Όταν η ασφάλεια κινείται στο σύννεφο (.Cloud)

Christos Ventouris, Information Security Specialist
Το .Cloud είναι το επόμενο βήμα για την γρήγορη προστασία των υποδομών και την διατήρηση της Εμπιστευτικότητας, Ακεραιότητας και Διαθεσιμότητας της πληροφορίας. Στην παρουσίαση αυτή θα συζητήσουμε πως γίνεται η διαχείριση μιας λύσης ασφάλειας στο σύννεφο και το πώς μπορεί να το προστατεύσει η Symantec μέσω της λύσης της.
Jun 19 2012
19 mins
Όταν η ασφάλεια κινείται στο σύννεφο (.Cloud)
security cloud
Join us for this summit:

Webinars and videos

  • Live and recorded (1540)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Channel
  • Channel profile
Up Down
  • Symantec Internet Security Threat Report (ISTR) 2014 May 16 2014 9:00 am UTC 60 mins
    En 2013, les attaques de sécurité ont été encore plus complexes. Même si le focus reste sur les attaques ciblées (en augmentation de 91%), la cybercriminalité est malheureusement toujours d’actualité pour les entreprises, les cybercriminels ayant mené les attaques les plus préjudiciables jamais enregistrées (+ 62% de violation de données).

    Pour en savoir plus, inscrivez-vous à ce webcast. Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France du Symantec Internet Security Threat Report, rapport annuel sur les menaces et tendances de sécurité concocté par nos analystes du Symantec™ Global Intelligence Network.
  • Nuevo Symantec Internet Security Threat Report (ISTR) 2014 May 14 2014 8:00 am UTC 60 mins
    Cada año Symantec ofrece una presentación del Informe de Symantec sobre Amenazas a la Seguridad en Internet, no se lo pierda este año.

    El informe sobre amenazas a la seguridad en Internet ofrece un análisis y los aspectos generales de la actividad mundial anual de las amenazas. El informe se basa en los datos recopilados por la Global Intelligence Network, utilizados por los analistas de Symantec para identificar, analizar y ofrecer comentarios sobre las tendencias emergentes en ataques, actividad de códigos maliciosos, phishing y spam.

    Registrese ahora al Webcast para conocer de primera mano los resultados y ultimas tendencias que pueden afectar a las medidas a adoptar y a considerar en sus entornos.

    Conectese para que se lo explique el experto de symantec en directo y pueda hacer las preguntas que desee.
  • Symantec Internet Security Threat Report (ISTR) avslöjar May 13 2014 8:00 am UTC 60 mins
    2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 8 2014 8:00 am UTC 60 mins
    Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 12:00 pm UTC 60 mins
    Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 8:00 am UTC 60 mins
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Cyber: The Catalyst to Transforming your Security Programme Recorded: Apr 2 2014 47 mins
    1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Partner with an information security leader for your email security. Recorded: Jul 17 2013 35 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries. Spam, phishing, and malware data is captured through a variety of sources. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers.
    This intelligence enables us to build protection technologies that can be leveraged across our products to ensure that we protect all of our customers’ people and information.
    In this webcast we will highlight some of the latest Internet attack trends and explain why you should partner with an information security leader for your email security.
  • Is cloud security right for your business? Recorded: Jul 16 2013 37 mins
    Symantec provides email and web security as a virtual appliance, a hardware appliance or a cloud service. We have expertise in all deployment platforms so, rather than driving you to purchase a specific product, we can help you determine which is best for you.
    During this 30 minute webcast we will help you to understand what questions you should be asking yourself to determine whether a move to the cloud is the right move for your business.
  • Symantec Cyber Week: La Protezione dei sistemi critici Recorded: Jun 27 2013 60 mins
    Perchè i Server? La Protezione dei sistemi critici
    La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la conformità è l’unico strumento per per ridurre il rischio in caso di attacco
    In questo webcast approfondiremo i vantaggi delle soluzione end point protection ed anche di server hardening
    Partecipa a questo webcast per pianificare al meglio la tua politica di Cyber Security.
  • Symantec Cyber Week: Le politiche di controllo Recorded: Jun 21 2013 39 mins
    Le politiche di controllo servono? Quali?
    Non pensare ad una politica di controllo, compreso il monitoraggio delle vulnerabilità, della correlazione degli eventi di sicurezza, e delle procedure di risposta in caso di attacco rende inefficaci gli investimenti fatti in sicurezza
    Se si vuole davvero ridurre il rischio di un attacco informatico, ogni organizzazzione deve monitorare lo stato della propria sicurezza con il corrispettivo rischio, deve avere una fonte di intelligence per una visibilità su cosa stia accadendo in tempo reale
    Partecipa a questo webcast per valutare quanto un’attività di intelligence sia utile realmente al tuo business.
  • Hardening de serveur ou comment diminuer rapidement vos risques Recorded: Jun 21 2013 42 mins
    De par la nature des informations que les serveurs hébergent, les services pour lesquels ils sont configurés, leurs contraintes d’accessibilité, il est temps de repenser la sécurité des serveurs et leur mise en conformité pour limiter les risques en cas d’attaque. Faites le point avec nos experts et découvrez les solutions adaptées à ces problématiques spécifiques.
  • Symantec Cyber Week: La Protezione degi End Point Recorded: Jun 20 2013 41 mins
    Gli End Point: tutto quello che devi sapere per proteggerli
    La sicurezza nel suo punto cardine: contrastare il malware e proteggere i dati
    Non è una novità che i codici malevoli siano ogni giorno sempre più complessi. Un partner come Symantec sa come pianificare una strategia di difesa. Da una soluzione fondamentale come Symantec EndPoint Protection alle funzionalià di crittografia, per una protezione del dato a tutto tondo
    Partecipa a questo webcast; scopri cosa ti da di più Symantec.
  • Symantec Cyber Week: Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH Recorded: Jun 18 2013 37 mins
    Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH
    Per proteggere le aziende da attacchi informatici, è importante capire come operano gli attacanti. Questo webcast descrive l’anatomia di un attacco nelle sue 5 fasi: Reconnaissance, Incursion, Discovery, Capture ed Exfiltration
    Verranno inoltre analizzate le principali tecniche impiegate e le soluzioni per prevenirle e/o contrastarle oltre al relativo impatto sul business (rilevato dalla ricerca “Cost of a Data Breach 2013”)
    Partecipa a questo webcast per vedere come si sono evolute le cyber minacce e come stanno influenzando le realtà produttive.
  • Symantec Cyber Week: Cosa sta DAVVERO succedendo? Il Security Threat Report Recorded: Jun 17 2013 45 mins
    Cosa sta DAVVERO succedendo? Il Security Threat Report
    Il Security Threat Report fornisce una panoramica e un'analisi di attività delle minacce a livello mondiale nel 2012. Dai dati della Global Intelligence Network, esperti di Symantec analizzano le tendenze emergenti negli attacchi, nelle vulnerabilità e negli obiettivi.
    Inoltre, l’ultima ricerca “Cost of a Data Breach Report 2013” traccerà gli impatti economici per le organizzazioni nel caso di attacchi informatici
    Partecipa a questo webcast per avere un aggiornamento sul panorama delle minacce e della sicurezza nel 2013 e sulle conseguenze nel business.
  • Supervision pour une cyber vision Recorded: Jun 14 2013 40 mins
    Pour limiter les risques d’une cyber-attaque, la politique de sécurité doit comprendre la mise en place d’une politique de supervision incluant la surveillance des vulnérabilités, la corrélation des événements de sécurité, les procédures de réponse en cas d’attaque… Lors de ce webcast, nous vous invitons à faire le point sur les solutions de SOC, SSIEM, Services Managés et leurs bénéfices.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • Transformational smart cities: cyber security and resilience 10:00 BST/11:00 CET Recorded: Jun 11 2013 52 mins
    Smart cities are on the increase worldwide, and especially within Europe there are many initiatives stimulated by the EC and the national governments. Local administrators and policy makers will be increasingly driven to make their cities competitive in order to attract businesses, talent and taxpayers, and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.
    Smart city deployments will involve multi-faceted developments, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology including critical and complex ICT implementations.
    Choosing reputable, experienced thought leaders as partners in conceiving such complex developments is an important step in the right direction towards building resilient smart cities for the twenty-first century.

    Attend our webcast to learn more!
  • Les 5 étapes d’une cyber-attaque Recorded: Jun 7 2013 33 mins
    Afin de protéger votre entreprise des cyber-attaques, il est important de comprendre comment les attaquants opèrent. Lors de ce webcast, nous vous proposons d’analyser les 5 phases d’une attaque (reconnaissance, incursion, découverte, capture, exfiltration), les principales techniques employées, ainsi que les solutions adaptées à chaque phase.
  • Mobile Threats (Internet Security Threat Report) Recorded: Jun 6 2013 60 mins
    Did you know that 32% of mobile malware is aimed at stealing information?
    The rapid increase in mobile working, the demand for higher levels of productivity and the growing trend of Bring Your Own Device puts you under new pressure, and exposes your critical business data to additional risk.
    Learn how solutions for enterprise mobility from Symantec can help you to enable, manage and secure mobile endpoints, apps and data.
    By attending our webinar we'll show you how the solutions for enterprise mobility protect business- critical data and apps – wherever they are accessed, whatever the smartphone, tablet or other device.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Όταν η ασφάλεια κινείται στο σύννεφο (.Cloud)
  • Live at: Jun 19 2012 8:00 am
  • Presented by: Christos Ventouris, Information Security Specialist
  • From:
Your email has been sent.
or close
You must be logged in to email this