Hi {{ session.user.profile.firstName }}

Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία

Recorded May 3 2012 1 min
Presented by
Christos Ventouris, Information Security Specialist
Presentation preview: Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
Recommended for you:
  • Date
  • Rating
  • Views
  • In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.

    While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.

    Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
  • According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
  • Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.

    He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.

    Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
  • Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
    Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
    Che benefici puoi ottenere con le appliance NetBackup di Veritas?
    Scoprilo partecipando al nostro Webcast del 7 ottobre.
  • The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.

    In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).

    After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
  • Comprenez ce qui s’est passé et rétablissez l’activité rapidement

    Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également

    Inscrivez-vous ici.

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
  • Live at: May 3 2012 8:00 am
  • Presented by: Christos Ventouris, Information Security Specialist
  • From:
Your email has been sent.
or close
You must be logged in to email this