Hi [[ session.user.profile.firstName ]]

Imperva

  • Date
  • Rating
  • Views
  • Insights from CyberEdge’s 2017 Cyberthreat Defense Report
    Insights from CyberEdge’s 2017 Cyberthreat Defense Report Mark Bouchard, COO, CyberEdge and Ajay Uggirala, Director of Product Marketing, Imperva Recorded: Mar 30 2017 57 mins
    You know the bad guys are up to no good but do you know how your current cyber security defensive posture stacks up against those of your peers. In this live webinar, CyberEdge and Imperva will discuss key insights from the 2017 CyberThreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How does our security spend compare to other organizations?
    •How are my peers thinking differently about cyberthreats and their defenses?
    •Which security technologies should we be investing in next?
  • How Not to Get Fired as a CISO
    How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Recorded: Mar 2 2017 55 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Top Cyber Security Trends for 2017
    Top Cyber Security Trends for 2017 Amichai Shulman, CTO and Co-Founder, Imperva Recorded: Jan 19 2017 58 mins
    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    · What top 3 cyber security trends will have the largest impact in 2017
    · Why cyber attacks are on the rise and multiplying quickly
    · How to combat the increasing number of breaches
    · What to consider in building a security plan that is right for your organization
  • Technical Deep Dive: How to Detect and Mitigate Ransomware
    Technical Deep Dive: How to Detect and Mitigate Ransomware Carrie McDaniel, Sr. Product Marketing Manager Elad Erez, File Security Innovation and Development, Imperva Recorded: Dec 13 2016 36 mins
    Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
  • Defend Against the Data Miner for Financial Services
    Defend Against the Data Miner for Financial Services Terry Ray, Imperva Chief Product Strategist at Imperva, Cheryl Tang, Director of Product Marketing Recorded: Nov 9 2016 53 mins
    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:
    - How behavior analysis and deception technology identify insider threats
    - Why data activity monitoring provides comprehensive coverage
    - Why a proactive approach with visibility can quickly stop data miners
  • Unedited: Tales, Tips and Technologies from a Security Company CISO
    Unedited: Tales, Tips and Technologies from a Security Company CISO Shahar Ben-Hador, Chief Information Security Officer; Paul Steen, Senior Director, Global Security Strategist Recorded: Nov 3 2016 48 mins
    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
    · Humorous security tales and repercussions of employee behaviors
    · Tips to deal with employees, execs and board members
    · Security technology recommendations that work best across a security stack

    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
  • Imperva Incapsula Secures and Protects Google Cloud Customers
    Imperva Incapsula Secures and Protects Google Cloud Customers Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula Recorded: Oct 12 2016 52 mins
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Speakers:
    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Defend Against the Data Miner
    Defend Against the Data Miner Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security Recorded: Sep 29 2016 40 mins
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide
    More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health Recorded: Sep 27 2016 51 mins
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall
    Gartner MQ for Web App Firewall Terry Ray, Imperva Chief Product Strategist at Imperva Recorded: Sep 7 2016 66 mins
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.

Embed in website or blog