Hi [[ session.user.profile.firstName ]]

Imperva

  • Date
  • Rating
  • Views
  • Securing the Cryptocurrency Exchange
    Securing the Cryptocurrency Exchange Jonathan Gruber – Security Engineer, Imperva and Tal Stern - Enterprise Security Expert, Imperva Recorded: Jun 14 2018 59 mins
    Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance

    Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges makes them especially attractive to cybercriminals, attacks of late are taking exchanges by surprise, and they are often not scaled or have not built a secure environment. In this webinar, join Security Engineer Jonathan Gruber and Enterprise Security Expert Tal Stern from Imperva as they explore the latest cryptocurrency exchange vulnerabilities and attacks and explain the best strategies for mitigation.
  • Living in the GDPR World – What Now?
    Living in the GDPR World – What Now? Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva Recorded: May 29 2018 55 mins
    With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
  • Security in the Age of Hybrid Cloud
    Security in the Age of Hybrid Cloud Ajay Uggirala and Marty Jost — Product Marketing, Imperva Recorded: May 22 2018 45 mins
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • The GDPR World Is Upon Us!
    The GDPR World Is Upon Us! Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva Recorded: May 22 2018 45 mins
    With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.

    About the presenters:

    Shawn Ryan, MBA is a Senior Product Marketing Manager within the data security team at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. In developing and executing marketing strategies and content that support the company’s data security portfolio, and enabling various stakeholders and partners, Shawn keeps a close eye on global privacy and regulatory changes, and ever-evolving customer needs.

    Timothy Yim, CIPP/US/E, CIPT, CIPM, FIP, is Senior Regulatory Counsel at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. He leads Imperva’s global data privacy program and other compliance initiatives. Timothy speaks frequently on data privacy at conferences and events, and is often quoted on current privacy events by the media.
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime
    Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime Andy Shoemaker, founder of DDoS testing company NimbusDDOS Recorded: May 2 2018 61 mins
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    •Learn why automatic mitigation is crucial to keeping your business up and running
    •Understand the power and importance of the Incapsula 10-second DDoS SLA
    •Participate in a live Q&A with DDoS experts
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report
    Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva Recorded: Apr 25 2018 58 mins
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It?
    Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Speakers: Ajay Uggirala, Product Marketing, Imperva; Brandon Dunlap, Brightfly (Moderator) Recorded: Apr 11 2018 59 mins
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
  • Protect Your Web Applications from Cryptomining
    Protect Your Web Applications from Cryptomining Gilad Yehudai – Security Researcher, Imperva and Nadav Avital – Threat Research Team Leader, Imperva Recorded: Mar 28 2018 44 mins
    Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution Attacks

    Remote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulnerabilities in web application source code and are prevalent in over 88% of all RCE attacks. In this webinar, join Security Researcher Gilad Yehudai and Threat Research Team Leader Nadav Avital as they analyze malicious cryptomining script, investigate methods these attackers use to make money, and explain how Imperva WAF solutions are equipped to mitigate the threat.
  • Briefings Part 2: Top Three Ways To Tackle API Security
    Briefings Part 2: Top Three Ways To Tackle API Security Speaker: Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap, Moderator Recorded: Mar 22 2018 60 mins
    Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to protect these APIs from attacks. Join Imperva and (ISC)2 for Part 2 of our Security Briefings series on March 8, 2018 at 1:00PM Eastern where we will discuss proven approaches to making API security a priority through understanding how common types of attacks such as distributed denial of service (DDoS) can target APIs, what are the steps to proactively secure development frameworks, and how to enforce identity across enterprise environments.
  • Part 1: March of the Bots: How to Deal with the Onslaught
    Part 1: March of the Bots: How to Deal with the Onslaught Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator) Recorded: Mar 7 2018 60 mins
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.

    Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.

Embed in website or blog