The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
Our Hunter Spotlight series kicks off with Alan Orlikoski. From his 16+ years of security experience, Alan will share:
• Organizational strategies that work for both hunters and SOC managers
• How to create and sustain effective hunting teams
• Best practices and tools in the field
About the hunter:
Alan Orlikoski is a Security Engineer and Incident Responder with over 17 years of experience. He analyzes and tests existing incident response plans, conducts forensic investigations and provides incident response and forensics training. Alan has an extensive computer forensics background and has been a leader in some of the largest incident response and security operations center development programs in the history of the respective companies.
How does an organization that is looking to improve their MS SQL Server performance end up with hyperconverged infrastructure? Well, why would they? Hyperconverged is typically used for VDI and lightly loaded remote sites. But a mission-critical application like SQL Server? On Hyperconverged? Who would take that risk?
In this webinar, hear from Emergency Communications of Southern Oregon (ECSO) that found that not only were they able to improve their SQL Server performance (by 20x!) with hyperconverged, they were also able to improve their availability and reduce costs to boot.
While many storage vendors are touting multi-protocol access between file and object worlds, Caringo once again takes it to the next level extending multi-protocol access to metadata. Everything you can do with files in a file-based world you can do with objects through Swarm and SwarmNFS. Join this webinar to see a simple demonstration of the new go-to beyond the file system.
Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.
The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.
Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.
Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:
• Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
• One in 131 emails contained a malicious link or attachment – highest rate in five years
• Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
• CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000
Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.
Register for the Symantec 2017 Internet Security Threat Report Webinar today.
Organisations are transitioning more of their data and infrastructure into the cloud. Worldwide, the public cloud market is expected to grow 17.2% this year, topping $208.6 billion, according to recent research.
While many IT organisations may just assume that their service providers have backup, recovery and business continuity plans taken care of, that isn’t always the case. Couple that with recent poll results that found 36 percent of IT execs said the loss of data in the cloud would be worse than their data centre crashing and the 14 percent who said such a crash would cost them their jobs and it’s clear that there’s work to be done.
Hear more about why you can’t cede control of your backup and business continuity plans to your cloud provider -- and why doing so could put your data at risk. In this webinar you will also learn:
· What cloud providers are actually responsible for in terms of backup and recovery
· How an SLA doesn’t always mean you are protected
· Why your overall business continuity strategy must embrace the cloud
· Where the most common issues happen and how to prevent them
· How to create end-to-end resiliency that supports your employees, partners and customers
Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault will cover the three P's of Ransomware survival: Prevention, Preparation and Practice. Join data protection experts with decades of experience protecting organization's digital assets.
The most profitable type of malware attack is ransomware, with one security firm explaining that ransomware attacks are up an unbelievable 550 percent this year skyrocketing from 131,000 in 2014-2015 to 718,000 in 2015 and 2016. What does this mean? If you're not backing up your data and planning for the worst you're putting your company at risk -- and ensuring that you'll have to pay a ransom if and when you are attacked.
In this webinar we will discuss the very real risks that are out there and how backup -- specifically to the cloud -- can help you tell hackers to take a hike.
Privacy laws regulate the collection, storage and use of data by organisations in many countries globally. Following the proclamation of the Protection of Personal Information Act (POPI) Act into law in 2014, so too will these laws become applicable to South African organisations.
In this digital age, technology plays a pivotal role in shaping the way in which business is done. The objective of this topic is to explore the Cyber Security and Resilience requirements placed on organisations by privacy regulations, and the impact of Cyber Security and Resilience on Business Continuity.
This webinar will touch on the reliance placed on effective Information Security and Cyber Security solutions to ensure compliance, and explore how a breach or failure of Information Security Controls needs to be managed.
Como ya sabe Commvault le ayuda a abordar su estrategia de nube híbrida a través de una plataforma de gestión de datos que es "cloud agnóstica". Para lograr esto, Commvault se asocia con los líderes en tecnología de nube híbrida como Microsoft, Amazon u Openstack, proporcionándole la seguridad de poder hacer frente a su viaje al Datacenter 3.0 con el control total de sus activos de datos, sin importar dónde se produzcan o consuman.
En un entorno de TI en constante cambio, nuevos y poderosos jugadores están entrando en la lista de socios tecnológicos a considerar. Es el caso de Oracle y Google, que ofrecen cada vez más aplicaciones y servicios en la nube, y Docker, el estándar en contenedor de aplicaciones.
En este webinar, revisaremos cómo Commvault incorpora estas tecnologías disruptivas a nuestra estrategia de gestión de datos "cloud-agnostic". La replicación de datos, la transformación de formatos de VM o la protección de datos móviles en estos entornos, todo ello en conformidad con la regulación GDPR de la UE, le da la libertad de decidir cuáles son sus proveedores presentes y futuros, para que usted (y no su software de protección de datos) decida su estrategia en la nube híbrida.
Rejoignez-nous pour un webinaire en live avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations des équipes Mandiant en 2016.
Inscrivez-vous aujourd’hui pour découvrir :
•Les nouvelles tendances d’hameçonnage
•Les changements en termes de volume et de méthodologie
•Les apports de la cyber veille et de l’intelligence sur les attaques émergentes
•Les approches défensives pour mieux se protéger
•Comment la GDPR impacte les sociétés en EMEA
•Comment l’Europe se situe par rapport à l’Amérique du Nord et à l’Asie
Cyber crime has been around for as long as we’ve been connected to the Internet, but in recent times, the criminals behind it are excelling in their creativity and ingenuity with consequences that are more damaging than ever before. Furthermore, the organisations that invest in cyber crime preparedness seem to forever be one step behind as they only get to guess what might be coming.
The price tags of these data thefts, DDoS attacks, ransoms to unblock operating systems, etc. are going through the roof. Therefore, when faced with a cyber crisis, it is critical to demonstrate strong leadership and communicate effectively with all stakeholders to avoid spiralling down to a reputation meltdown.
Attend this webcast to learn more about how to better equip your healthcare organization in the fight against Ransomware and Cybersecurity threats. Some of the discussion points will include: The Current Cybersecurity Threat to Healthcare and Dell Technologies' Unique Approach to Security Transformation, Isolated Recovery Strategy.
Backup vendors know if ALL your data is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Join our webinar to learn how to remove fear by assuring recovery. We'll cover:
- The trends in Ransomware
- 5 steps to protecting your data
- How Unitrends ensures instant recovery from an attack
About the presenter:
Mark Jordan is VP of Technology at Unitrends and is responsible for building Unitrends’ advocacy program. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. At Unitrends, Mark has been manager of Unitrends presales, director of support services and was product manager of the first generation Unitrends data protection appliance. Follow Mark on Twitter @MarkCJordan.
Come join a discussion with two industry leaders in the converging worlds of Dark Web Scanning and Artificial Intelligence. Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
Feeling tethered to storage vendors whose boxes just can’t cut it? Innovation in hybrid cloud, primary storage, backup, and disaster recovery means enterprises should be able to free themselves – and transform how they consume storage and access data.
Join this live, interactive webinar to discuss:
- Ways to break the chains of traditional storage – and gain better performance and scalability – while minimizing on-prem investments
- What Partners Healthcare and other enterprises do to better manage costly, complex data, while taking advantage of hybrid cloud to extend their infrastructure
- The death of the traditional data center – and why it’s an opportunity for enterprises
- How to get on-demand primary storage with offsite backup and DR as a single service.
Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
Every day, organizations are impacted by cyber-attacks. Misleading indicators, complex security incidents, and evolving intruder patterns require new threat intelligence and analytics. With millions of data to analyze, every second counts - augment your security tools with real-time threat hunting capabilities and new research insights.
Join experts Jason Stamper, Analyst for 451 Research, and Eric Tran-le, CMO for Logtrust, as they affirm how essential real-time threat hunting is for cybersecurity teams, and share new insights and tools for combatting attacks.
• Learn new trends in machine data analytics from 451 Research
• Pinpoint cybersecurity attacks and unusual behavior
• Visualize an attack graph
• Detect intruder paths and potential vulnerabilities
• Leverage a single source of truth
In today’s global village everyone is connected. The internet has brought billions of people together, allowing sharing of data, communication and commerce at a scale never imagined before. The value of the internet is clear for everyone to see. Unfortunately, the same internet also allows for cyber hackers and attackers to fight a new war, Cyber terrorism, theft of data and extortion. The attackers hide in plain sight. Working from homes or offices. Sometimes alone, often in syndicates. Even state sponsored cyber terrorism is on the increase.
Large cyber security companies such as firewall providers and anti-virus vendors are spending millions of US dollars in a constant battle to stay ahead of the cyber threat. Unfortunately, these measures are not always successful in preventing cyber-attacks from occurring as can be seen from recent attack against Primera Blue Cross.
The company, a health insurer based in Washington State, said up to 11 million customers could have been affected by a cyber attack last year. Hackers gained access to its computers on 5 May 2016 and the breach was not discovered until 29 Jan 2017. The breach probably exposed members' names, dates of birth, Social Security numbers, mailing and email addresses, phone numbers and bank account information. The company is currently working with the FBI and a cyber security firm to investigate.
So, given that no matter what you do to protect yourself against the cyber threat, you will probably be attacked or have already been attacked. You therefore need a plan B to allow your business to continue with crucial day-to-day activities after the event.
Implementation of the EU General Data Protection Regulation Act (GDPR) is fast approaching. The GDPR’s tough privacy rules and financial penalties are big enough challenges for organizations like yours. But rising email-borne threats like ransomware make compliance even more difficult.
This webinar explores:
- Steps to minimize GDPR risk even in the face of spiraling email-borne attacks
- How the GDPR’s Data Breach Notification requirement changes everything
- Why it’s vital to secure a budget for GDPR compliance and third-party assessment
About the presenters:
Achmad Chadran, Mimecast Archiving Specialist:
Achmad Chadran is an archiving product marketing manager at Mimecast. Prior to joining Mimecast, Achmad held marketing and product management positions at the Intronis MSP Solutions arm of Barracuda Networks, Dell’s Large Enterprise Business Unit, and Siemens. He has a bachelor’s degree from the University of Virginia and a master’s degree from Ohio University.
Enza Iannopollo, Forrester Research Analyst
Enza is an analyst on the Security & Risk team and a Certified Information Privacy Professional (CIPP/E). Her research focuses on the impact of internet regulations and data privacy issues on digital business models, as well as the technologies that underpin them. Her research coverage includes data protection, privacy in the context of cloud computing, analytics, and the internet of things. Enza also helps Security & Risk Professionals build and execute data and privacy protection strategies in line with the requirements of the business technology (BT) agenda.
Cyber threats. Compliance. Ease of use. These are among the growing challenges to resiliency for all organizations, but they often are at odds with another. Clients and their customers are driving a need for ease of use, customization and empowerment, which can result in a more complex, at-risk infrastructure. How can organizations manage risk and compliance - maintaining expected transparency, accountability and interconnectedness amongst all of this complexity?
Join our discussion on the impacts of increased regulatory supervision and the effects of standards, using industry examples - and learn key strategies you can use today to manage resiliency across all levels of the enterprise to protect your business in the age of digitization and IT modernization.
Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.
Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:
• Who is part of APT32, where they are based, whom they target and how they operate
• Advice on how to defend against, hunt for and respond to APT32
• How your organization can improve your ability to detect, prevent and remediate APT32 attacks
Digital transformation is driving the increased deployment of cloud-based applications, a mobile workforce, and IoT. A new WAN architecture is required to support this digital transformation and deliver reliable, secure connectivity to people, places, and things.
In a live webinar on May 24, 2017, Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint will discuss the technologies enabling the next-generation WAN, including SD-WAN, Software-Defined Perimeter (SD-P), and LTE.
Veteran threat hunter Jason Smith will detail:
• How to structure your Security Operations Center (SOC) and network to help uncover hidden threats
• Best practices to make hunting data accessible and fluid
• Essential tools and tips from Jason's hunting experiences
About the hunter:
Jason Smith has a background in physics and has built everything from particle
accelerators to explosive neutralizing robots used by the military. He has worked in multiple US Department of Defense SOCs and has worked with the largest security vendors to operationalize security in the world's largest
organizations. Jason co-wrote Applied Network Security Monitoring and maintains the open source project FlowBAT, a graphical flow data analysis tool. Jason currently works remotely for Cisco from his home in Nashville, TN.
Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.
In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:
• Short synopsis of the timeline and key provisions of GDPR
• Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
• Summarise the six fundamental strategies for safeguarding sensitive data
• Identify the three most important capabilities for addressing GDPR requirements
Have you been thinking that managing your storage footprint has gotten a little…out of control?
Maybe you’re running as fast as you can to keep up with the growth of costly, complex data, backing it up and planning for any potential outage, but your traditional data center just can’t get you where you need to go.
That problem and its solution are the ideas behind our 45-minute, live, interactive webinar.
Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.
In this webinar, you will learn:
What the GDPR means for you
How to get started on your journey to compliance
How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance
Agenda includes plenty of time to address your questions.
When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.
Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.
Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
• Determining what endpoints to investigate in a hunt
• Pivoting from network to endpoint investigations
• Essential tools and best practices for endpoint hunting
About the hunter:
Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.
We’ll provide an overview of:
o What the General Data Protection Regulation (GDPR) is
o What is pseudonymization and the benefits of pseudonymizing data
o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities
Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.
Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:
•Why tighter integration between the network and endpoint improves security posture
•How new REST APIs help orchestrate a rapid response at the endpoint
•What the future plans are for new APIs, integrations, and global threat intelligence
Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.
Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.
Il webinar affronterà temi quali:
•I nuovi trend negli attacchi di phishing usati per compromettere le aziende
•I cambiamenti nella telemetria e nella metodologia degli attacchi
•Le analisi di intelligence sulle minacce emergenti
•Le nuove strategie di difesa per proteggere al meglio le aziende
•L’impatto del GDPR sul business
•Confronto fra trend europei, americani e asiatici
What could you do with a new evolution of data center management, advanced security and minimal overhead?
Microsoft’s Operations Management Suite (OMS) represents the evolution of data center management, with cloud-inspired capabilities for log analytics, automation, disaster recovery, and security. With OMS, you can now deliver advanced security and management capabilities without a significant amount of overhead and without needing lengthy technical or security training.
During this webcast, we'll demonstrate how this can work effectively for government agencies. You don’t need to be a security expert to leverage these capabilities. In fact, you can be up and running in a couple of hours.
Join this webcast to:
- Learn about Microsoft’s approach to holistic security and how our capabilities apply specifically to government agencies
- View a demo and see how this applies to your own environment
- Find out how to quickly configure your environment and test it out
How much is my work worth? Am I getting paid enough? These are questions professionals often struggle with. The answers to the questions are nonetheless important as it determines job satisfaction and future career prospects. While there are salary reports available for many industries, there is a gap in data in the business continuity and resilience fields. The Business Continuity Institute has responded to this by conducting a comprehensive salary survey of business continuity and resilience roles, linking it with other factors such as educational attainment, work/supervisory experience and gender. Join Patrick Alcantara DBCI (BCI Research & Insight Lead) as he shares the results of the recently concluded BCI Salary Benchmarking Survey.
Learn how to conquer and manage the PCI process. Businesses are challenged with attempting to continuously monitor their PCI environment, responding when something changes and managing all the information to gather evidence and generate the report on compliance (ROC) or attestation on compliance (AOC). Verterim is providing a 3 part, educational PCI series to address some of these business challenges and provide our tips on how you can take advantage of technology you may already have in house. The first 30 minute BrightTalk will look at the PCI process at a higher level and provide a view into a standard RSA Archer use case to help solve the problem. Join our GRC practitioners, Jennifer Pesci-Anderson, National Practice Lead and Jeff Avery, Engineer on May 11 from 12-12:30 to see how you can address your PCI business challenges.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.
Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
FireEye has tracked APT10, a Chinese cyber espionage group, since 2009. APT10, also known as MenuPass Group, have historically targeted the United States, Europe, and Japan with a specific focus on construction, engineering, aerospace, telecom, and government.
In June 2016, FireEye first reported that APT10 expanded their operations with a new suite of tools and techniques to target their adversaries.
Join our experts whom have hands on experience with this group to learn:
•Who is a part of APT10, whom they target and how they operate
•How to defend against, hunt for and respond to APT10
•How your organisation can improve its ability to detect, prevent and remediate APT10 attacks
This exciting panel will explore the kinds of storage that IoT solutions demand. We’ll talk about what’s different about data storage for IoT compared to existing enterprise applications, what capabilities are required to support massive, distributed IoT networks, and how and why existing storage solutions may or may not be the best IoT application storage. We'll plan on getting into unique IoT data protection concerns, real-time data pipelines, machine learning, data accessibility, distributed processing, and of course, what’s actually practical for the IoT already emerging in today’s data center.
Learn new attack techniques that have been uncovered by CrowdStrike’s threat hunting and incident response teams including: initial attack vectors, persistence, lateral movement and data exfiltration techniques. See new techniques for dealing with malware, ransomware, spearphishing, exploits and malware-free intrusions. Leave knowing how to identify and stop advanced threat activity in your environment.
- How nation-state threats are crafted and how their Tactics, Techniques, and Procedures (TTPs) help identify them from more routine advanced attacks
- Who are the most notable adversaries in 2017 and the key European security themes based on the latest intelligence compiled across CrowdStrike’s global intelligence gathering operation
- What are the indicators of attack and how you can apply them to defeat the adversary?
When it comes to DDoS attacks, you have to be prepared for the big, the bad and the ugly. The three categories of DDoS attacks are:
1.Volumetric – packet floods that block your traffic pipes by oversaturating links with malicious traffic
2. TCP State Exhaustion— overloading the state table of stateful devices like FireWalls and IPSs so no intended connections can be processed
3. Application-layer Attack vectors – slow and stealthy attacks that are difficult to detect but they exhaust the functions and features of your assets
Let's discuss what protection your infrastructure needs to withstand all three types.
With mounting HIPAA regulations and PCI requirements, learn why securing your access credentials should be your number 1 priority this year and solutions that can take the guess work out of the authentication process.
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.
A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.
To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:
•Create and operationalise a robust cyber security team
•Build and upskill existing talent
•Address the skills gap in different stages of your Cyber Security programme
•Source skilled security professionals differently
(1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.
Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.