Hi [[ session.user.profile.firstName ]]

Verizon Enterprise Solutions

  • Date
  • Rating
  • Views
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • How to Embrace the Disruptive Power of Software-defined Networking
    How to Embrace the Disruptive Power of Software-defined Networking Ray Bauer, Gobal Solutions, Mark Hollman, SDN/NFV Product Marketing, Verizon Enterprise Solutions. Recorded: Sep 19 2018 30 mins
    How do large enterprises innovate, scale and deploy at speed while keeping costs under control and staying secure? Based on a recent survey, 57% of organizations plan to deploy SDN within 2 years.

    Join the webinar to learn:

    - What strategies companies are implementing
    - How SDN offers an innovative approach to designing and building networks
    - How to leverage network and application performance to drive business forward

    About the presenters:

    Mark Hollman leads a globally distributed team, responsible for go to market for flagship Managed Software Defined Networking (SDN) and Network Functions (NFV) Virtualization portfolios. With 20+ years of experience, Mark has served in a variety of Marketing and Sales roles focused on revenue generation as well as marketing strategy and execution.

    Ray Bauer directs the business development practice and fosters Verizon partnerships focused on assisting enterprise customers achieve their desired business goals. He leads teams in multiple facets of business development including helping customer's in their digital journey include application enablement services, software as a service, network and application performance management,
  • Data Breach Countermeasures: Actionable Items from Actual Cases
    Data Breach Countermeasures: Actionable Items from Actual Cases John Grim, Senior Manager, Investigative Response Team, Verizon Recorded: Sep 18 2018 49 mins
    Verizon’s John Grim will talk through data breach scenarios investigated by the Verizon Threat Research Advisory Center | Investigative Response Team that have afflicted victimized organizations. Drawing on these real-life experiences, he’ll discuss some of the most common (as well as some of the most lethal) cybersecurity attack scenarios experienced by organizations today. John will augment these scenarios drawn from Verizon's investigative caseload with data from Verizon’s industry-leading research reports (Data Breach Investigations Report and Data Breach Digest). He'll then provide you actionable countermeasures to effectively help detect, respond, and mitigate data breaches and cybersecurity incidents.

    John has over 15 years of experience investigating data breaches and cyber security incidents within the government and civilian security sectors, leading a team of highly skilled digital forensics investigators. He also advises on data breach containment and eradication efforts, performs digital forensic examinations, and leads data breach response preparedness training and breach simulation tabletop exercises for customers worldwide.
  • What to Expect at #OCR2018
    What to Expect at #OCR2018 Jeff Schweitzer, Asymmetric Solutions Architect, Verizon Recorded: Sep 12 2018 22 mins
    In 2017, Verizon hosted Operation Convergent Response (OCR) at the Guardian Centers in Perry, GA as a way of showcasing various core, new, and emerging communications technologies in live action scenarios. The attendee response was positive and seen as very helpful to the support of their core missions. And in response to overwhelming demand, Verizon will return to the Guardian Centers this year, November 5-8, to host Operation Convergent Response 2018 (#OCR2018) - and we want you to join us!

    This webinar will give you an opportunity to:
    •Learn more about the real-world experiences #OCR2018 will demonstrate to federal, state, and local agencies and organizations.

    •Hear directly from Verizon’s experts as they provide deep-dives into the various scenarios and other event activities, including a solutions showcase and conference as well as a variety of immersive learning experiences.

    •Ask additional questions in the Q&A session.

    #OCR2018 will highlight technology from Verizon and its eco-system of innovative companies at our solutions showcase and within the following immersive, real-world scenarios:

    •Active Shooter
    •Earthquake
    •Helicopter Crash
    •Hurricane
    •Interstate Pile-Up
    •Nuclear Detonation
    •Subway Attack

    Please join this webinar to learn more about #OCR2018 and how technology can help address your organization’s complex challenges so you can achieve better outcomes.

    Verizon would love to see you at this year’s event!
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018 John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Aug 15 2018 75 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • How "sticky" is your mobile user experience?
    How "sticky" is your mobile user experience? Amit Kapoor - Dir. of Virtual Networks Verizon; Jeff Aaron, Chief Marketing Officer, MIST; Randall Crowder- COO, Phunware Recorded: Aug 8 2018 29 mins
    Give customers, staff, and contractors a Wi-Fi experience that makes them want to stay around. Join us for a joint webinar with Verizon, Mist Systems, and Phunware to discover how sticky, deep customer engagement drives clear and compelling business outcomes.
  • Top Five Benefits of Versa SD WAN
    Top Five Benefits of Versa SD WAN Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa Recorded: Jul 24 2018 44 mins
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • How to Transform Your Network From “No and Slow” to “Yes and Go”
    How to Transform Your Network From “No and Slow” to “Yes and Go” Mark Hollman - Head of SDN/NFV Product Marketing, Verizon Mark Burgbacher – Lead, Verizon Application Enablement Team Recorded: Jul 17 2018 54 mins
    Large enterprises are under pressure to stay ahead of ever increasing customer expectations and developments in technology. They need to be able to innovate, scale and deploy at speed without incurring high costs. Learn how SDN is becoming an enabler to help enterprises accomplish these business objectives, and how Platform as a Service will help your organization accelerate into the future. Now, more than ever, you need to include Network in your full stack DevOps teams.
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

Embed in website or blog