Hi [[ session.user.profile.firstName ]]

Verizon Enterprise Solutions

  • Date
  • Rating
  • Views
  • Connecting Application Enablement to Business Results
    Connecting Application Enablement to Business Results
    Verizon and Equinix Recorded: Oct 18 2018 39 mins
    Network and security are more critical than ever, but they need to be application centric and a virtualized extension of your business. Learn how to re-architect your cloud to drive better business results and take advantage of technologies like Software Defined Networking (SDN), Network Function Virtualization (NFV), and Everything-as-a-Service (XaaS). We’ll discuss how cloud solutions can enable you to take control of your digital strategies and form the foundation for your enterprise’s Digital Transformation.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, Jihana Clemetson and David Kennedy Recorded: Oct 17 2018 87 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme is 'Cyber Security Awareness' happens to coincide with the National Cyber Security Awareness Month, and, as such, we'll focus on social attacks. We'll cover social engineering attack content reported within the 2018 Data Breach Investigations Report (DBIR) and follow this by highlighting two (2) 2018 Data Breach Digest (DBD) scenarios:

    •Social Engineering – the Spiked Punch
    •Telephonic Pretexting – the Double Fake

    Jihana Clemetson will provide insight to our recent caseload. And then we'll turn things over to David Kennedy who'll on the latest and greatest when it comes to:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to October 12, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Verizon Threat Research Advisory Center - 2018 Payment Security Report
    Verizon Threat Research Advisory Center - 2018 Payment Security Report
    John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Sep 19 2018 76 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ron Tosto, Senior Manager, Global Payment Security Practice
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Max Shubin, Senior Analyst, Threat Intelligence

    For this month’s theme: ‘Payment Security Report,’ we'll feature Ron Tosto who'll cover the latest thought leadership from Verizon, the 2018 Payment Security Report (PSR). The PSR offers industry research on the global payment security landscape. The report highlights the need for effective data protection and provides details on improving security control effectiveness.

    John Grim and Josh Costa will then cover two (2) 2018 Data Breach Digest scenarios: one involving an ecommerce breach and the other a Point of Sale (PoS) intrusion. Max Shubin will provide insight to our recent caseload. Finally, Dave Kennedy will complete this month's briefing with:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to payment card related data breaches that you'd like us to cover on the call, please send them to the following email address prior to September 14, 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • How to Embrace the Disruptive Power of Software-defined Networking
    How to Embrace the Disruptive Power of Software-defined Networking
    Ray Bauer, Gobal Solutions, Mark Hollman, SDN/NFV Product Marketing, Verizon Enterprise Solutions. Recorded: Sep 19 2018 30 mins
    How do large enterprises innovate, scale and deploy at speed while keeping costs under control and staying secure? Based on a recent survey, 57% of organizations plan to deploy SDN within 2 years.

    Join the webinar to learn:

    - What strategies companies are implementing
    - How SDN offers an innovative approach to designing and building networks
    - How to leverage network and application performance to drive business forward

    About the presenters:

    Mark Hollman leads a globally distributed team, responsible for go to market for flagship Managed Software Defined Networking (SDN) and Network Functions (NFV) Virtualization portfolios. With 20+ years of experience, Mark has served in a variety of Marketing and Sales roles focused on revenue generation as well as marketing strategy and execution.

    Ray Bauer directs the business development practice and fosters Verizon partnerships focused on assisting enterprise customers achieve their desired business goals. He leads teams in multiple facets of business development including helping customer's in their digital journey include application enablement services, software as a service, network and application performance management,
  • Data Breach Countermeasures: Actionable Items from Actual Cases
    Data Breach Countermeasures: Actionable Items from Actual Cases
    John Grim, Senior Manager, Investigative Response Team, Verizon Recorded: Sep 18 2018 49 mins
    Verizon’s John Grim will talk through data breach scenarios investigated by the Verizon Threat Research Advisory Center | Investigative Response Team that have afflicted victimized organizations. Drawing on these real-life experiences, he’ll discuss some of the most common (as well as some of the most lethal) cybersecurity attack scenarios experienced by organizations today. John will augment these scenarios drawn from Verizon's investigative caseload with data from Verizon’s industry-leading research reports (Data Breach Investigations Report and Data Breach Digest). He'll then provide you actionable countermeasures to effectively help detect, respond, and mitigate data breaches and cybersecurity incidents.

    John has over 15 years of experience investigating data breaches and cyber security incidents within the government and civilian security sectors, leading a team of highly skilled digital forensics investigators. He also advises on data breach containment and eradication efforts, performs digital forensic examinations, and leads data breach response preparedness training and breach simulation tabletop exercises for customers worldwide.
  • What to Expect at #OCR2018
    What to Expect at #OCR2018
    Jeff Schweitzer, Asymmetric Solutions Architect, Verizon Recorded: Sep 12 2018 22 mins
    In 2017, Verizon hosted Operation Convergent Response (OCR) at the Guardian Centers in Perry, GA as a way of showcasing various core, new, and emerging communications technologies in live action scenarios. The attendee response was positive and seen as very helpful to the support of their core missions. And in response to overwhelming demand, Verizon will return to the Guardian Centers this year, November 5-8, to host Operation Convergent Response 2018 (#OCR2018) - and we want you to join us!

    This webinar will give you an opportunity to:
    •Learn more about the real-world experiences #OCR2018 will demonstrate to federal, state, and local agencies and organizations.

    •Hear directly from Verizon’s experts as they provide deep-dives into the various scenarios and other event activities, including a solutions showcase and conference as well as a variety of immersive learning experiences.

    •Ask additional questions in the Q&A session.

    #OCR2018 will highlight technology from Verizon and its eco-system of innovative companies at our solutions showcase and within the following immersive, real-world scenarios:

    •Active Shooter
    •Earthquake
    •Helicopter Crash
    •Hurricane
    •Interstate Pile-Up
    •Nuclear Detonation
    •Subway Attack

    Please join this webinar to learn more about #OCR2018 and how technology can help address your organization’s complex challenges so you can achieve better outcomes.

    Verizon would love to see you at this year’s event! Visit https://ocr2018.vztechnologies.com/ocr2018 and register for OCR today!
  • Verizon Threat Research Advisory Center - Data Breach Digest 2018
    Verizon Threat Research Advisory Center - Data Breach Digest 2018
    John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Aug 15 2018 75 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Data Breach Digest Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    For this month's theme: 'Data Breach Digest Highlights', we'll feature John Grim, Senior Manager, Investigative Response – Americas, who'll highlight the latest in terms of data breaches.

    Specifically, John will discuss scenarios in this year's Data Breach Digest, reveal how these scenarios match up against the 2018 Data Breach Investigations Report incident classification patterns, and in doing so, provide detection and validation, response and investigation, and mitigation and prevention countermeasures from an incident response and cybersecurity perspective.

    We'll then see what's happening with the IR Pulse and our caseload trends, followed by:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • How "sticky" is your mobile user experience?
    How "sticky" is your mobile user experience?
    Amit Kapoor - Dir. of Virtual Networks Verizon; Jeff Aaron, Chief Marketing Officer, MIST; Randall Crowder- COO, Phunware Recorded: Aug 8 2018 29 mins
    Give customers, staff, and contractors a Wi-Fi experience that makes them want to stay around. Join us for a joint webinar with Verizon, Mist Systems, and Phunware to discover how sticky, deep customer engagement drives clear and compelling business outcomes.
  • Top Five Benefits of Versa SD WAN
    Top Five Benefits of Versa SD WAN
    Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa Recorded: Jul 24 2018 44 mins
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities

Embed in website or blog