Hi [[ session.user.profile.firstName ]]

Imperva

  • Date
  • Rating
  • Views
  • Defend Against the Data Miner for Financial Services Defend Against the Data Miner for Financial Services Terry Ray, Imperva Chief Product Strategist at Imperva, Cheryl Tang, Director of Product Marketing Recorded: Nov 9 2016 53 mins
    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:
    - How behavior analysis and deception technology identify insider threats
    - Why data activity monitoring provides comprehensive coverage
    - Why a proactive approach with visibility can quickly stop data miners
  • Unedited: Tales, Tips and Technologies from a Security Company CISO Unedited: Tales, Tips and Technologies from a Security Company CISO Shahar Ben-Hador, Chief Information Security Officer; Paul Steen, Senior Director, Global Security Strategist Recorded: Nov 3 2016 48 mins
    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
    · Humorous security tales and repercussions of employee behaviors
    · Tips to deal with employees, execs and board members
    · Security technology recommendations that work best across a security stack

    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
  • Imperva Incapsula Secures and Protects Google Cloud Customers Imperva Incapsula Secures and Protects Google Cloud Customers Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula Recorded: Oct 12 2016 52 mins
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Speakers:
    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Defend Against the Data Miner Defend Against the Data Miner Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security Recorded: Sep 29 2016 40 mins
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health Recorded: Sep 27 2016 51 mins
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall Gartner MQ for Web App Firewall Terry Ray, Imperva Chief Product Strategist at Imperva Recorded: Sep 7 2016 66 mins
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.
  • How to Accurately Identify Compromised Insiders How to Accurately Identify Compromised Insiders Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva Recorded: Jul 20 2016 49 mins
    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months.

    Attend this webinar to:
    •Learn how to accurately identify insider threats and protect enterprise data
    •Discover a multi-layered approach to identify compromised users
    •Gain insight into the latest developments in deception technology
  • 3 Steps to Faster Discovery of Insider Threats 3 Steps to Faster Discovery of Insider Threats Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director Recorded: Jun 23 2016 59 mins
    Protecting your data requires an understanding of the threat vectors and taking action to minimize those risks. According to the Verizon 2016 Data Breach Investigation Report, insider and privilege misuse represents one of the most common incident types and typically requires the longest to detect. 
     
    Attend this webinar to:
    · Learn how improving your visibility into insider activity and threats can reduce risk
    · Understand why monitoring both user behavior and data access activity can improve your detection rate and response times
    · Find out how you can expand your security monitoring capabilities without impacting system performance, adding cumbersome processes or hiring specialized personnel
  • More Databases. More Hackers. More Audits. More Databases. More Hackers. More Audits. Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director Recorded: Mar 31 2016 60 mins
    Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

    Attend this webinar to learn how to:
    * Detect and block cyber security events in real-time
    * Protect large and diverse data environments
    * Simplify compliance enforcements and reporting
    * Take control of escalating costs.
  • Defend Against Attacks from the Inside Defend Against Attacks from the Inside Carrie McDaniel, Product Marketing Manager, Imperva Recorded: Feb 23 2016 42 mins
    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk.In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
    • Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution

    Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.