The New Threatscape: What Security Managers Need to Know
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment.
Forrester Research: Understanding and adapting to the New Threat Landscape
* What you need to know about the changing nature of the threat landscape
* Which long-held security principles are outdated, and which ones should be adhered to
* Where to invest to maximize the impact of your efforts while minimizing risk
ESET: The New Threatscape - What hasn't changed?
* Recognizing old attacks in the context of new technologies
* Addressing the constants; Security software, patch management, password management, encryption, education
What is the Cybersecurity Masters Series?
ESET's Cybersecurity Masters webinar series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Register now >>
Amazon Web Services has provided companies of all sizes with on demand elastic IT infrastructure services in the cloud totaling more than 50 services. This series gives you an opportunity to ask questions from an AWS expert live on any topic and also hear an overview of the subset of services/tools that AWS offers in big data and analytics.
Either submit questions during the session or ahead of time to email@example.com. In the email please include your NAME, COMPANY and JOB TITLE.
Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?
This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Analysts have been advising for many years that all businesses are becoming software businesses and one of the key software platforms that organisations invest in to support this is SAP's Enterprise Solutions. With this transformation, the availability of these mission-critical enterprise services increases every day.
During this webinar, you can learn how:
• SAP and SUSE have collaborated for 16 years to make Linux the preferred operating system upon which SAP applications run.
• SUSE can help you unleash the power of Open Source whilst providing the most performant and resilient platform available for your SAP applications
• Highly-Available SAP HANA, the core of SAP's next generation business suite S4/HANA, is ONLY available on SUSE Linux
One of SUSE’s Platinum Partners – Securelinx – who specialise in the deployment, configuration and support of Linux, are sponsoring this webinar.
Hewlett Packard Enterprise Flexible Capacity is a solution that provides Cloud like agility & economics, in the privacy of your own data centre, across Storage, Server and Networking. It enables you to respond to business demands and scale up capacity in minutes, not months and our advanced metering and billing ensures customers are only paying for what they consume.
In this webcast we will discuss:
•How to reduce operational costs: Free up CAPEX – pay for what you consume, whilst aligning IT cost to business demand
•How to reduce risk: Reduce capacity risk, as we ensure you always have enough to respond to business demand & reduce unplanned downtime through tailored proactive support
•How to maximise business agility: Respond to business & market demands in minutes, not months. Reduce Time to Market through easing procurement cycle from months to days
•And finally we will talk you through the solution and show how it has helped meet our customers’ business challenges.
На этом вебинаре вы услышите ответы архитектора облачных решений AWS Дениса Баталова на предварительно присланные вопросы по тематике DevOps – сервисам и лучшим практикам AWS по разработке и обслуживанию программного обеспечения с помощью облака AWS. В частности, приветствуются вопросы по таким AWS сервисам как CloudFormation, Elastic Beanstalk, OpsWorks, а также CodeCommit, CodeDeploy, CodePipeline и EC2 Container Service.
Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
Gli strumenti Command Line Interface (CLI) di AWS forniscono un’interfaccia a riga di commando semplice da utilizzare che permette di creare potenti script di automazione. In questo Webinar, scopirari techiche avanzate che aprono nuovi scenari nell’utilizzo della CLI AWS. Ti mostreremo come filtrare e trasformare le risposte dei servizi via JMESPath, come concatenare script e comandi per ottenere automazioni complesse, ed esplorare le nuove caratteristiche e funzionalità.
IT organizations today are under constant pressure to deliver better services more quickly and with lower cost. Traditional approaches are being rapidly replaced with enabling technologies such as virtualization, software-defined architectures, and cloud computing, introducing more complexity while the relentless growth of data pushes the limits of scalability. As IT undergoes this transformation, backup and recovery services must transform with it, and together can enable a greater transformation for your business.
Join our upcoming webcast to:
•Identify three ways NetBackup 7.7 reduces the complexity of enterprise data protection
•Understand three ways NetBackup 7.7 helps you scale with growth
•Realize three ways in which NetBackup 7.7 can make your organization more agile
•Learn about the latest capabilities added in the 7.7.1 release.
Find out how you can improve enterprise backup and recovery and ultimately move faster and take bigger risks trusting that your information is safe.
Descubra los beneficios de nuestra plataforma EMC Isilon, el líder en arquitecturas Scale-Out Nas que proporciona sencillez, escalabilidad, eficiencia y flexibilidad así como innumerables beneficios a su negocio: elimina las islas de NAS y las migraciones manuales de usuarios y datos, redefine la eficiencia en la administración, hace predecibles las actualizaciones sin agregar complejidad y cuenta con una organización en niveñes automatizada simple y eficaz. Accede ahora al contenido completo.
Cesar Tapias, Isilon Regional Territory Manager de EMC, cuenta con más de 15 años de experiencia en el sector de las tecnologías de la información. Durante su trayectoria profesional ha desarrollado distintos puestos de responsabilidad relacionados con el desarrollo de negocio participando en proyectos estratégicos para la compañía en España. En los últimos 4 años Tapias ha liderado la división de Isilon en España, uno de los pilares de la visión Big Data definida por EMC.
The webcasts are on demand.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>