maier, Sr. Director Product Marketing at Zscaler, for a compelling webcast full of key insights and findings from this research.

    Don’t miss this event. Register today!
  • Strategies for Streamlining Cloud App Access and Security Strategies for Streamlining Cloud App Access and Security Centrify & Imperva Recorded: Sep 23 2015 64 mins
    As cloud apps like Salesforce, Office 365, Google for Work, and ServiceNow become the norm, organizations need to enable secure access and maintain compliance. They must also bring under management a growing variety of personal devices, including laptops, smartphones, tablets, and wearables that are being used to access business systems and data.

    How do you manage user identities and cloud app access in real-time, while keeping sensitive data secure? Join experts from Imperva and Centrify as they share best practices on enabling the safe and productive use of cloud apps.

    • Provide secure single sign-on and user-friendly multi-factor authentication (MFA)
    • Secure and monitor SaaS access from login to logout
    • Detect and block cyber threats such as account takeovers
    • Simplify, centralize, and automate access management – across apps and devices
    • Leverage leading security offerings and what you need to consider

    Register now so you’re ahead of the fast-moving intersection of cloud apps, BYOD, and identity management.

    Sponsored by Centrify & Imperva
  • Segmentation Beyond VLANs, Subnets, and Zones Segmentation Beyond VLANs, Subnets, and Zones Illumio Recorded: Sep 2 2015 51 mins
    You already know the power of application segmentation to deliver data center and cloud security—now you can take segmentation to the next level. Nano-segmentation is finally a reality.

    In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
    Register to find out how to:

    - Reduce your data center and cloud attack surface by 99%
    - Quarantine compromised servers in seconds
    - Achieve compliance in hours
  • Top 10 Best Practices for Privileged Identity Management Top 10 Best Practices for Privileged Identity Management David McNeely, VP of Product Strategy at Centrify Recorded: Jun 30 2015 61 mins
    Data breaches continue to be top of mind for organizations large and small. Two key dynamics are making that challenge much harder — the cloud and the growing sophistication of attackers.

    In this webinar David Mcneely, VP of Product Strategy at Centrify, explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. Attend this webinar to learn about:

    - Trends impacting data security and increasing identity-related risks
    - How to reduce the risk of security breach by minimizing your attack surface
    - Best practices for managing and governing privileged identities in the modern enterprise
  • How to Connect Your Server Room and Board Room - Before a Data Breach Occurs How to Connect Your Server Room and Board Room - Before a Data Breach Occurs SurfWatch Labs Recorded: Apr 28 2015 70 mins
    Cybersecurity has become more than a technical problem. A data breach can have a major impact on your business – loss of jobs and customers, reduced brand reputation, stock price drops and more – with recent research placing the average cost of a breach at $2.7 million dollars. Yet too many organizations continue to drown in low-level threat data and individual response tactics, with security teams pouring through hay stacks that may or may not contain that “needle”.

    Join this webcast to learn how to improve the resiliency of your organization’s strategic risk management and business operation. Our panel of expert speakers include a former intelligence analyst, a CISO and a CEO, who will examine the business impact of cyber threats, why the traditional cybersecurity approach no longer applies, and offer tips for:

    · Taking a data-driven approach to cybersecurity – through evaluated intelligence
    · Continuously measuring cybersecurity key performance indicators
    · Facilitating collaboration across key stakeholders for an improved security strategy and cyber defense

Embed in website or blog