Internet Security Threat Report and Flamer Update by Symantec in German

Candid Wüest, Principal Software Engineer, Symantec & Thomas Hemker, Distinguished System Engineer, Symantec
This webcast will be hosted in German.

Protect your business in the new threat landscape
With the global threat landscape changing constantly,
understanding the latest security risks and cybercrime
trends is crucial to protecting your business.

The Symantec Internet Security Threat Report (ISTR)
uses data from the Symantec Global Intelligence Network
to analyse global threat activity. The latest report shows
an escalation in the volume and sophistication of this
activity in 2011.

You are invited to join a Symantec Webcast discussing
the findings of the ISTR, including the emerging trends
in mobile malware and rising number of targeted attacks.
With companies of all sizes now falling victim to malicious
attacks, no business is off the radar of cybercriminals.

Flamer, which has recently received much media attention, is the very latest example of the trends that the ISTR covers. We will also provide the most recent information on this sophisticated and discreet threat that is targeting the Middle East.

Download your copy of the ISTR and register for the webcast
today to find out what you can do to secure your company.
Jun 5 2012
61 mins
Internet Security Threat Report and Flamer Update by Symantec in German
More from this community:

Cloud Computing

  • Live and recorded (4191)
  • Upcoming (134)
  • Date
  • Rating
  • Views
  • This video explains the 80:20 rule for developing a mobile strategy for your company. 80% of mobile uses cases are the same for most organizations, like managing approvals and internal communications. Sitrion ONE is a simple, secure end-to-end solution with pre-built use cases and connectors to enterprise systems like SAP, SharePoint, Salesforce, Office 365, Exchange and other REST endpoints.
  • Enterprise mobility video explaining how common approval processes from SAP, SharePoint, Salesforce, Office 365 and Exchange are integrated into Sitrion ONE's simple, native mobile app. Employees and managers simply manage tasks in their productivity stream within the native iOS, Android or Windows Phone app.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • Good data is the key to innovation, solid research collaboration, and, ultimately, the creation of life-saving drugs and treatments.

    But does your IT strategy reflect this? All too often, data is compromised and constrained by the needs of your enterprise’s applications. Join our webinar to discover a new data-centric approach to IT that's radically changing the biggest names in life sciences.

    By moving to a data-centric model, your organization will be better poised to:

    •Integrate data regardless of source, volume, and variation
    •Quickly and easily change out applications
    •Uncover unique insights

    Gary Palgon, CISSP and VP, Healthcare and Life Sciences at Liaison, will demonstrate how to apply this innovative data-centric approach in a life sciences environment.
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • Agility, Mobility, Innovation, Time-to-Market. Are these words that describe your ideal business application environment? Now, you can leverage the Salesforce1 Platform to rationalize your business applications. Join this webinar to:

    -Learn how to improve application efficiencies while reducing operating costs.
    -Hear a successful case study where a global Energy Company leveraged the Salesforce1 platform to reduce the number of applications used by one of its business units by 70% in just 4 months.
    -Explore how this cross industry solution can help you rationalize your IT business application landscape.


    Matthew Sheppard, Sr. Manager, Accenture
    Matt Pitner, AVP, Oil & Gas, Salesforce

    Who Should Attend:

    -IT leaders interested in IT landscape rationalization and IT cost reduction
    -Business leaders looking for improved efficiencies, agility, and mobility for their business applications
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • Channel
  • Channel profile
  • Securing Legacy systems in the Public Sector Mar 19 2015 3:00 pm UTC 60 mins
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Mar 18 2015 10:00 am UTC 45 mins
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • L’actu cyber du mois, so what ? Recorded: Dec 12 2014 31 mins
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques , nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.

    •Votre rendez vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • How to achieve a proactive approach to security Recorded: Dec 9 2014 53 mins
    Achieving a proactive approach to security: All organisations are looking to lower their risk when it comes to Cyber threats, but increasingly need to have faster incident response and containment. The question becomes one of how can you embrace technological change while minimising IT risks? Are you looking to meet compliance regulations and audit requirements, but also improve efficiency and productivity of your IT staff? Join us to understand how talking a different approach and shifting your investment may enable to you respond faster but importantly give you better awareness.
  • The future of Endpoints & Identities: Increases in Threats, Cloud & Mobility Recorded: Dec 3 2014 46 mins
    Join Mike Smart at Symantec and Charles Kolodgy, Research Vice President for IDC's Security Products Service on this interview-style webinar to hear about how the industry needs to evolve endpoints and identities to embrace evolution and flexible working as well as defend off increasingly complex attacks. In this session there is a twist! – you, the audience will have control over the topics we’ll choose to discuss! To conclude this session, we’ll be hearing from Charles on his view of what the future holds!
  • Die Spionage-Software Regin | Einladung zum deutschen Webcast Recorded: Dec 3 2014 62 mins
    Am 23. November 2014 hat Symantec als erstes Unternehmen Informationen über Regin, ein hoch entwickeltes Tool für die Cyber-Spionage, veröffentlicht. In den Medien wurde ausführlich darüber berichtet und wir möchten Ihnen einige wichtige Informationen über diese Bedrohung sowie dazu, wie wir Sie davor schützen, geben.

    In unserem deutschspraching Webcast am 3.12.14 möchten wir näher erläutern, was Regin ist und warum diese Bedrohung ernst ist: Regin ist deshalb als Malware so bemerkenswert, da sie äußerst komplex ist und sich in ihrer Funktionalität für die verschiedensten Zwecke anpassen lässt. Regin basiert auf einem Framework, das sich bestens für die langfristige Informationsbeschaffung eignet, indem es die Malware vor einer Enttarnung schützt. Regin unternimmt erhebliche Anstrengungen, um sich und seine Aktivitäten auf infizierten Computern zu verbergen. Für seine Tarnung werden zahlreiche der raffiniertesten Techniken eingesetzt, die wir bisher beobachten konnten.
  • 2014 Cyber Attack Review & What Can We Learn for Better Cyber Defence in 2015? Recorded: Dec 3 2014 42 mins
    The world has changed. The increasing digitization of our personal & business lives is driving an evolution in cyber threats never seen before while forcing our relentless focus on prevention to be modified to one of resilience. This webinar explores the evolution of cyber threats across the emerging spectrum of digital interactions for businesses, governments and consumers and highlights both the human and technology shifts we need to make to not only prevent threats but become more cyber resilient in our digitally connected worlds.
  • Archiving and Backup: Accelerate your business agility and innovation Recorded: Nov 13 2014 28 mins
    The data explosion is a given, but the increase in rules and regulation are driving compliance and governance requirements and the traditional view of archiving and backup need to be refined – just adding storage is not the solution; a better approach to information life cycle management is.

    Join David Moseley & Arjan Van Proosdij as they discuss methods and share top tips for accelerating your agility and innovation when dealing with your archiving and backup solutions.
  • Symantecs Per Hellqvist, talar om hur man hanterar en komplex pågående hotbild Recorded: Nov 13 2014 40 mins
    Att hantera en komplex , pågående hotbild

    Försvar av ditt företag mot cyberhot har aldrig tidigare varit så utmanande. Den IT-relaterade brottsligheten finns överallt och växer ständigt. Är du beroende av gårdagens metoder för att bekämpa dagens hot?
    Lär dig mer om de fyra stegen i en riktad attack och hur man kan skydda sig.

    Under denna session får du:

    •En genomgång av dagens hotbild, pedagogiskt genomgången och med råd och tips om hur du kan undvika att bli utsatt eller upptäcka när attacken sker.
    •Lära dig hur attackerna går till samt vilka säkerhetsverktyg du behöver för att stå bättre rustad
    Denna webcast är lämplig for alla som arbetar med IT-säkerhet i både privata som publika företag och organisationer.

    Presenter Biog - Per Hellqvist, Senior Security Specialist

    Per Hellqvist is one of Symantec’s security experts. He has broad experience and knowledge around IT-security and issues. His specialty is mobile security, malicious code – virus, Trojan and worms in specific. He is also a trend analysis of security and is very interested in what is going on in cryptography.
    Per has become a well-known profile and spokesperson within virus and IT-security. He writes articles, speaks at seminars and conferences for journalists, industries and organizations. Per Hellqvist is also the initiator of the Swedish virus list, an independent and up-to-date statistic, where he once a week report on the most frequent viruses in the Swedish companies. Per is also the only Swedish person to report Swedish virus status to The Wild List Organization.
  • Mobile Applications: How Safe is your information? Recorded: Nov 11 2014 46 mins
    Mobility is still one of the top trends for the business. How can you balance the risks with the rewards that it brings to the business? In this Panel session you will hear Symantec discuss emerging mobile trends, the need for trust and identity in the mobile application development space and how business can develop and deliver secure applications to their users and customers.
  • Moving to a Software-Defined Anything (SDx) Data Center: Beyond Virtualization Recorded: Nov 11 2014 22 mins
    The traditional datacenter landscape has changed forever, leaving infrastructure abstracted and virtualised, delivered as a service. We’re seeing virtualisation extend well beyond just computing, with storage and network virtualisation quickly becoming the norm for most organisations.
    This model holds true regardless of whether the infrastructure resides internally or in the cloud. Dependency on physical hardware is being eliminated as software manages everything, increasing flexibility and agility. As infrastructure becomes highly virtualised and moves toward the private cloud, traditional IT resources need to evolve or risk becoming irrelevant.
    If achieving an agile data center requires elastic infrastructure, service-model delivery, and the application of IT intelligence,
    how does Symantec help advance these objectives? By taking each one of these goals individually, we can better understand
    Symantec’s role in building an agile data center by:

    •Improving Infrastructure Elasticity
    •Delivering Resources As-a-service
    •Cultivating IT Intelligence
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Internet Security Threat Report and Flamer Update by Symantec in German
  • Live at: Jun 5 2012 12:00 pm
  • Presented by: Candid Wüest, Principal Software Engineer, Symantec & Thomas Hemker, Distinguished System Engineer, Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this