Hi [[ session.user.profile.firstName ]]

Skybox Security

  • Date
  • Rating
  • Views
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Life After May 25: Sustainable GDPR Compliance With Visibility and Automation Peter Hughes, Technical Director, Sales, Skybox Security Recorded: May 24 2018 46 mins
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • Vulnerability and Threat Trends 2018
    Vulnerability and Threat Trends 2018 Marina Kidron, Senior Security Analyst and Group Leader of Skybox Research Lab Recorded: Feb 28 2018 34 mins
    What Happened in 2017? Your Job Got Harder
    Cyber defenders are facing a better outfitted landscape than ever before. According to findings of the Vulnerability and Threat Trends Report 2018 — which examines vulnerabilities, exploits and threat in play — in 2017:

    - The amount of newly published CVEs doubled, rising to 14,000
    - The monthly average of new sample exploit code rose 60%
    - New vulnerabilities impacting operational technology grew by 120%

    Register for this on-demand webinar to examine what’s behind these and other trends, including the state of the exploit kit industry, the top malware to follow and more.
  • Complying with the General Data Protection Regulation
    Complying with the General Data Protection Regulation Benjamin Wright, Sr. Instructor SANS Institute Recorded: Nov 14 2017 63 mins
    The General Data Protection Regulation or GDPR is the latest amplification of the European Unions data security requirements that articulates measures to protect individuals and holds organizations accountable for data security.

    When it goes into effect, GDPR can apply widely to various organizations, including many without a physical presence in the European Union. In this webcast, we will explore this lengthy, complex regulation by focusing on the key steps your organization needs to take in order to comply. This includes how to get ready for the regulation; how to identify a Data Protection Officer and what this person needs to know to be effective in this role; as well as steps toward and a checklist for compliance with concise, practical information your organization can begin using now.
  • GDPR Myths and Misperceptions
    GDPR Myths and Misperceptions Duncan Brown, IDC Associate Vice President of European Security Recorded: Nov 14 2017 61 mins
    Learn what’s really required under the new regulation from an expert on questions that may still be troubling you. Duncan Brown, IDC’s Associate Vice President of European Security and one of the leading voices on EU GDPR will cover topics including:

    -Where and to which organizations the law applies (most likely, to yours!)

    -What fines will actually be enforced and what price tag they carry

    -What it means to be non-compliant (e.g., does the law apply in the absence of a breach?)

    -How EU GDPR compares to other regulations, such as PCI

    The clock is ticking — don’t get caught out. Register today and get the insight needed to effectively implement an EU GDPR strategy in time.
  • Automating Cloud Security to Mitigate Risk
    Automating Cloud Security to Mitigate Risk Dave Shackleford, SANS Analyst Recorded: Nov 14 2017 56 mins
    As your enterprise migrates to a private, public or hybrid cloud solution, what potential threats and challenges should you plan for in today’s security environment? How do you get visibility into your cloud solution, understand the architecture and manage it? This webcast outlines the potential security challenges enterprises face as they migrate to any kind of cloud set-up, and looks closely at how threat modeling, vulnerability assessment and automated operations can improve cloud security management.
  • Managing Security in the Cloud — The Benefits and Challenges
    Managing Security in the Cloud — The Benefits and Challenges Duncan Brown AVP, European Security Practice, IDC EMEA Recorded: Nov 11 2017 31 mins
    IDC research shows that the top drivers of cloud adoption include standardizing IT infrastructure, as well as improving agility and security. So why do companies still worry about security?

    Duncan Brown, head of IDC’s European Security Practice, and Michelle Cobb, Chief Marketing Officer of Skybox Security, discuss the best approaches to managing these challenges and more, including:

    -How to secure what you can't see: Addressing loss of visibility of workloads in the cloud

    -Shared responsibility for security and how to ensure your cloud security providers are doing what they say they will do

    -Different considerations when moving to the cloud and how to translate security controls and processes into the cloud environment
  • Managing the Brave New World of Cloud Security
    Managing the Brave New World of Cloud Security Michelle Cobb, Chief Marketing Officer, Skybox Security Recorded: Oct 25 2017 41 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    About our Presenter
    Michelle Johnson Cobb is a technology marketing leader with a passion for driving success for emerging products. Prior to working at Skybox Security, Cobb held executive marketing roles in computer security, networking and enterprise software companies, including McAfee, Tumbleweed Communications and several startups. She received her MBA with high distinction from the University of Michigan Ross School of Business and a Bachelor of Science in Computer Science also from the University of Michigan.

Embed in website or blog