Hi [[ session.user.profile.firstName ]]

NTT Security US

  • Date
  • Rating
  • Views
  • NTTCS and Forrester Research - Options to overcome your security skills shortage NTTCS and Forrester Research - Options to overcome your security skills shortage Dale Tesch, NTT Com Security & guest speaker John Kindervag, Forrester Research Recorded: Sep 17 2015 46 mins
    Doing more with Less – NTT Com Security and Forrester Research address the growing security skills shortages within your organization and what options are available to reduce your risk of cyber threats while remaining compliant
  • NTT Com Security & LogRhythm - Security Solutions for the Financial Industry NTT Com Security & LogRhythm - Security Solutions for the Financial Industry Dale Tesch, NTT Com Security & Michael Dalgliesh, LogRhythm Recorded: Jul 28 2015 42 mins
    NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
  • Protecting yourself from state sponsored hackers Protecting yourself from state sponsored hackers Chris Camejo, NTT Com Security Recorded: Nov 26 2014 62 mins
    Forget the politics, state sponsored attacks and espionage are and will continue to be conducted around the world. Organizations across nearly all verticals are caught in the crossfire or actively targeted. Find out what the threats are, how they operate, and what you can do to help protect your network and data.

    In this session you will learn:
    1: Consequences of state sponsored hacking
    2: How state sponsored attackers operate
    3: Steps that can be taken to reduce the risk
  • Mitigate Mobile Risk: Meet Regulations AND Exceed Requirements Mitigate Mobile Risk: Meet Regulations AND Exceed Requirements Guest Presenter Randy Figueroa from Accellion Recorded: Oct 29 2014 42 mins
    Compliance and security departments are recognizing that as they enable the mobile work force, being compliant doesn’t always equal being secure. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments, or technologies.

    This session will explore:
    - Extending and reinforcing security controls and compliance requirements in mobile file share and sync solutions
    - The benefits and risks of private vs public cloud deployments
    - The features to look for in mobile file sharing and content management solutions
    - Specific financial use case
  • Detecting and Responding More Quickly to Advanced Cyber Attacks with LogRhythm Detecting and Responding More Quickly to Advanced Cyber Attacks with LogRhythm Jamil (Jamie) Mneimneh, Sales Engineer at LogRhythm Recorded: Oct 1 2014 59 mins
    NTT Com Security webinar with LogRhythm: Most organizations realize it’s no longer a matter of ‘If’ their organization will be breached but ‘When’ (if it hasn’t already happened and they just don’t know it). The key question is ‘How can you gain better visibility, sooner to the signs that your organization is under attack and respond quickly?’ In this webinar we will examine critical dynamics in the cyber threat landscape. We’ll also discuss how integrating security intelligence with a new and more efficient organizational approach to responding to cyber-attacks can enable organizations to detect and respond to these threats faster and with greater precision than ever before.
  • Black Hat & DefCon Briefing Black Hat & DefCon Briefing Chris Camejo Recorded: Aug 20 2014 60 mins
    Not going to Black Hat or DefCon this year? Don’t worry, we have you covered. Black Hat USA takes place August 2-7 and DefCon follows from August 7-10 in Las Vegas. Chris Camejo, NTT Com Security’s Director of Assessment Services, will give you an inside look at the show’s highlights, trends, and latest tools and techniques.

    In this session we’ll cover:
    · The latest trends in information security
    · What briefings had the most impact
    · The latest tools and techniques being used in the industry

    If you couldn’t make it to Black Hat or DefCon you won’t want to miss this webinar.
  • Using Risk Awareness to Drive Security Programs Using Risk Awareness to Drive Security Programs William Klusovsky Recorded: Jul 16 2014 46 mins
    According to our recently published Global Threat Intelligence Report, organizations are under attack every minute of every day. We need to figure out the appropriate balance of risk exposure within the context of our commercial objectives. When companies are able to take risk, they are able to grow and compete effectively. It’s all about understanding risk and making the best decisions for your organization. With threats changing, growing and moving, it’s important to consider risk exposure in the context of commercial objectives. This level of understanding allows you to identify and prioritize the security activities that need to take place, allowing you to move to a state of continuous risk management aligned to your business goals.    

    
In this session we’ll cover:
    
· Real world examples of risk management driving business forward

    · Prioritizing budget relative to risk and opportunity
    
· Addressing risk proactively and programmatically
    
· Aligning risk and GRC programs to business strategy
 

    
If you’re interested in helping move your organization to a state of managed risk and industry leadership, you won’t want to miss this webinar.  
  • Managing the Risk of APT's: Building a Resistant IT Infrastructure Managing the Risk of APT's: Building a Resistant IT Infrastructure Rich Boyer Recorded: May 7 2014 53 mins
    We are constantly reminded by the media of the real and potential threats of attacks. Any organization can be the target of an Advanced Persistent Threat (APT). Even those that may not consider themselves a target need to take into account the fact that information such as customer data, partner data, employee data, merger and acquisition activity, and resources shared with others may be targeted in an attack. Additionally, organizations must recognize that security weaknesses in their environment could be used as a base of attack against customers or business partners who may have information that is valuable to APT attackers.

    The NTT Global Threat Intelligence Report analyzed three billion attacks over the course of 2013 and has revealed valuable information, trends and insights surrounding APTs. The report emphasizes advanced techniques to detect, investigate and respond to the threats we face.

    Join this webinar where you will learn more about the practical steps organizations are taking to create a rational, proportional approach to tackle attacks. In this fast-paced, informative webinar, we will highlight report findings including:

    - Incident response case studies and their financial impact on the victim organizations
    - Information organizations can use to improve their operational security
    - Proper implementation, management and adjustment of proven control

    Don’t miss this opportunity to learn how to help reduce risk by avoiding threats and compress the mitigation timeline, significantly reducing loss exposure.
  • The Changing PCI Landscape: What does it mean for your organization? The Changing PCI Landscape: What does it mean for your organization? Chris Camejo Recorded: Apr 9 2014 60 mins
    With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • Securing Buy-in for Your Security Initiatives Securing Buy-in for Your Security Initiatives Michael Gabriel Recorded: Mar 12 2014 48 mins
    Many security initiatives go undone because of a lack of support from executive management to fund them, or push back from the business areas when trying to implement them. This presentation will look at the causes of these issues, and present strategies for overcoming them.