Hi [[ session.user.profile.firstName ]]

Symantec Information Security EMEA

  • Date
  • Rating
  • Views
  • Methoden und Techniken bei gezielten Ransomware Attacken
    Methoden und Techniken bei gezielten Ransomware Attacken Candid Wueest, Andre Engel Live 60 mins
    Aktuell werden gezielt Webserver, Cloud Datenbanken und IoT-Geräte durch ein professionelles Vorgehen kompromittiert

    Lernen Sie die technischen Details kennen, wie diese Angreifer vorgehen und wie Sie sich davor schützen können.
    Vor einiger Zeit hat die WannaCry Malware viele Unternehmen daran erinnert, wie verheerend ein erfolgreicher Ransomware Angriff sein kann. Glücklicherweise war WannaCry vergleichsweise einfach konzipiert. Es gibt jedoch wesentlich versiertere Angreifer, welche sich auf gezielte Ransomware Attacken gegen hochsensible Unternehmen-Daten spezialisiert haben.
    Mit APT-ähnlichen Methoden und Techniken werden die relevanten Unternehmensbereiche gezielt kompromittiert und per Lateral-Movement das interne Netz unterwandert. Webserver, Cloud-Datenbanken bis hin zu Industrieanlagen werden so gezielt angegriffen und von hochprofessionellen Erpressern blockiert bis zigtausende von Euros an Lösegeldzahlung geleistet werden. Selbst IoT Geräte wurden bereits „Opfer“ von Ransomware.

    In dem Webcast behandeln wir die Themen:

    •Infektionsvektoren von Ransomware (Email,Web und Exploits)
    •Rückblick WannaCry; Details über die Links zur Lazarus Gruppe und die Programmierfehler
    •TTP der SamSam Gruppe und anderen gezielten Ransomware-Attacken
    •Ransomware auf IoT (Unternehmen mit SmartTV und Mitarbeiter mit SmartWatch)
    •Einblick in den aktuellen Internet Security Threat-Report (ISTR) von Symantec
  • Countdown to GDPR with Symantec
    Countdown to GDPR with Symantec Symantec Recorded: Jun 22 2017 63 mins
    Keeping a handle on your organisation’s sensitive and personal information is a tough challenge. More data, more technology, more ways to communicate and more remote users. Start your journey to GDPR with the powerful integration of Symantec products and the join our webinar with our panel of experts to really understand how to navigate the technology to ensure your GDPR journey is a smooth one, and one that enhances your cyber and security processes at the same time.

    Now that the General Data Protection Regulation (GDPR) is almost here, you need better visibility over:

    1.Information risk – where it is, who uses it, and how much risk it’s at from breach, loss or misuse
    2.IT risk – so you can see how well protected information is within servers, networks, and the devices that house and transact it
    3.User risk – to know how much risk user behaviour poses to your information, systems, operations and brand reputation

    Join us for the first of our GDPR series, addressing technologies that help organisations determine data risk and protect data, devices, and networks against that risk.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • EDR : une nouvelle approche face aux APT
    EDR : une nouvelle approche face aux APT Hervé Doreau, Directeur Technique, Symantec France Recorded: Jun 15 2017 39 mins
    Face aux APT de plus en plus intelligentes, quelles sont les méthodes à mettre en place pour minimiser les risques et adopter une stratégie plus efficace d'EDR (Endpoint Protection and Response) ?
    Assistez à ce webcast pour en savoir plus sur :
    - la protection supplémentaire apportée par l'EDR,
    - comment implémenter une solution EDR sans ajouter de complexité,
    - les critères d'évaluation de l'EDR.
  • A Step-By-Step Approach for Endpoint Detection & Response
    A Step-By-Step Approach for Endpoint Detection & Response Scott Hardie & Gavin Fulton Recorded: Jun 14 2017 32 mins
    No question: Advanced Persistent Threats (APTs) are getting smarter. New question: what steps can you take to minimize the risks and create a more effective Endpoint Detection and Response (EDR) strategy?

    Register for our webinar series and learn a step–by–step method for eradicating endpoint threats. You’ll discover:
    •How EDR protects endpoints.
    •How to implement EDR without an extra agent.
    •Evaluation criteria for EDR solutions.
    Watch the webcast, then see our demo.
  • [Video Panel] Fighting Ransomware: Lessons from WannaCry
    [Video Panel] Fighting Ransomware: Lessons from WannaCry Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks Recorded: Jun 8 2017 50 mins
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • Block The Risk Of Ransomware
    Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic Recorded: May 18 2017 34 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection
  • Securing Financial Services: Authentication, Encryption & Data Protection
    Securing Financial Services: Authentication, Encryption & Data Protection Symantec Recorded: May 17 2017 62 mins
    Financial institutions are the number one target for cyber criminals. So you need industry-leading information security to make sure you’re protected.

    This webinar explores how authentication and encryption are leading the way in advanced data protection. You’ll hear the industry’s leading thinkers discuss topics like preventing ransomware and guarding against cyber attacks.

    And with the risk of GDPR penalties getting closer, you’ll hear about how best practice data governance and compliance can help you avoid heavy fines.
  • Don't Cry Over WannaCry Ransomware
    Don't Cry Over WannaCry Ransomware Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services Recorded: May 15 2017 39 mins
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The Power of the Proxy
    The Power of the Proxy Timothy Chiu is a Senior Director of Product Marketing for Symantec Recorded: May 10 2017 17 mins
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • A New Dawn of Data Privacy
    A New Dawn of Data Privacy Symantec Recorded: May 10 2017 3 mins
    Everything changes in 2018

    Is your organisation ready for the GDPR implementation in 2018? Our GDPR video perspective sets out the task ahead.

Embed in website or blog