Educating employees about computer security is a vital part of your defense against cybercriminals and unethical competitors. Yet security training and education is often neglected, sometimes at great cost. A breach of your company’s network security can be hugely expensive, dwarfing the cost of the
Educating employees about computer security is a vital part of your defense against cybercriminals and unethical competitors. Yet security training and education is often neglected, sometimes at great cost. A breach of your company’s network security can be hugely expensive, dwarfing the cost of the training that could have prevented it. To learn the role of education in security and discover ways to implementing training without breaking the budget, tune in to this webcast featuring Stephen Cobb, who has delivered computer security and data privacy training to companies large and small, including Microsoft and AT&T.
RecordedSep 5 201263 mins
Your place is confirmed, we'll send you email reminders
Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.
In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.
Viewers will learn about:
- Understanding Third Party IT Risk
- Structuring Vendor Risk Management Programs
- Evaluating Vendor Risk
- Ongoing Vendor Monitoring and Communication
In the digital era, IT has an extraordinary opportunity to become a data-driven business partners helping the business achieve its goals of revenue generation, cost reduction, and risk mitigation. However, IT reporting and analytics have historically focused on descriptive and diagnostic work – describing what happened and why. The speed and agility of the digital revolution demands the ability to not only describe what happened in the past but to predict what might happen in the future and to make recommendations about what should be done.
IT operations analytics offers IT organizations a path to evolve the use of machine, operational and business data for more effective, forward-looking prioritization and decision-making. And in a recent BMC sponsored survey, 79% of IT pros said they would be more effective at their job if they had access to non-IT sources of data to help them make decisions in business context.
Join Donnie Berkholz, 451 Research, and Erin Avery, BMC Software, for a high energy, fast paced discussion on adaptive, real-time analytics that any IT operations organization can adopt to become highly prescriptive and predictive.
Join us for our next customer webinar covering the new features available in Black Duck Hub 3.0.
The latest version is designed to help Hub and Protex users streamline Continuous Integration (CI) and DevOps processes through robust policy management and rapid scanning. These capabilities provide complete visibility into the open source in apps and containers, accelerating development through early and continuous detection of vulnerabilities and out-of-policy code.
During this webinar, we’ll show you how to leverage Hub 3.0 to establish policies around the use of open source software in order to lower your organizational security, license and operational risk.
Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions.
You will learn:
•Overview of the new features, including policy management, improved scanning, additional Linux distribution support, and integration with TeamCity
•How to quickly establish open source security policies for existing and new projects
•Ways to leverage policy violations to flag or fail builds in a continuous integration environment (such as Jenkins)
Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements. During this webinar we will cover today’s challenges in ensuring good data governance and enter into a panel discussion with Prudential about their approach and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in a Question and Answer session.
So if you want to give your data governance program a head start, register today.
Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements.
During this webinar join panel experts from Prudential, Symantec and Boldon James who will explore today’s challenges in ensuring good data governance. The discussion will include practical advice from Prudential about their approach to data security and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in an interactive Question and Answer session.
So if you want to give your data governance programme a head start, register today.
Register today for an insightful webinar with ForeScout Technologies.
This webinar will discuss the recent ransomware breaches, malware attacks and potential protection strategies. Learn how ForeScout helps mitigate ransomware and other malware threats within your network environment. In addition, you’ll discover how ForeScout’s security platform helps organizations See, Control and Orchestrate enterprise security—and assist in identifying the potential risk that exists in your environment today.
Please join us to learn the results of the 2016 Future of Open Source Survey.
Today, open source drives technology and development forward. Its adoption worldwide is visible in companies ranging in size from a single employee to companies like Microsoft and Apple. All of these organizations rely on open source to innovate, reduce development costs, and speed time to market. In this evolving market, important questions remain about open source management, security, policies and procedures, and governance.
The Future of Open Source Survey includes input from new players, established leaders, and influencers across vertical markets and communities. This range of respondents drives broad industry awareness and discussions of key issues.
Please join these industry influencers as they review the top level results from the survey, and bring your questions.
Jeffrey Hammond - Forrester Research @jhammond
Paul Santinelli - North Bridge @paulsantinelli
Bill Ledingham - Black Duck Software @bill_ledingham
Jay Jay Billings - Oak Ridge National Laboratory @jayjaybillings
Follow the conversation on Twitter, using the hashtag #FutureOSS
When it comes to customer relationships, big data can usher in big opportunities or big problems. That’s why it’s vital for organizations to take a strategic approach to big data. They must clean their data, integrate it, maximize data value, comply with security and governance requirements, and make sure the right people have the right access to the data at the right times.
Join Pitney Bowes, Informatica, Looker, and Snowflake in this interactive webinar and learn how to:
•Easily integrate diverse data for more robust analysis
•Reduce time to analysis by leveraging the cloud
•Yield more effective conversions
•Achieve the elusive single customer view in context
•Deliver more relevant marketing
•Get more trusted customer insights without more risk
•Make analyzing CRM data with other sources easier
•Put analytics in the right places at the right time
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>