Cost of a Data Breach: How Much Can You Afford to Lose?

Mike Smart, EMEA Product Marketing, Symantec and Jessica Schönfeld, EMEA Product Marketing, Symantec.
•According to the latest "Cost of a Data Breach Study," conducted by the Ponemon Institute and sponsored by Symantec, breaches now cost organizations $5.5 million on average. Negligent insiders and malicious attacks are the top causes. The study also found that organizations with a CISO responsible for data protection can reduce breach costs by up to 35 percent.

During this webcast, you will learn best practices for avoiding a breach by: Discovering and monitoring high-risk data and users.
•Educating employees on information protection policies.
•Implementing an integrated security solution that includes data loss prevention, encryption and two-factor authentication.
Jul 26 2012
45 mins
Cost of a Data Breach: How Much Can You Afford to Lose?
Join us for this summit:

Webinars and videos

  • Live and recorded (1533)
  • Upcoming (38)
  • Date
  • Rating
  • Views
  • David Moule, Manager of IT Security Operations at Allied Irish Bank, discusses how AIB has leveraged Modulo Risk Manager™ to mature their Vulnerability Management process, remedy “on the fly” VM needs, and successfully navigate an internal audit.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.

    Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.

    In this webinar, you will learn:
    1. The challenges associated with deploying storage for VDI
    2. How current solutions attempt to solve these problems
    3. How to save money by supporting VDI and other application workloads on the same storage
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • SQL is a powerful language that you will learn to use to a greater extent in this talk! Join us to explore some of the less well-known features of SQL and see how they can help in some practical situations. We will also look at some common mistakes and misconceptions and discuss ways of avoiding them. Among the topics:
    - tricks with date and time values
    - use of common table expression and recursive queries
    - use of data change tables
    - use of nested tables
    - use of the MERGE statement
    - and more.

    Nick Ivanov is presenting this talk based on his consulting experience with many customers to maximize use of IBM DB2 and other products; move applications to DB2; and tune database and query performance.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Join us for the live webinar on April 10th at 11:30AM ET - 8:30AM PT to discuss the importance of business class file sync, share and collaboration and why the storage team should lead the effort. The webinar will feature George Crump, Founder and Lead Analyst at Storage Switzerland and Soonr’s VP of Products and Security Ahmet Tuncay. The key points they will discuss are:
    1.Why IT Can’t Ignore The File Sync and Share Demand
    2.What to Look For in a Business Class File Sync and Share Product
    3.Why Empowering Collaboration is a Key Next Step for File Sync and Share

    All Pre- registrants will receive an exclusive copy of Storage Switzerland’s latest white paper, “Are File Servers Holding Users Back?”
  • Join this webinar and learn why consistency is the hallmark of an effective, agile organisation. With thousands of moving parts, ensuring that every user, every system is being managed consistently is critical. This webinar will show you how a best practice IT systems management software effectively defines, manages, applies and enforces IT policies across groups of machines.

    A state-of-the art Policy Management system streamlines the process of creating, setting and remotely applying IT policies to groups of systems across a distributed organisation. Administrators need to be able to view all policies from a single dashboard, customise them and assign them based on organisation, group, machine type, platform or any dynamic view of machines to ensure all systems are in compliance. By automating management by policies and enforcement, administrators can then take immediate action to remediate any system that is not in compliance.
    Benefits of a modern Policy Management system are:

    • Ensure distributed systems are in compliance with IT policies or recurring services
    • Streamline the process of applying and updating policies to multiple machines based on organisation, group, department or dynamic view
    • Achieve greater confidence that distributed systems are secure and in compliance
    • Manage policy enforcement of multiple groups of machines, applying varying and nested policies depending on security risk, business use or service level
    • New machines can automatically inherit policy settings without any intervention
  • Channel
  • Channel profile
Up Down
  • Symantec Internet Security Threat Report (ISTR) 2014 May 16 2014 9:00 am UTC 60 mins
    En 2013, les attaques de sécurité ont été encore plus complexes. Même si le focus reste sur les attaques ciblées (en augmentation de 91%), la cybercriminalité est malheureusement toujours d’actualité pour les entreprises, les cybercriminels ayant mené les attaques les plus préjudiciables jamais enregistrées (+ 62% de violation de données).

    Pour en savoir plus, inscrivez-vous à ce webcast. Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France du Symantec Internet Security Threat Report, rapport annuel sur les menaces et tendances de sécurité concocté par nos analystes du Symantec™ Global Intelligence Network.
  • Nuevo Symantec Internet Security Threat Report (ISTR) 2014 May 14 2014 8:00 am UTC 75 mins
    Cada año Symantec ofrece una presentación del Informe de Symantec sobre Amenazas a la Seguridad en Internet, no se lo pierda este año.

    El informe sobre amenazas a la seguridad en Internet ofrece un análisis y los aspectos generales de la actividad mundial anual de las amenazas. El informe se basa en los datos recopilados por la Global Intelligence Network, utilizados por los analistas de Symantec para identificar, analizar y ofrecer comentarios sobre las tendencias emergentes en ataques, actividad de códigos maliciosos, phishing y spam.

    Registrese ahora al Webcast para conocer de primera mano los resultados y ultimas tendencias que pueden afectar a las medidas a adoptar y a considerar en sus entornos.

    Conectese para que se lo explique el experto de symantec en directo y pueda hacer las preguntas que desee.
  • Symantec Internet Security Threat Report (ISTR) avslöjar May 13 2014 8:00 am UTC 75 mins
    2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 8 2014 8:00 am UTC 75 mins
    Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 12:00 pm UTC 75 mins
    Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 8:00 am UTC 60 mins
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Cyber: The Catalyst to Transforming your Security Programme Recorded: Apr 2 2014 47 mins
    1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Partner with an information security leader for your email security. Recorded: Jul 17 2013 35 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries. Spam, phishing, and malware data is captured through a variety of sources. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers.
    This intelligence enables us to build protection technologies that can be leveraged across our products to ensure that we protect all of our customers’ people and information.
    In this webcast we will highlight some of the latest Internet attack trends and explain why you should partner with an information security leader for your email security.
  • Is cloud security right for your business? Recorded: Jul 16 2013 37 mins
    Symantec provides email and web security as a virtual appliance, a hardware appliance or a cloud service. We have expertise in all deployment platforms so, rather than driving you to purchase a specific product, we can help you determine which is best for you.
    During this 30 minute webcast we will help you to understand what questions you should be asking yourself to determine whether a move to the cloud is the right move for your business.
  • Symantec Cyber Week: La Protezione dei sistemi critici Recorded: Jun 27 2013 60 mins
    Perchè i Server? La Protezione dei sistemi critici
    La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la conformità è l’unico strumento per per ridurre il rischio in caso di attacco
    In questo webcast approfondiremo i vantaggi delle soluzione end point protection ed anche di server hardening
    Partecipa a questo webcast per pianificare al meglio la tua politica di Cyber Security.
  • Symantec Cyber Week: Le politiche di controllo Recorded: Jun 21 2013 39 mins
    Le politiche di controllo servono? Quali?
    Non pensare ad una politica di controllo, compreso il monitoraggio delle vulnerabilità, della correlazione degli eventi di sicurezza, e delle procedure di risposta in caso di attacco rende inefficaci gli investimenti fatti in sicurezza
    Se si vuole davvero ridurre il rischio di un attacco informatico, ogni organizzazzione deve monitorare lo stato della propria sicurezza con il corrispettivo rischio, deve avere una fonte di intelligence per una visibilità su cosa stia accadendo in tempo reale
    Partecipa a questo webcast per valutare quanto un’attività di intelligence sia utile realmente al tuo business.
  • Hardening de serveur ou comment diminuer rapidement vos risques Recorded: Jun 21 2013 42 mins
    De par la nature des informations que les serveurs hébergent, les services pour lesquels ils sont configurés, leurs contraintes d’accessibilité, il est temps de repenser la sécurité des serveurs et leur mise en conformité pour limiter les risques en cas d’attaque. Faites le point avec nos experts et découvrez les solutions adaptées à ces problématiques spécifiques.
  • Symantec Cyber Week: La Protezione degi End Point Recorded: Jun 20 2013 41 mins
    Gli End Point: tutto quello che devi sapere per proteggerli
    La sicurezza nel suo punto cardine: contrastare il malware e proteggere i dati
    Non è una novità che i codici malevoli siano ogni giorno sempre più complessi. Un partner come Symantec sa come pianificare una strategia di difesa. Da una soluzione fondamentale come Symantec EndPoint Protection alle funzionalià di crittografia, per una protezione del dato a tutto tondo
    Partecipa a questo webcast; scopri cosa ti da di più Symantec.
  • Symantec Cyber Week: Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH Recorded: Jun 18 2013 37 mins
    Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH
    Per proteggere le aziende da attacchi informatici, è importante capire come operano gli attacanti. Questo webcast descrive l’anatomia di un attacco nelle sue 5 fasi: Reconnaissance, Incursion, Discovery, Capture ed Exfiltration
    Verranno inoltre analizzate le principali tecniche impiegate e le soluzioni per prevenirle e/o contrastarle oltre al relativo impatto sul business (rilevato dalla ricerca “Cost of a Data Breach 2013”)
    Partecipa a questo webcast per vedere come si sono evolute le cyber minacce e come stanno influenzando le realtà produttive.
  • Symantec Cyber Week: Cosa sta DAVVERO succedendo? Il Security Threat Report Recorded: Jun 17 2013 45 mins
    Cosa sta DAVVERO succedendo? Il Security Threat Report
    Il Security Threat Report fornisce una panoramica e un'analisi di attività delle minacce a livello mondiale nel 2012. Dai dati della Global Intelligence Network, esperti di Symantec analizzano le tendenze emergenti negli attacchi, nelle vulnerabilità e negli obiettivi.
    Inoltre, l’ultima ricerca “Cost of a Data Breach Report 2013” traccerà gli impatti economici per le organizzazioni nel caso di attacchi informatici
    Partecipa a questo webcast per avere un aggiornamento sul panorama delle minacce e della sicurezza nel 2013 e sulle conseguenze nel business.
  • Supervision pour une cyber vision Recorded: Jun 14 2013 40 mins
    Pour limiter les risques d’une cyber-attaque, la politique de sécurité doit comprendre la mise en place d’une politique de supervision incluant la surveillance des vulnérabilités, la corrélation des événements de sécurité, les procédures de réponse en cas d’attaque… Lors de ce webcast, nous vous invitons à faire le point sur les solutions de SOC, SSIEM, Services Managés et leurs bénéfices.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • Transformational smart cities: cyber security and resilience 10:00 BST/11:00 CET Recorded: Jun 11 2013 52 mins
    Smart cities are on the increase worldwide, and especially within Europe there are many initiatives stimulated by the EC and the national governments. Local administrators and policy makers will be increasingly driven to make their cities competitive in order to attract businesses, talent and taxpayers, and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.
    Smart city deployments will involve multi-faceted developments, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology including critical and complex ICT implementations.
    Choosing reputable, experienced thought leaders as partners in conceiving such complex developments is an important step in the right direction towards building resilient smart cities for the twenty-first century.

    Attend our webcast to learn more!
  • Les 5 étapes d’une cyber-attaque Recorded: Jun 7 2013 33 mins
    Afin de protéger votre entreprise des cyber-attaques, il est important de comprendre comment les attaquants opèrent. Lors de ce webcast, nous vous proposons d’analyser les 5 phases d’une attaque (reconnaissance, incursion, découverte, capture, exfiltration), les principales techniques employées, ainsi que les solutions adaptées à chaque phase.
  • Mobile Threats (Internet Security Threat Report) Recorded: Jun 6 2013 60 mins
    Did you know that 32% of mobile malware is aimed at stealing information?
    The rapid increase in mobile working, the demand for higher levels of productivity and the growing trend of Bring Your Own Device puts you under new pressure, and exposes your critical business data to additional risk.
    Learn how solutions for enterprise mobility from Symantec can help you to enable, manage and secure mobile endpoints, apps and data.
    By attending our webinar we'll show you how the solutions for enterprise mobility protect business- critical data and apps – wherever they are accessed, whatever the smartphone, tablet or other device.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cost of a Data Breach: How Much Can You Afford to Lose?
  • Live at: Jul 26 2012 12:00 pm
  • Presented by: Mike Smart, EMEA Product Marketing, Symantec and Jessica Schönfeld, EMEA Product Marketing, Symantec.
  • From:
Your email has been sent.
or close
You must be logged in to email this