Browse communities
Browse communities
Presenting a webinar?

Step 1 - Creating and Managing a Cybersecurity Policy: Tips for the SMB

Stephen Cobb, Security Evangelist, ESET
SMB Cybersecurity Challenge - Webcast Series Part 2

Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vulnerable SMBs like yours really are
- You can establish a cybersecurity policy for your organization
- You can to defend your company – and its employees, partners and customers – against online attacks.

Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyberattacks. According to the U.S. Chamber of Commerce’s publication, Commonsense Guide to Cyber Security for Small Businesses, “This assumption is both inaccurate and dangerous. Attacks on information systems operated by small and midsize companies are growing rapidly and are having a severe impact on business operations… Neither the size of your company nor the type of your business guarantees protection from an attack. If you use the Internet, you are vulnerable.”

Speakers: Stephen Cobb, Security Evangelist, ESET
Moderator: Steve Kovsky, Technology Journalist and Director of Community Outreach , Securing Our eCity
Oct 12 2011
57 mins
Step 1 -  Creating and Managing a Cybersecurity Policy: Tips for the SMB
  • Live and recorded (2028)
  • Upcoming (53)
  • Date
  • Rating
  • Views
  • If you run more then one solution when backing up and recovering your data it can be hard to keep track of which solution does what. Check out how our single solution can fill in all the gaps and make it less complicated to manage multiple solutions at one time.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Inflexible, constrained, locked in, dependent are all terms we hear used to talk about the IT solutions being used in today’s datacenters. Datacenters are complex with a variety of physical, virtual, and cloud platforms for both computing and storage. Solutions that promise to make a datacenter more manageable, often lock you in to specific platforms or singular processes.

    Join this session with Andy Ebbs to learn about the top 10 technical capabilities needed to ensure that you are able to freely move your workloads to run on the best platform, and protect them wherever they are running.
  • The ability of public sector organizations to accomplish their missions depends on reliable connectivity. Now, more than ever, these network connections must be mobile, rugged, and secure – but most of all, they must be flexible.

    At the federal, state, and local level, as well as at institutions of higher learning, the opportunities to gain efficiency and manage budgets through mobile connectivity are increasing exponentially. Cradlepoint enables the public sector to quickly implement networking solutions that are powerful, flexible, easy to manage, and easy to scale; without busting tight budgets.

    Join us for a webinar to learn how Cradlepoint solutions make it easy for public sector organizations to adapt their networks to take advantage of 3G/4G LTE wireless to provide the strongest signal at the best price in any given location.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • IRM is leading the debate on risk culture. Drawing upon the wealth of practical experience and expert knowledge across the institute, we have developed guidance for organisations wanting a greater understanding of their own risk culture and practical tools that can be applied to drive change.

    As seen in the business press every day, embedding risk management into an organisation to the extent that it reliably makes a difference is a difficult task. To achieve this, boards must keep how to manage risks high on their agenda, and to continue asking themselves, whether they have the right culture, people and processes.

    What do we mean by risk culture?

    Risk culture is a term describing the values, beliefs, knowledge, attitudes and understanding about risk shared by a group of people with a common purpose, in particular the employees of an organisation. This applies to all organisations from private companies, public bodies, governments to not-for-profits.

    What does a good risk culture look like?

    An effective risk culture is one that enables and rewards individuals and groups for taking the right risks in an informed manner.
  • With over half of companies not feeling well enough prepared for an IT disaster according to recent research, Ian Daly of Plan B Disaster Recovery will be sharing his best practices on how to build a DR solution you can trust. In this webinar we’ll cover:

    - What counts as an IT disaster?
    - What are the common causes?
    - How can you better prepare for an IT disaster?
    - Testing – what should you be testing and how often?
    - What level of reliability should you be striving to achieve?
    - How to maintain trust in your disaster recovery solution
  • James McAlister has been developing and facilitating exercises for over 30 years. He was the lead author for the BCI Good Practice Guidelines 2013 Chapter 06: Validation, which focuses on exercising. The webinar will introduce an exercise model and simple techniques to enable participants to conduct their own effective exercises.
  • Channel
  • Channel profile
  • What Keeps you up at Night as a Small or Medium Business IT manager? Recorded: Jul 11 2012 44 mins
    David Ditzenberger – Vice President, Savitz, Jeff Savitz – Founder and CEO, Savitz, and Don Lewis, Product Marketing, ESET
    What areas of security risks concern you the most? What possible damages from a cybercrime attack keep you up at night? What are the most important aspects of endpoint security?

    Learn what concerns IT managers have when it comes to the security of your business and how to get a peace of mind by getting the right security solution for you.

    Join Savitz Research Insights Team as they present their findings on the latest cybersecurity issues facing the SMB IT Manager.
  • Announcing ESET Endpoint Solutions Recorded: Jun 27 2012 47 mins
    Brandon Stigers, Director of Learning Development, ESET, ESET Product Marketing Team
    Learn how ESET’s next generation of endpoint security products make protecting and controlling your business systems easier and more cost-effective. Built using the award-winning ESET NOD32® technology. ESET Endpoint Antivirus and ESET Endpoint Security aren’t just updates to existing products, but entirely new ways of approaching your endpoint security.

    Feature highlights:

    - Web control
    - Data access control
    - Remote management and reporting
  • 10 Ways to Tell If It's Time to Change Your Anti-Virus Software Recorded: Jun 6 2012 59 mins
    Pete Streips, President, Network Security Group, ESET Research Team
    If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution?

    • When it performs scans it slows our systems to a crawl

    • It creates too many alerts on files that aren’t malicious

    • It is hard to manage across all our platforms and devices

    • Our users want to turn it off because it is so annoying

    If so, join Peter Streips, Network Security Group (ESET’s Gold Partner) President and ESET researchers for a panel discussion and learn why it’s time to change your antivirus solution.
  • Truth or Spin in AV Testing? Recorded: May 30 2012 59 mins
    Jon Friedman, Tech Target Aryeh Goretsky, ESET,Righard Zwienenberg , ESET
    Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks. But an educated evaluator can both avoid the snares of misleading tests and find a surprising number of useful third party tests.
  • Are SMB’s targets for Cyber Criminals? Recorded: Apr 11 2012 60 mins
    Charles Kolodgy, IDC Security Products Research Vice President
    The Internet is a force multiplier, allowing businesses of all sizes to reach more customers, better service those customers and ultimately be more competitive. By utilizing the Internet, many small and medium businesses can be much more successful. However technological advances cut both ways.
    While improved connectivity, communication, and Web presence provide benefits to small and medium businesses (SMBs), it can also resulted in an increase of Internet based security threats and expose the business to criminal elements that they wouldn't normally encounter. If customers can find you so can cybercriminals. The most damaging cyber attack against small and medium businesses is when cybercriminals implant malware on a company's computers, and use that malware to gain access to the company's bank accounts via online-banking.
    This webcast is designed to bring the growing cyberthreats and protection strategies to the attention of executives and employees of small and medium enterprises. In this webcast, IDC's analyst, using survey data, recent threat data, and insight, will provide the following information:
    * Highlight threats and successful attacks directed towards SMBs
    * Identify the special needs for SMB cybersecurity
    * Explain companies' existing attitudes around cybersecurity
    * Discuss the key security technologies SMBs should consider
    * Highlight what features and support companies should look for from their security vendors
  • Creating and Managing a Cyber Security Policy: Tips for the SMB Recorded: Mar 21 2012 56 mins
    Stephen Cobb, Security Evangelist, ESET
    Join Stephen Cobb, Security Evangelist at ESET to discover how:
    - Vunerable SMB's like yours really are
    - You can establish a cyber security policy for your organization
    - You can defend your company-and it's employees partners and customers against online attacks
    Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
  • Security at the Sharp End: Strategies to Repel Relentless Attackers Recorded: Feb 8 2012 60 mins
    Stephen Cobb, CISSP, Security Evangelist,
    Targeting of corporate and consumer data and devices by criminals and rogue states is well-funded and likely to persist for some time. Hardened operating systems, firewalls, IDS, and secure application coding are leading attackers to target endpoints, defined as people with devices, not devices alone. Analyzing large amounts of endpoint data we map current and emerging threats, both digital and analog, to provide a set of best practices for defeating attackers.
  • IT's Role in a Changing Threat Landscape Recorded: Jan 18 2012 62 mins
    Forrester Analyst, Chenxi Wang, Ph.D. and ESET's Research team
    How can IT security adapt to fight constantly mutating cyber threats?

    As the adversarial relationship between information security professionals and malicious cyberactors intensifies, the security gap between new attack methods and traditional controls will grow in favor of the attackers.

    Cyberattacks have become multidimensional in their complexity and sophistication.

    Join Forrester Analyst, Chenxi Wang, Ph.D. to:
    - Look at the new threats that corporate IT will face in 2012
    - Discuss the role of IT in the face of such threats
    - Review effective investment and risk management strategies to get ahead of the cyberattacks
    - Explore strategies to invest in preventative technologies, not just on reactive controls

    More specifically, we will dive into strategies to build a solid layered defense, not just patch-work products. For example, going from firewalls and IDS to log management, building DLP capabilities in your network, and investing in strong host-based controls would help you raise the bar significantly and give you advanced capabilities to identify malicious behaviors before they wreak havoc.

    Panel Discussion Points with Forrester and ESET's Research team:
    - What sort of new threats (or increase of existing threats) can be expected in 2012?
    - What role does the commoditization of IT have, if any, in those threats?
    - What role does the social media have, if any, in those threats?
    - What can IT departments do to reduce their threat surface profile?

    Followed by Q&A session
  • Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT Recorded: Dec 7 2011 50 mins
    Cameron Camp, ESET
    With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?
  • Antivirus Software: Understand the Detection Methods Before You Buy Recorded: Nov 15 2011 56 mins
    Sean Michael Kerner, Sr. Editor, InternetNews.com & Brandon Stigers, Director of Learning & Development, ESET
    Before you choose an antivirus solution it is important to understand how it goes about detecting malware in the first place.

    Join us as we discuss:
    - Security in the news
    - Modern threat categories and attack vectors
    - Endpoint risks, infection methods, payloads
    - Detection with signatures and heuristics
    - Zero day risk
    - Technologies that protect removable storage devices
    - Best practices
  • Step 3 - The Impact of SMB Security on Our Nation's Critical Infrastructure (CI) Recorded: Oct 26 2011 48 mins
    Sempra Energy, Wells Fargo Insurance, U.S. National Institute of Standards and Technology
    SMB Cybersecurity Challenge - Webcast Series Part 4


    Join a blue-ribbon panel of experts from government and business to learn:
    - How U.S. agencies are collaborating with business to solve the SMB security threats
    - Recommendations and solutions to keep your SMB organizations safe from cyber crime attack
    - How your business can create and implement an employee cybersecurity awareness program itself

    In a recent speech at the Massachusetts Institute of Technology (MIT), Department of Homeland Security (DHS), Secretary Janet Napolitano asked the question, “How do we secure our nation's critical infrastructure when the vast majority of it is in private hands?” It’s precisely why DHS is partnering with agencies such as the Commerce Department’s National Institute of Standards and Technology (NIST), and with private-sector companies in key areas such as finance, energy, transportation and others. But the real challenge will be to help our small and midsize businesses improve security, which often lack the resources and experience to protect themselves against today's slick, savvy cybercriminals.
  • Step 2 - Securing Your Network:Safeguarding Business Data-at Work & at Home Recorded: Oct 19 2011 56 mins
    Mark Culp, Supervising Special Agent, FBI; Glenn E. Jacobs, Cybersecurity Expert, Author & Consultant
    SMB Cybersecurity Challenge - Webcast Series Part 3

    Join FBI Supervising Special Agent, Mark Culp, and Author Glenn Jacobs, as they provide your business:

    >> Tips and best practices to prevent an attack from occurring
    >> Important steps to take when a cyber break-in has been discovered
    >> How to bring perpetrators to justice and recoup your losses

    When it comes to being a victim of cybercrime, size does matter: “The sting of a cybercrime is not felt equally across the board. A small company may NOT be able to survive even one significant cyberattack.” This chilling testimony to the extreme vulnerability of small and midsize businesses was delivered to the Senate Judiciary Committee’s Subcommittee on Crime and Terrorism this spring by the FBI’s Cyber Division Assistant Director Gordon M. Snow.
    The implications to your business are clear. The question is, what can you do about it?

    NOTE: The first 50 live attendees will receive a free PDF copy of speaker Glenn Jacobs new book, Is Your Computer Bugged – Protecting Your Computer from Cyber Attack.
  • Step 1 - Creating and Managing a Cybersecurity Policy: Tips for the SMB Recorded: Oct 12 2011 57 mins
    Stephen Cobb, Security Evangelist, ESET
    SMB Cybersecurity Challenge - Webcast Series Part 2

    Join Stephen Cobb, Security Evangelist at ESET to discover how:
    - Vulnerable SMBs like yours really are
    - You can establish a cybersecurity policy for your organization
    - You can to defend your company – and its employees, partners and customers – against online attacks.

    Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyberattacks. According to the U.S. Chamber of Commerce’s publication, Commonsense Guide to Cyber Security for Small Businesses, “This assumption is both inaccurate and dangerous. Attacks on information systems operated by small and midsize companies are growing rapidly and are having a severe impact on business operations… Neither the size of your company nor the type of your business guarantees protection from an attack. If you use the Internet, you are vulnerable.”

    Speakers: Stephen Cobb, Security Evangelist, ESET
    Moderator: Steve Kovsky, Technology Journalist and Director of Community Outreach , Securing Our eCity
  • Escalating Cyberthreats: Simple Steps to Secure Your SMB Recorded: Oct 5 2011 49 mins
    Liz Fraumann, Securing Our eCity; Naresh Lachmandas, CIO, General Atomics
    SMB Cybersecurity Challenge - Webcast Series Part 1

    Cybercrooks have changed the game. Lone hackers craving attention have been replaced by international criminal networks with vast resources and patience, and to them, your small business looks like easy prey. But there’s also some good news: Securing your small business is a lot easier than you thought.

    Join our panel of experts, including Naresh Lachmandas, CIO, General Atomics, as the panel discusses the changing nature of today’s cyberthreats, how to identify your business potential for attack, and the simple steps you can take to protect your organization from electronic intruders.
  • How to Ensure Real-Time Threat Detection Recorded: Sep 14 2011 59 mins
    Frost & Sullivan Analyst along with ESET Researcher
    As part of the Threat Management Summit ESET along with Frost & Sullivan will discuss Real-time Threat Detection.

    Frost & Sullivan: Making the Case for Endpoint Security

    The headline grabbing attacks against firms like RSA, Epsilon, Lockheed Martin, and others have brought a great deal of attention to data protection and tools to protect the data itself. As many organizations look at moving data and services to the cloud, organizations are focusing their energies on securing cloud based services. Unfortunately, focus on the endpoint seems to be waning, leaving a large hole in many organization's defense.

    Rob Ayoub, CISSP and Research Director for Frost & Sullivan's Information Security Practice will discuss why protecting the endpoint is still critical in today's changing threat landscape. The endpoint is still the last connection to the end user and without adequate protections against the latest threats, corporate data is still at risk, even with safeguards in place.

    ESET: The Best Defense is a Good Offense

    With the pace of emerging threats, it’s not good enough to know about the last attack to hit your company, you have to be prepared for the next, with always-on, self-learning, adaptive technology leading your security stance.
  • Protecting Your SMB: Selecting the Right Antivirus & Internet Security Solution Recorded: Aug 24 2011 50 mins
    ESET Team - Product Marketing and Systems Engineers
    Get the information you need to make the right decision through this presentation followed by a 30 minute panel available for your questions about ESET products, services and solutions.

    >> Effectiveness/Coverage: What threats does the solution eliminate? Does the solution address the immediate concerns of zero-day attacks while maintaining a legacy database to avoid the re-introduction of known viruses?
    >> Performance: Does the solution consume resources that impact your users in order to meet fast scanning requirements or operate in the background to minimize the impact on your users. Is the scanning configurable to achieve a balance between speed and security?
    >> Environmental fit and usage: How well does the anti-virus utility conform to the platform, operating system and application environment that you have created for your organization?
    >> Management efficiency: How easily and comprehensively can the anti-virus solution be managed across the business and IT infrastructure
    >> Services: What added value can the vendor deliver to help an organization remove existing viruses or replace an existing solution to another
  • Protecting Your Multi-Platform Network: The New Wave of Attacks Recorded: Jun 16 2011 52 mins
    ICSA Labs, Anti-Malcode Program Manager - Andy Hayter
    The proliferation of multiple type’s of devices across businesses offers many benefits; desktop computers running both Windows or Mac OSX, tablets and mobile phones. The advantages and productivity are obvious. What is not so obvious, till it is too late, is how to protect your business from malware attacks?

    During this session of ESET's Cybersecurity Masters series you will hear from ICSA Labs, Anti-Malcode Program Manager, Andy Hayter who will share:
    – How to protect your business across multiple platforms
    – How to streamline IT management across varied OS
    – When trying to find a product to protect multiple platforms - Does product certification matter?

    Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.
  • Key Considerations for Selecting Endpoint Security Solutions Recorded: May 24 2011 60 mins
    Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
    Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

    Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

    To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

    • The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
    • Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
    • High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
  • Key Considerations for Selecting Endpoint Security Solutions Recorded: May 18 2011 60 mins
    Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
    Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

    Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

    To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

    • The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
    • Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
    • High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
  • The New Threatscape: What Security Managers Need to Know Recorded: Apr 28 2011 59 mins
    Forrester, Vice President - Jonathan Penn | ESET, Director of Technical Education - Randy Abrams
    Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment.

    Forrester Research: Understanding and adapting to the New Threat Landscape

    * What you need to know about the changing nature of the threat landscape
    * Which long-held security principles are outdated, and which ones should be adhered to
    * Where to invest to maximize the impact of your efforts while minimizing risk

    ESET: The New Threatscape - What hasn't changed?

    * Recognizing old attacks in the context of new technologies
    * Addressing the constants; Security software, patch management, password management, encryption, education

    What is the Cybersecurity Masters Series?
    ESET's Cybersecurity Masters webinar series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Register now >>
Fast, light and proactive protection from server to endpoint
Threats are evolving by the second. It's no longer just about viruses. Spyware, trojans, worms, rootkits, bots and phishing attacks are all on the rise. Malware writers are constantly reworking their code to evade security defenses.

The ESET Channel features resources to understand the nature of these evolving threats, their impact on your business, and why proactive protection is so important.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Step 1 - Creating and Managing a Cybersecurity Policy: Tips for the SMB
  • Live at: Oct 12 2011 5:00 pm
  • Presented by: Stephen Cobb, Security Evangelist, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this