Browse communities
Browse communities
Presenting a webinar?

Cost of a Data Breach: How Much Can You Afford to Lose?

Mike Smart, EMEA Product Marketing, Symantec and Jessica Schönfeld, EMEA Product Marketing, Symantec.
•According to the latest "Cost of a Data Breach Study," conducted by the Ponemon Institute and sponsored by Symantec, breaches now cost organizations $5.5 million on average. Negligent insiders and malicious attacks are the top causes. The study also found that organizations with a CISO responsible for data protection can reduce breach costs by up to 35 percent.

During this webcast, you will learn best practices for avoiding a breach by: Discovering and monitoring high-risk data and users.
•Educating employees on information protection policies.
•Implementing an integrated security solution that includes data loss prevention, encryption and two-factor authentication.
Jul 26 2012
45 mins
Cost of a Data Breach: How Much Can You Afford to Lose?
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3358)
  • Upcoming (65)
  • Date
  • Rating
  • Views
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Channel
  • Channel profile
  • Symantec Internet Security Threat Report (ISTR) 2015 May 6 2015 1:00 pm UTC 30 mins
    Antonio Forzieri, EMEA Cyber Security and ISS Lead – Technology Sales and Services, Symantec
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • Move security strategy forward - Internet Security Threat Report 15 is here! May 6 2015 10:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Security running your day-to-day? Internet Security Threat Report 15 is here! May 6 2015 9:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Securing Legacy systems in the Public Sector Recorded: Mar 19 2015 32 mins
    Mark Fox Senior Principal Consultant, Data Centre Security and Compliance
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Recorded: Mar 18 2015 46 mins
    Mike Smart - Symantec Security Strategist
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Sunil Choudrie, Symantec Security Specialist
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    James Hanlon CISM, CISSP Cyber Security Strategy & GTM Lead, EMEA - Mark Fox, Sr Principle Technical Specialist
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Tom Davison (Security Specialist) C.Baker (Senior Manager Gov Affairs), J.Fletcher (Head of IT Risk Swinton Group Ltd)
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Tom Davison Symantec and David Gillick HP
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    Evelyne Lescuyer, Consultante Information Security, Symantec
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Cédric Pottier, Consultant Information Security - CISSP, Symantec
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    Laurent Heslault - Directeur cyber stratégiesPaul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • L’actu cyber du mois, so what ? Recorded: Dec 12 2014 31 mins
    Laurent Heslault - Directeur cyber stratégies, Paul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques , nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.

    •Votre rendez vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • How to achieve a proactive approach to security Recorded: Dec 9 2014 53 mins
    James Hanlon Symantec and Marco Pereira HP
    Achieving a proactive approach to security: All organisations are looking to lower their risk when it comes to Cyber threats, but increasingly need to have faster incident response and containment. The question becomes one of how can you embrace technological change while minimising IT risks? Are you looking to meet compliance regulations and audit requirements, but also improve efficiency and productivity of your IT staff? Join us to understand how talking a different approach and shifting your investment may enable to you respond faster but importantly give you better awareness.
  • The future of Endpoints & Identities: Increases in Threats, Cloud & Mobility Recorded: Dec 3 2014 46 mins
    Mike Smart at Symantec and Charles Kolodgy (IDC), Research Vice President for Security Products Service
    Join Mike Smart at Symantec and Charles Kolodgy, Research Vice President for IDC's Security Products Service on this interview-style webinar to hear about how the industry needs to evolve endpoints and identities to embrace evolution and flexible working as well as defend off increasingly complex attacks. In this session there is a twist! – you, the audience will have control over the topics we’ll choose to discuss! To conclude this session, we’ll be hearing from Charles on his view of what the future holds!
  • Die Spionage-Software Regin | Einladung zum deutschen Webcast Recorded: Dec 3 2014 62 mins
    Candid Wüest (Principal Threat Researcher) Carsten Hoffmann (Director Technical Sales and Services)
    Am 23. November 2014 hat Symantec als erstes Unternehmen Informationen über Regin, ein hoch entwickeltes Tool für die Cyber-Spionage, veröffentlicht. In den Medien wurde ausführlich darüber berichtet und wir möchten Ihnen einige wichtige Informationen über diese Bedrohung sowie dazu, wie wir Sie davor schützen, geben.

    In unserem deutschspraching Webcast am 3.12.14 möchten wir näher erläutern, was Regin ist und warum diese Bedrohung ernst ist: Regin ist deshalb als Malware so bemerkenswert, da sie äußerst komplex ist und sich in ihrer Funktionalität für die verschiedensten Zwecke anpassen lässt. Regin basiert auf einem Framework, das sich bestens für die langfristige Informationsbeschaffung eignet, indem es die Malware vor einer Enttarnung schützt. Regin unternimmt erhebliche Anstrengungen, um sich und seine Aktivitäten auf infizierten Computern zu verbergen. Für seine Tarnung werden zahlreiche der raffiniertesten Techniken eingesetzt, die wir bisher beobachten konnten.
  • 2014 Cyber Attack Review & What Can We Learn for Better Cyber Defence in 2015? Recorded: Dec 3 2014 42 mins
    James Hanlon, Cyber Strategist Symantec
    The world has changed. The increasing digitization of our personal & business lives is driving an evolution in cyber threats never seen before while forcing our relentless focus on prevention to be modified to one of resilience. This webinar explores the evolution of cyber threats across the emerging spectrum of digital interactions for businesses, governments and consumers and highlights both the human and technology shifts we need to make to not only prevent threats but become more cyber resilient in our digitally connected worlds.
  • Archiving and Backup: Accelerate your business agility and innovation Recorded: Nov 13 2014 28 mins
    David Moseley, Information Intelligence and Governance Lead & Arjan Van Proosdij, Technical Evangelist, Symantec
    The data explosion is a given, but the increase in rules and regulation are driving compliance and governance requirements and the traditional view of archiving and backup need to be refined – just adding storage is not the solution; a better approach to information life cycle management is.

    Join David Moseley & Arjan Van Proosdij as they discuss methods and share top tips for accelerating your agility and innovation when dealing with your archiving and backup solutions.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cost of a Data Breach: How Much Can You Afford to Lose?
  • Live at: Jul 26 2012 12:00 pm
  • Presented by: Mike Smart, EMEA Product Marketing, Symantec and Jessica Schönfeld, EMEA Product Marketing, Symantec.
  • From:
Your email has been sent.
or close
You must be logged in to email this