Kosten einer Datenpanne: Welchen Verlust können sie sich leisten?

Thomas Hemker, Security Strategist, Symantec
Laut der aktuellen Studie "Kosten einer Datenpannen", die das Ponemon-Institut im Auftrag von Symantec durchgeführt hat, kosten Sicherheitsverstöße Organisationen im Schnitt 5.500.000 $. Fahrlässige Mitarbeiter und böswillige Angriffe sind die Hauptursache. Die Studie fand heraus, dass Organisationen die über einen für den Informationsschutz verantwortlich CISO verfügen, die Kosten um bis zu 35 Prozent reduzieren konnten.

In diesem Webcast erfahren Sie, Best Practices zur Vermeidung einer Datenpanne:
•Die Entdeckung und Kontrolle von Hochrisiko-Daten und Usern.
•Aufklärung der Mitarbeiter über die Informationsschutz Richtlinien.
•Die Implementierung einer integrierten Sicherheitslösung, die Data Loss Prevention, Verschlüsselung und Zwei-Faktor-Authentifizierung beinhaltet.
Aug 30 2012
37 mins
Kosten einer Datenpanne: Welchen Verlust können sie sich leisten?
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (80)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • Symantec Internet Security Threat Report (ISTR) 2014 May 16 2014 9:00 am UTC 60 mins
    En 2013, les attaques de sécurité ont été encore plus complexes. Même si le focus reste sur les attaques ciblées (en augmentation de 91%), la cybercriminalité est malheureusement toujours d’actualité pour les entreprises, les cybercriminels ayant mené les attaques les plus préjudiciables jamais enregistrées (+ 62% de violation de données).

    Pour en savoir plus, inscrivez-vous à ce webcast. Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France du Symantec Internet Security Threat Report, rapport annuel sur les menaces et tendances de sécurité concocté par nos analystes du Symantec™ Global Intelligence Network.
  • Nuevo Symantec Internet Security Threat Report (ISTR) 2014 May 14 2014 8:00 am UTC 60 mins
    Cada año Symantec ofrece una presentación del Informe de Symantec sobre Amenazas a la Seguridad en Internet, no se lo pierda este año.

    El informe sobre amenazas a la seguridad en Internet ofrece un análisis y los aspectos generales de la actividad mundial anual de las amenazas. El informe se basa en los datos recopilados por la Global Intelligence Network, utilizados por los analistas de Symantec para identificar, analizar y ofrecer comentarios sobre las tendencias emergentes en ataques, actividad de códigos maliciosos, phishing y spam.

    Registrese ahora al Webcast para conocer de primera mano los resultados y ultimas tendencias que pueden afectar a las medidas a adoptar y a considerar en sus entornos.

    Conectese para que se lo explique el experto de symantec en directo y pueda hacer las preguntas que desee.
  • Symantec Internet Security Threat Report (ISTR) avslöjar May 13 2014 8:00 am UTC 60 mins
    2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 8 2014 8:00 am UTC 60 mins
    Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 12:00 pm UTC 60 mins
    Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 8:00 am UTC 60 mins
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Cyber: The Catalyst to Transforming your Security Programme Recorded: Apr 2 2014 47 mins
    1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Partner with an information security leader for your email security. Recorded: Jul 17 2013 35 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries. Spam, phishing, and malware data is captured through a variety of sources. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers.
    This intelligence enables us to build protection technologies that can be leveraged across our products to ensure that we protect all of our customers’ people and information.
    In this webcast we will highlight some of the latest Internet attack trends and explain why you should partner with an information security leader for your email security.
  • Is cloud security right for your business? Recorded: Jul 16 2013 37 mins
    Symantec provides email and web security as a virtual appliance, a hardware appliance or a cloud service. We have expertise in all deployment platforms so, rather than driving you to purchase a specific product, we can help you determine which is best for you.
    During this 30 minute webcast we will help you to understand what questions you should be asking yourself to determine whether a move to the cloud is the right move for your business.
  • Symantec Cyber Week: La Protezione dei sistemi critici Recorded: Jun 27 2013 60 mins
    Perchè i Server? La Protezione dei sistemi critici
    La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la conformità è l’unico strumento per per ridurre il rischio in caso di attacco
    In questo webcast approfondiremo i vantaggi delle soluzione end point protection ed anche di server hardening
    Partecipa a questo webcast per pianificare al meglio la tua politica di Cyber Security.
  • Symantec Cyber Week: Le politiche di controllo Recorded: Jun 21 2013 39 mins
    Le politiche di controllo servono? Quali?
    Non pensare ad una politica di controllo, compreso il monitoraggio delle vulnerabilità, della correlazione degli eventi di sicurezza, e delle procedure di risposta in caso di attacco rende inefficaci gli investimenti fatti in sicurezza
    Se si vuole davvero ridurre il rischio di un attacco informatico, ogni organizzazzione deve monitorare lo stato della propria sicurezza con il corrispettivo rischio, deve avere una fonte di intelligence per una visibilità su cosa stia accadendo in tempo reale
    Partecipa a questo webcast per valutare quanto un’attività di intelligence sia utile realmente al tuo business.
  • Hardening de serveur ou comment diminuer rapidement vos risques Recorded: Jun 21 2013 42 mins
    De par la nature des informations que les serveurs hébergent, les services pour lesquels ils sont configurés, leurs contraintes d’accessibilité, il est temps de repenser la sécurité des serveurs et leur mise en conformité pour limiter les risques en cas d’attaque. Faites le point avec nos experts et découvrez les solutions adaptées à ces problématiques spécifiques.
  • Symantec Cyber Week: La Protezione degi End Point Recorded: Jun 20 2013 41 mins
    Gli End Point: tutto quello che devi sapere per proteggerli
    La sicurezza nel suo punto cardine: contrastare il malware e proteggere i dati
    Non è una novità che i codici malevoli siano ogni giorno sempre più complessi. Un partner come Symantec sa come pianificare una strategia di difesa. Da una soluzione fondamentale come Symantec EndPoint Protection alle funzionalià di crittografia, per una protezione del dato a tutto tondo
    Partecipa a questo webcast; scopri cosa ti da di più Symantec.
  • Symantec Cyber Week: Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH Recorded: Jun 18 2013 37 mins
    Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH
    Per proteggere le aziende da attacchi informatici, è importante capire come operano gli attacanti. Questo webcast descrive l’anatomia di un attacco nelle sue 5 fasi: Reconnaissance, Incursion, Discovery, Capture ed Exfiltration
    Verranno inoltre analizzate le principali tecniche impiegate e le soluzioni per prevenirle e/o contrastarle oltre al relativo impatto sul business (rilevato dalla ricerca “Cost of a Data Breach 2013”)
    Partecipa a questo webcast per vedere come si sono evolute le cyber minacce e come stanno influenzando le realtà produttive.
  • Symantec Cyber Week: Cosa sta DAVVERO succedendo? Il Security Threat Report Recorded: Jun 17 2013 45 mins
    Cosa sta DAVVERO succedendo? Il Security Threat Report
    Il Security Threat Report fornisce una panoramica e un'analisi di attività delle minacce a livello mondiale nel 2012. Dai dati della Global Intelligence Network, esperti di Symantec analizzano le tendenze emergenti negli attacchi, nelle vulnerabilità e negli obiettivi.
    Inoltre, l’ultima ricerca “Cost of a Data Breach Report 2013” traccerà gli impatti economici per le organizzazioni nel caso di attacchi informatici
    Partecipa a questo webcast per avere un aggiornamento sul panorama delle minacce e della sicurezza nel 2013 e sulle conseguenze nel business.
  • Supervision pour une cyber vision Recorded: Jun 14 2013 40 mins
    Pour limiter les risques d’une cyber-attaque, la politique de sécurité doit comprendre la mise en place d’une politique de supervision incluant la surveillance des vulnérabilités, la corrélation des événements de sécurité, les procédures de réponse en cas d’attaque… Lors de ce webcast, nous vous invitons à faire le point sur les solutions de SOC, SSIEM, Services Managés et leurs bénéfices.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • Transformational smart cities: cyber security and resilience 10:00 BST/11:00 CET Recorded: Jun 11 2013 52 mins
    Smart cities are on the increase worldwide, and especially within Europe there are many initiatives stimulated by the EC and the national governments. Local administrators and policy makers will be increasingly driven to make their cities competitive in order to attract businesses, talent and taxpayers, and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.
    Smart city deployments will involve multi-faceted developments, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology including critical and complex ICT implementations.
    Choosing reputable, experienced thought leaders as partners in conceiving such complex developments is an important step in the right direction towards building resilient smart cities for the twenty-first century.

    Attend our webcast to learn more!
  • Les 5 étapes d’une cyber-attaque Recorded: Jun 7 2013 33 mins
    Afin de protéger votre entreprise des cyber-attaques, il est important de comprendre comment les attaquants opèrent. Lors de ce webcast, nous vous proposons d’analyser les 5 phases d’une attaque (reconnaissance, incursion, découverte, capture, exfiltration), les principales techniques employées, ainsi que les solutions adaptées à chaque phase.
  • Mobile Threats (Internet Security Threat Report) Recorded: Jun 6 2013 60 mins
    Did you know that 32% of mobile malware is aimed at stealing information?
    The rapid increase in mobile working, the demand for higher levels of productivity and the growing trend of Bring Your Own Device puts you under new pressure, and exposes your critical business data to additional risk.
    Learn how solutions for enterprise mobility from Symantec can help you to enable, manage and secure mobile endpoints, apps and data.
    By attending our webinar we'll show you how the solutions for enterprise mobility protect business- critical data and apps – wherever they are accessed, whatever the smartphone, tablet or other device.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Kosten einer Datenpanne: Welchen Verlust können sie sich leisten?
  • Live at: Aug 30 2012 12:00 pm
  • Presented by: Thomas Hemker, Security Strategist, Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this