Hi [[ session.user.profile.firstName ]]

Zenedge

  • Date
  • Rating
  • Views
  • GDPR Impact & Requirements for Web Application Security
    GDPR Impact & Requirements for Web Application Security James Castro-Edwards, Partner and Head of Data Protection & Stephen Gates, Chief Research Intelligence Analyst Recorded: Nov 8 2017 61 mins
    Join James Castro-Edwards, Partner and Head of Data Protection at Wedlake Bell LLP, and author of EU General Data Protection Regulation: A Guide to the New Law, and Zenedge and find out:

    - The spectrum of data challenges the new regulation is creating
    - The data protection changes organisations will need to make to remain compliant
    - New approaches other organisations are making to considerably help protect their stored PII data
    - How to make your web applications compliant

    In May 2018, the new EU General Data Privacy Regulation (GDPR) will take effect. The regulation will require all organisations in the private, public, and third sectors to proactively protect personal information they hold on their employees, customers, clients and suppliers.

    The GDPR significantly extends the rights of individuals and imposes stringent obligations on businesses, public authorities, and charities; exposing those that fail to comply to the risk of fines of up to €20,000,000 (US$23,500,000) or 4% Worldwide annual turnover - whichever is the greater. US businesses beware: The GDPR can apply to operators established entirely outside of Europe.
  • The Coming Bot Armageddon – What You Can Do Now to Manage Your Risk
    The Coming Bot Armageddon – What You Can Do Now to Manage Your Risk Stephen Gates, Chief Research Intelligence Analyst Recorded: Sep 19 2017 32 mins
    Today, malicious bots represent an unprecedented threat to organizations of all sizes. The threat is only going to get worse in the next few years, as more-and-more vulnerable IoT devices make their way to the Internet. Bots can be blamed for the world’s largest DDoS attack on record, generated by IoT cameras that were infected with the Mirai malware, and commandeered into a bot army with amazing firepower. And if you think that’s bad, wait till you see what they’re going to do next. Your applications, websites, networks, APIs, and your data will become their next targets.

    Join this webinar with other cybersecurity professionals where you’ll learn:

    - Why malicious bots represent an unprecedented threat to businesses of all sizes
    - What other hazards can we expect to experience due to the malicious bot phenomenon
    - What actions can organizations take to manage their risk in the coming bot Armageddon
  • The Rise of the Bad Bots - How to Defend Your Web Applications
    The Rise of the Bad Bots - How to Defend Your Web Applications Stephen Gates, Chief Research Intelligence Analyst Recorded: Aug 16 2017 30 mins
    Today's hackers use bots to launch pre-attack scans, post comment spam, exploit vulnerabilities, and execute code injection attacks, denial of service attacks, and password guessing hacks against your web facing properties. Bots commit fraud by credential stuffing, repetitively making and canceling purchases, holding and/or consuming inventory, scraping sites, stealing information, and a host of other unwanted activities. Having the ability to eliminate malicious bot traffic while managing legitimate bot traffic is critical to maintaining your uptime and your lines of business.

    Join fellow cybersecurity professionals to discuss:

    1.Why malicious bot traffic will likely exceed 70% of all web-based traffic by 2020.
    2.How to detect and eliminate malicious bots while allowing legitimate bots through.
    3.What options are available to manage bot traffic now and well into the future.

    About the Presenter:
    Stephen has been instrumental in helping solve the DDoS and Web Application Security problems for service providers, hosting providers, and enterprises in North America and abroad for over a decade. He has more than 25 years of computer networking, information security, and product management experience. In his last role, Stephen served as the Chief Research Analyst for NSFOCUS before joining the ZENEDGE team. He is a recognized Subject Matter Expert on DDoS attack tools and methodologies, including next-generation cybersecurity solutions. You can usually find Stephen providing insight, editorial, industry thought leadership, and live presentations covering the latest security topics at RSA, Black Hat, SecureWorld, SANs, Infosecurity, IANS, ISSA, InfraGard, ISACA, etc.
  • How Deep is Your SOC Bench?
    How Deep is Your SOC Bench? Frank Recorded: Aug 1 2017 2 mins
    Some cybersecurity vendors claim you should judge a vendor by the size and depth of their bench. We beg to differ.

Embed in website or blog