Hi [[ session.user.profile.firstName ]]

Symantec

  • Date
  • Rating
  • Views
  • Demystifying the NIST Cybersecurity Framework for Healthcare Demystifying the NIST Cybersecurity Framework for Healthcare Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Feb 9 2017 51 mins
    As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

    This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

    Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

    During this webinar, we will also cover:

    •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

    •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

    •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

    Register Today
  • The inside scoop on Cloud Security Gateways featuring Andras Cser of Forrester The inside scoop on Cloud Security Gateways featuring Andras Cser of Forrester Andras Cser, VP, Principal Analyst Serving Security & Risk Professionals, Forrester & Deena Thomchick, Sr.Director, Symantec Recorded: Feb 7 2017 57 mins
    Get advice on evaluating cloud security products from our guest speaker, Andras Cser, primary author of Forrester's first Wave Report on Cloud Security. He will discuss the risks associated with adopting cloud applications and services and how cloud security gateways (CSG), also known as CASBs, can help protect your organization with integrated data protection and activity monitoring.

    This webcast will include insights from the recently released report, The Forrester Wave™: Cloud Security Gateways Q4 2016, which evaluated 8 of the most significant CSG vendors against 23 different criteria.

    Register Today
  • Securing Higher Education Institutions in the Cloud Securing Higher Education Institutions in the Cloud Frank Torrence, Senior Systems Engineer, Symantec Recorded: Feb 7 2017 51 mins
    With the rise of cloud adoptions and ease of access to business and learning applications, higher education institutions are finding it increasingly difficult to maintain data integrity, authentication, and security for its students and faculty.

    Join Symantec’s Frank Torrence, to discuss industry best practices for higher education to leverage Cloud Access Security Broker (CASB) and Data Loss Prevention(DLP) capabilities to provide auditing, reporting, and security for applications data wherever it resides.

    In this webcast you will learn how to:

    - Ensure secure cloud application and data access for students, teachers and faculty

    - Secure your network from the cloud to the ”ground”

    - Maintaining data integrity and security without sacrificing access

    - Provide an environment that allows freedom and ease of use for all connected users.

    Register Today
  • Using the NIST CSF to prepare for Canada Digital Privacy Act Using the NIST CSF to prepare for Canada Digital Privacy Act Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Jan 31 2017 58 mins
    The Digital Privacy Act (DPA) from Canada is here…are you ready? The Government of Canada passed the Digital Privacy Act (DPA), which amends and updates the existing federal privacy legislation. As a business in Canada what does this mean to you and are you ready?

    Aside from the obvious ramifications of a breach such as lost data and revenue, one of the many new requirements of the DPA requires all Canadian organizations to “keep and maintain a record of every breach of security safeguards involving personal information under its control.”

    Attend this Webcast to learn how to use the National Institute of Standards and Technology (NIST) with Cybersecurity Framework (CSF) as a tool to help determine if you’re ready for this new, important legislation.

    Key Learning Objectives:

    -Basic overview of NIST Cybersecuity Framework (CSF)

    -Review what the Canadian Digital Privacy Act (DPA) requirements are to your organization

    -Understand how to utilize the CSF to prepare for the Digital Privacy Act

    Register Now
  • Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Chris Diya, Systems Engineer, Symantec Recorded: Jan 26 2017 32 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

    Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.

    Join us to discover:

    •How machine learning addresses unknown threats

    •Why Symantec Endpoint Protection 14 machine learning is unique

    •Where it fits in a layered solution

    In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jan 24 2017 54 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: Jan 19 2017 58 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Learn How the NIST CSF Benefits Small and Medium Businesses Learn How the NIST CSF Benefits Small and Medium Businesses Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Jan 17 2017 60 mins
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation Recorded: Dec 20 2016 64 mins
    2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.

    As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.

    Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
  • Effective Patch Strategies for Windows 10 and Office 365 Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Solutions Product Management – Symantec Recorded: Dec 13 2016 47 mins
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now

Embed in website or blog