Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Wieder einmal war es ein schlechtes Jahr für Computersicherheit. Doch obwohl wir uns jetzt zum Jahresende verstärkt mit der erhöhten Gefahr durch IoT-Geräte beschäftigen, gab es im vergangenen Jahr eine Vielzahl anderer signifikanter Sicherheitsvorfälle und Malware-Bedrohungen. Und sie alle haben eine Bedeutung für das kommende Jahr.
Dieser Webcast hält eine Rückschau auf die Bedrohungslandschaft 2016 – mit Schwerpunkt auf den Dingen, die wir für 2017 im Gedächtnis behalten sollten.
Penetration Testing has long been used to help prevent data breaches, to understand security weaknesses on your network and to test security controls. An important and required process for many organizations, penetration testing needs to be planned for carefully.
Mandiant, a FireEye company, has recently discovered the use of Shamoon malware targeting GCC based organizations. The identified malware exhibits destructive behavior on Windows based Operating systems. The malware uses a signed RawDisk driver from EldoS. Mandiant suspects the objective of the malware is to render a disk unbootable.
Join Stuart Davis as he details what you need to know to protect against this type of malware recently seen in the Middle East.
Nous venons de vivre, une fois de plus, une année déplorable en termes de sécurité informatique. Mais bien que l'attention se concentre aujourd'hui sur les menaces toujours plus nombreuses pour les appareils IoT, l'année a été marquée par bien d'autres événements majeurs en matière de sécurité et d'attaques de malware. Et tous resteront des enjeux d'importance pour l'année à venir.
Ce webcast passera en revue le paysage des menaces en 2016 en insistant sur les points à retenir pour 2017.
We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.
But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.
Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
Eliminating security gaps and providing maximum protection against today’s and tomorrow’s threats requires a new approach. Join Enterprise Security Group’s Doug Cahill, Senior Analyst, as he discusses a strategic approach to endpoint security that will transcend generations and keep pace with the shifting threat landscape and broadening attack surface area. You will also hear from real practitioners from Navicent Health—Ty Smallwood, Information Services Security Officer, and Robert Jones, IT Security Systems Analyst, outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face.
Penetration Testing has long been used to help prevent data breaches, to understand security weaknesses on your network and to test security controls. An important and required process for many organizations, penetration testing needs to be planned for carefully.
Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:
•Meet all network security needs
•Reduce management time
•Eliminate upfront capital investment
•Utilize subscription pricing for a predictable operating expense model
•Gain valuable network reporting and expert insight
•Have a network security professional manage it all
Your organization has turned to cloud platforms and applications (including SaaS, IaaS, PaaS, and even IDaaS) to meet business needs, and it’s your job to make sure those applications are both easily accessible as well as airtight. Luckily, a new set of identity and security solutions have arrived that ensure fast access and security around all your publicly accessible data,w the apps it resides on, and the users engaged.
Find out how OneLogin’s identity and access management capabilities including single sign on (SSO), combined with CloudLock’s cloud cybersecurity solution can make users more secure and productive in the cloud, no matter the data, applications, or people they work with.
Join OneLogin and CloudLock to learn how to:
– Identify the top five cyber threats to your cloud environment
– Protect against cloud security risks leveraging advanced user behavior analysis
– Improve company-wide productivity through streamlined identity and access management
– Easily automate your cloud access management process
– Put it all into action quickly – managing cloud application security with a powerful IDaaS+CASB joint solution
Once again it's been a bad year for computer security. But while we are focused on the increased threats of IoT devices as the year comes to an end, a lot of other significant security events and malware threats appeared all through the year. And they all have significance for next year.
This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
Year-end tax activities can be overwhelming and put extra stress on you and your tax team. Corporations are often challenged to clarify what their priorities need to be when planning for year-end tax activities. As 2016 comes to a close, there are a number of important items that should be taken into consideration as part of your planning efforts. This 60-minute webinar will update participants on the latest federal, state and international tax developments.
By attending this session, participants will:
-International Tax - Learn about international tax updates including BEPS and, in particular, the impact of Country by Country reporting on compliance and reporting obligations as well as Global Indirect Tax (VAT/GST) updates
-Federal Tax - Understand the latest developments and changes in federal tax including section 179 and bonus depreciation, deductions which were made permanent or extended via tax extenders bill, and other major developments for business entities
-State and Local Tax - Be aware of critical state income, sales and use tax legislative modifications and case that may impact your business
With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.
Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.
Viewers will learn:
- The latest cybercrime trends and targets
- Trends in board involvement in cybersecurity
- How to effectively manage the full range of enterprise risks
- How to protect against ransomware
- Visibility into third party risk
- Data security metrics
Despite open source software's long history - Linux just turned 25 - legal and risk questions about open source use still abound. Black Duck On-Demand Vice President & General Manager Phil Odence regularly fields open source-related questions as he speaks with tech executives and their counsel. Listen in as Phil goes through some of the most frequently asked questions and gets expert answers from Attorneys Karen Copenhaver and Mark Radcliffe. Both are well versed in the legal nuances of open source, and are able to turn their expertise into practical, actionable advice as they ably demonstrate in this webinar.
The rise of attacks resulting in huge business losses have brought cyber security into the board room. Prior to the Target breach, the board of directors was not very interested in cyber security. However, things have changed, and we see more and more CISOs reporting into the CRO, CFO, or CEO and not the CIO. Put simply, if you report into the board more than once or twice a year you have to be speaking their language.
Cyber breaches have impactful results. In 2015, Target’s CEO Gregg Steinhafel, a 35-year employee of the company with the last six at the helm, was forced to resign in light of the recent holiday-season credit-card security breach that affected 40 million customers.
As a result, we are seeing a major shift in corporate cybersecurity policy. The board of directors is no longer interested in check box compliance. They are understanding their role much better. They are responsible to ensure that cyber controls are in place that protect business assets of the firm in alignment with their risk tolerance.
A SOC is a major component of a company’s GRC operations, as well as a critical IT center. But having your own SOC means more than just employing a couple of analysts to read log files. Do you know what kind of budget and expertise you’ll need to have if you decide to build your own SOC?
In this webcast, James Carder, LogRhythm CISO and VP of LogRhythm Labs, discusses the decision-making process you’ll need to go through before you build your own security operations center (SOC) and the impact it will have on your organization.
•The build vs buy trade-offs for a SOC
•The impact of a SOC on your GRC program and processes
•A SOC’s role in meeting compliance requirements
•Questions you should be asking before building a SOC
Watch now to learn the factors that go into planning for, building, and maintaining a modern SOC.
As the sophistication of encryption and technical defences rises each year, so do the attacks against the people in organizations. Hence the rise in PICNIC = Problem In Chair, Not In Computer.
This session gives an overview of the latest insider threats facing critical infrastructures and how they can compromise air-gapped networks. It provides proactive, preventative and defensive measures to manage the risk, and concludes with a discussion of the responsibilities organizations who manage critical infrastructures have to support national security, the well-being of society and economic prosperity.
Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.
As 2016 draws to a close, security professionals worldwide will be left pondering another year of publicised breaches, vulnerabilities and threats. So what are the key takeaways and how can global security events from the past 12 months inform your plans for 2017?
We’ve asked a panel of experts from the SecureWorks Counter Threat Unit (CTU), our highly-trained team of experienced security researchers, to paint a picture of threat actors and their tradecraft across the globe by sharing their views on 2016’s most significant security events. The panel will end the session by providing actionable insights and recommendations for organisations to factor into their security strategy in 2017.
Join this exclusive webcast to gain CTU insight on the following topics and more:
- eCrime trends including the rise of ransomware, business email compromise and the Mirai IoT botnet activity
- Nation state sponsored threats and whether organisations are set up to defend against them
- How organisations can use threat intelligence gathered in 2016 to improve security
Join this engaging session as BrightTALK conducts an in-depth interview with Troels Oerting, CISO, Barclays.
It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Troels for his thoughts on the cyber security industry and in particular:
- The big breaches of 2016 and lessons to be learnt
- The current threatscape
- The big vulnerabilities on the horizon
- Troels's insights into how to keep your company secure in 2017
We look forward to you joining us for the session.
Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks
Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.
Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:
- How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.
While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.
In this demo, we'll cover:
Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
How new variants propagate while evading preventative security measures
Signature versus anomaly detection (and why both are important)
What to do when you detect malware activity on your network
How USM can help identify malware infections so you can take action quickly
This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.
IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.
Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.
The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
Join PCI Qualified Security Assessor Coalfire and vArmour to learn how application-layer network visibility, software-based segmentation, and micro-segmentation can help organizations adhere to PCI DSS 3.2 requirements in data center and cloud environments.
We’ll dive into:
-vArmour Distributed Security System architecture and capabilities
-Coalfire evaluation criteria and findings
-PCI requirements addressable by vArmour DSS
In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.
Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:
•Why the C-Suite and Board need to champion planning and prevention efforts.
•How to get Executive buy-in.
•Ways to build stronger response structures from the top.
•How to construct response architectures. Who needs to be responsible for what?
•Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
•Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
•Examples our experts have seen – the good and the bad
Customer Service: Maximizing Service Management Beyond IT
There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.
Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.
Join us for this Customer Service webinar & learn:
Instant information to clients
- Workflow to run based on known and secure criteria
- Voice system knows everything the Service Desk knows
Multiple communication channels
- Integration and capabilities
- Omni Channel
- Single message representation
- Repatriation of Call Centers
Voice of the Customer Score
- Personalization of Interaction and Routing
- Custom Surveys based on Service and Category
Auditing and Compliance
- Reporting on actual effort for Labor Law compliance
Who should attend?
- VP of Support
- IT Service Desk managers
- Desktop Support managers
Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017?
In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine these trends and highlight key tactics to better prepare you for what the coming year may bring. We’ll explore:
Key factors in today’s security landscape that shape our future defense strategies:
•Many attacks are about money today, what will they be about tomorrow?
•Without DNS, there’s no Internet as we know it. Recent attacks against DNS have set new records for scale and taken down some of the Internet’s biggest names. What’s your strategy for assuring that DNS doesn’t fail your business?
•The hidden agenda of attackers who use these techniques as a means to a more serious end
•Tactics for strengthening your resilience, to better prepare you for the coming year – and beyond
Has your security strategy responded to these factors – and is it ready to take the hit from what may come next? Join us to learn more about what your organization can do to be better prepared for these too-often hidden aspects of highly visible threats.
re:Invent 2016 was a whirlwind of announcements and new possibilities. AWS unleashed a torrent of new functionality across all 50+ services. Join leading cloud expert, Mark Nunnikhoven, as he reviews the highlights of the show, unearths the hidden gems, and discusses how these new features could impact your approach to security in the AWS Cloud.
In this webinar, Vinaya Thummala and Sarah Moen will share insights on the data governance program at American Family Insurance. They will discuss the value of high quality data to their program and what it has meant to their success. By leveraging Informatica Data Quality, they have been able to ensure that their data is reliable, consistent, and clean. In this webinar, you will:
•Hear an overview of the Information Quality Management Program at American Family Insurance
•Lean how data governance activities are supported by data quality policies, standards and processes to continuously monitor and improve the reliability of business data
•Understand the effective use of data quality in projects: check and ensure the quality of all data, including existing data, transformed data and newly created data
•Discover their Data Quality as a Service Model: Data quality services deployment at Enterprise level for technical expertise, shared infrastructure, and different engagement models to meet all business needs
Discover the new platform within the enterprise! The emergence of Big Data has driven the need for a new data platform within the enterprise.
Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.
Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.
Join this webcast to:
- See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
- Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
- Review common use cases for Cloudera on Azure
- Discover customer benefits and success stories
- Learn how to deploy and start recognizing value with Cloudera on Azure
This webinar is part of the ‘8-part Azure Open Source’ webinar series dedicated to discussing various open source solutions available on Azure, to ensure you're successful with your Linux-based applications provided by our trusted partners like Cloudera, Datastax, Cloudbees, SUSE, Pivotal, and more.
This webcast is part of our Realize more benefits with open source on Azure webcast series. Sign up for this session, or the entire series today!
By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.
Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger client-side control for web applications. As web appsec practitioners continue to shift from mitigating vulnerabilities to implementing proactive controls, each new standard adds another layer of defense for attack patterns previously accepted as risks.
With the most basic controls complete, attention is shifting toward mitigating more complex threats. As a result of the drive to control for these threats client-side, standards such as SubResource Integrity (SRI), Content Security Policy (CSP), and HTTP Public Key Pinning (HPKP) carry larger implementation risks than others such as HTTP Strict Transport Security (HSTS). Builders supporting legacy applications actively make trade-offs between implementing the latest standards versus accepting risks simply because of the increased risks newer web standards pose.
In this talk, we'll strictly explore the risks posed by SRI, CSP, and HPKP; demonstrate effective mitigation strategies and compromises which may make these standards more accessible to builders and defenders supporting legacy applications; as well as examine emergent properties of standards such as HPKP to cover previously unforeseen scenarios.
It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back.
Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys.
Defending Your Organization Against Ransomware
In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace.
Webinar topics include:
• The early indicators of ransomware
• Automated defenses that you can put in place to thwart the attack
• The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.
As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.
Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore
-How to balance digital transformation with compliance and protect PII while also enabling identities.
-How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
-Using Trusted Digital Relationships as a basis for GDPR compliance.
-Implications of GDPR on data sharing
-How to leverage GDPR to benefit consumers
Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.
Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.
- Corruption risks and trends in Latin America
- Understanding local nuances: What you need to know when conducting business with third parties in the region
- Best practices for risk mitigation and due diligence
Just a few years ago it was all about keeping things out with traditional security focused on the perimeter. Today it’s a given that many risks have already made it past the front door – with the acceleration to the cloud combined with the exponential growth of mobility, sensitive data can be accessed from anywhere. This new reality has brought productivity gains but also a new landscape of risks. As a result, many organizations have upped their game, employing a strong playbook traversing from the endpoint to the cloud. This layered approach ensures organizations can tackle and respond to each play as it happens. Join Kim Ellery from Absolute for an insightful presentation on the strategic benefits of this new landscape, and why many organizations still miss critical security blind spots.
Black Friday and Cyber Monday are behind us, but if you are still working on your holiday shopping then you may be thinking about the risks associated with online payment options. Just in time for the 2016 shopping season, the PCI Security Standards Council recently announced changes to the Payment Card Industry Data Security Standard (PCI DSS).
While usually associated with retail and financial services, PCI DSS compliance is in fact a challenge that crosses industries since online transactions are essential for any digital business. Join this webinar to learn how leaders from different industries are running network security policy orchestration to ensure continuous compliance with PCI DSS requirements.
The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.
Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.
Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
• Recent findings on enterprise cloud usage from 451 Group
• How to analyze the security risks of your cloud platforms
• Security practices for different cloud platforms and business processes
• Future-proofing your Cloud security and data protection compliance
• How security can work in the multi-cloud universe
• Implementing a key management system that you own
Ransomware has become the Number 1 threat facing organizations in 2016; and it is of particular threat to any company that relies heavily on documents to run their business. With adoption of cloud computing for more mission-critical use cases growing, IT leaders are naturally concerned about protecting against ransomware in the cloud as well as on-premise.
Join the Chief Cybersecurity Officer of Trend Micro and the CTO of iland for this webinar where they'll delve into the significant threat that Ransomware poses to enterprise IT organisations - and discuss how to protect and remediate your business from ransomware attacks in the cloud.
This webinar will look into how Ransomware has changed; and how it’s becoming more targeted and harder to identify. With email still being the number 1 attack vector and a reported 70% of spam now delivering Ransomware, we will look at how advanced sandboxing technology can be used to identify new and unknown threats, like Ransomware, and why you need a robust disaster recovery and back-up plan.
What will be covered:
· Insight into Trend Micro’s ransomware and 2017 threat predictions
· Threat detection techniques to identify new and unknown threats
· How Trend Micro threat intelligence is integrated in the iland cloud platform
· How a cloud-based disaster recovery and back-up plan helps remediate ransomware attacks
• Learn about both the security benefits and risks of a hybrid cloud environment.
• Learn about ways to overcome security challenges within Enterprise data centers and the cloud.
• Gain insight on some of the most common concerns and myths surrounding hybrid clouds, in order to make informed decisions on the issue.