Hi [[ session.user.profile.firstName ]]

Verizon Enterprise Solutions

  • Date
  • Rating
  • Views
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting
    Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jun 20 2018 77 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Your IoT Security Strategy: Critical Factors For Secure Implementations
    Your IoT Security Strategy: Critical Factors For Secure Implementations Bharadwaj Pulugundla, Manager Digital Innovation, Verizon Enterprise Solutions Recorded: Jun 12 2018 37 mins
    The Internet of Things (IoT) presents an unparalleled opportunity for organizations to break new ground with innovative products and solutions. It will also give consumers the ability to efficiently access goods and services in real-time at any desired location. However, businesses must continue to ensure maximum protection for their assets and the data they hold.

    This webinar presents the case for:

    · Why security efforts need to be focused and comprehensive when implementing an IoT strategy
    · The need to have a robust structure from which to base your security and privacy controls
    · Why a 5-point framework is a highly effective approach

    The discussion will also leverage industry examples to help you understand how integrating good cyber security controls into your innovative IoT solutions will help meet your critical business objectives.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • 2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion
    2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion Craig Bowman, Vice President - Advanced Solutions, Verizon Recorded: May 10 2018 60 mins
    The 2018 Verizon Data Breach Investigations Report (DBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,216 confirmed breaches. But what does it really mean for federal agencies?

    Join our panel of federal cyber security experts for a look at some of the key findings of the 2018 report:
    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • State affiliated actors are prevalent threat actors against the public sector.
    • The average time gap between the first click on a phishing campaign and the first report to security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Chris Gagne- ASAIC, Criminal Investigative Division, Cyber Forensics and Technology Unit, United States Secret Service
    • Matthew Noyes - Cyber Policy and Strategy Director, United States Secret Service
    • Bernard Wilson - Program Manager - Network Intrusion Responder (NITRO), United States Secret Service
    • Jeff Wagner- Associate Chief information Officer, U.S. Office of Personnel Management (OPM).
    • Marc Spitler- DBIR Author/Analyst, Verizon
    • Craig Bowman (moderator)- Vice President, Advanced Solutions Division, Verizon
  • Virtual Network Services Enterprise Orchestration Demonstration
    Virtual Network Services Enterprise Orchestration Demonstration Mark Hollman, Senior Manager–SDN & NFV Product Marketing Verizon Enterprise Solutions Recorded: Apr 19 2018 15 mins
    This webinar demonstrates Verizon Virtual Network Services (VNS) end to end automated provisioning process. Based on a recording conducted in our Tulsa lab environment, two virtual services (routing and security) are provisioned in around five minutes on to a white box uCPE device, giving an overview of the available tools, the user experience, and some highlights and benefits of the VNS product offering.
  • 2018 Verizon Data Breach Investigations Report - Panel Discussion
    2018 Verizon Data Breach Investigations Report - Panel Discussion Moderator, Jeff Duran with threat experts Recorded: Apr 10 2018 61 mins
    Tuesday, April 10th, 10am EST

    The 2018 Verizon Data Breach Investigations Report, now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,347 confirmed breaches. But what does it really mean to you? Join our panel of experts for a first look at some of the key findings of the 2018 report:

    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • Forget slick cybercriminals targeting billion-dollar businesses. Most attacks are opportunistic and target the unprepared.
    • The average time gap between the first click on a phishing campaign and the first report to Security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • Based on our data, one industry saw 93% of their data breaches occur at the point of sale.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Rick Holland, CISO, Vice President Strategy at Digital Shadows
    • Michael Coden, CISSP, Managing Director, BCG Platinion North America, Head of Cybersecurity Practice
    • Chris Camacho, CEO at NinjaJobs

    The cybersecurity answers you want, straight from the experts.
  • Demystifying the move to MS Azure, how to easily implement a cloud strategy
    Demystifying the move to MS Azure, how to easily implement a cloud strategy Larry Cimbalista, Product Manager, Verizon; Jaime Schmidtke, Cloud Networking Specialist, Microsoft Recorded: Mar 22 2018 49 mins
    Learn how easy it can be to bring up applications in the MS environment simply, securely and reliably.

    In this session you’ll learn how MS Azure is helping large enterprises quickly add cloud connections locally, regionally and globally to drive sales, grow revenue and compete.
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Mar 21 2018 77 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information

Embed in website or blog