Hi [[ session.user.profile.firstName ]]

Website Threats: It’s Not All About the Hacker Anymore

Website Security Series Part 3

The external threat landscape is evolving; web-based malware and legitimate website hacking is continuing to fluctuate as we learn and adapt our network defence strategies, or externalise our infrastructure to mitigate risk. However, do these initiatives a
Website Security Series Part 3

The external threat landscape is evolving; web-based malware and legitimate website hacking is continuing to fluctuate as we learn and adapt our network defence strategies, or externalise our infrastructure to mitigate risk. However, do these initiatives around protection extend to our customers? 
Every organisation has a web presence and increasingly this presence is not just for broadcasting corporate brands and products; it is used to collect and socialise personal information from customers and constituents and process regulated financial transactions.

In this session Symantec will discuss:
- Top threats that target customer identities
- How the Trust model of SSL has survived the last 18 months
- Why the Internet’s top brands are moving to Always-On SSL
- Why not all SSL certificate infrastructures are created equal and how this can influence business growth
- How to manage an expanding cryptography infrastructure effectively

Mike Smart is the Senior Manager of International Product and Solutions at Symantec.
In his role, Mike is responsible for driving Symantec’s Trust Services business across International and emerging markets. He joined Symantec in 2012 from SafeNet where he was Director of Products and Solutions in EMEA.
Mike has a strong history in the SMB and Enterprise IT Security arena and has been at the forefront of introducing new technologies and solutions to the market in areas such as Cloud Security Solutions, Information Leakage Detection and Prevention and Unified Threat Management. Mike is an active member of the UK’s Get Safe Online not-for-profit organisation which provides a leading source of unbiased, authoritative information on protection against fraud, identity theft, viruses and many other problems encountered online.
Recorded Jun 21 2012 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Smart, Senior Manager, Products and Solutions, Symantec
Presentation preview: Website Threats: It’s Not All About the Hacker Anymore
Recommended for you:
  • Date
  • Rating
  • Views
  • Achieving Management and Operations Excellence Achieving Management and Operations Excellence Lee Kirby Recorded: May 3 2016 7 mins
    No matter how well designed and built your data center infrastructure may be, ultimately it is the day-to-day operations activities and management decisions where the success of your mission stands or falls. In fact, the leading cause of downtime is human error. To mitigate risks, achieve your business goals, and meet uptime requirements, it is critical to unify operating behaviors with the functionality of your infrastructure. These panelists will discuss how they have achieved M&O excellence across their global portfolios leveraging the Uptime Institute M&O Stamp of Approval.
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecuritywith Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Key Findings from Symantec’s 2016 Internet Security Threat Report Key Findings from Symantec’s 2016 Internet Security Threat Report Kevin Haley, Director, Symantec Security Response Recorded: May 3 2016 57 mins
    Cyber attacks are increasing in number and sophistication. Today’s threats differ from those encountered a month ago. What can you do to improve your security posture?

    Register for our webcast and receive insights into protecting your organization and its brand, including simple steps to take now and in the future.
  • Corporate Governance for CISOs: Asset Management Corporate Governance for CISOs: Asset Management Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 3 2016 58 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • Running Successful Risk Workshops Running Successful Risk Workshops Ian Beale Executive Advisor - CEB Audit and Risk Leadership Councils Recorded: May 3 2016 62 mins
    This event is designed for Heads of ERM, ERM Directors, ERM Managers, and other direct reports of the Chief Risk Officer. It is designed to teach the basics and also best practices of conducting a successful risk assessment workshop plus tactics for impactful workshop facilitation. Participants will learn a number of tactical ERM practices that can be implemented immediately.
  • April Monthly Threat Webinar – 0-Days & Virtual Patching April Monthly Threat Webinar – 0-Days & Virtual Patching Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: Apr 29 2016 31 mins
    This month’s threat webinar will discuss how 0-days are used, who uses them, and what the good vulnerability researchers do to ensure people and organizations are protected.
  • Building An IT Vendor Risk Management Program Building An IT Vendor Risk Management Program Mike Rothman, Securosis | Tom Turner, BitSight Recorded: Apr 28 2016 58 mins
    Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.

    In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.

    Viewers will learn about:

    - Understanding Third Party IT Risk
    - Structuring Vendor Risk Management Programs
    - Evaluating Vendor Risk
    - Ongoing Vendor Monitoring and Communication
  • Adopt IT Operations Analytics to Make Better Decisions, Faster Adopt IT Operations Analytics to Make Better Decisions, Faster Donnie Berkholz and Erin Avery Recorded: Apr 28 2016 53 mins
    In the digital era, IT has an extraordinary opportunity to become a data-driven business partners helping the business achieve its goals of revenue generation, cost reduction, and risk mitigation. However, IT reporting and analytics have historically focused on descriptive and diagnostic work – describing what happened and why. The speed and agility of the digital revolution demands the ability to not only describe what happened in the past but to predict what might happen in the future and to make recommendations about what should be done.

    IT operations analytics offers IT organizations a path to evolve the use of machine, operational and business data for more effective, forward-looking prioritization and decision-making. And in a recent BMC sponsored survey, 79% of IT pros said they would be more effective at their job if they had access to non-IT sources of data to help them make decisions in business context.

    Join Donnie Berkholz, 451 Research, and Erin Avery, BMC Software, for a high energy, fast paced discussion on adaptive, real-time analytics that any IT operations organization can adopt to become highly prescriptive and predictive.
  • Black Duck Hub 3.0:  Enhanced Policy Management Black Duck Hub 3.0: Enhanced Policy Management Pat Durante - Senior Director Education Services, John Beaudoin - Senior Instructional Designer, Dave Gruber - VP of Product Recorded: Apr 28 2016 58 mins
    Join us for our next customer webinar covering the new features available in Black Duck Hub 3.0.

    The latest version is designed to help Hub and Protex users streamline Continuous Integration (CI) and DevOps processes through robust policy management and rapid scanning. These capabilities provide complete visibility into the open source in apps and containers, accelerating development through early and continuous detection of vulnerabilities and out-of-policy code.

    During this webinar, we’ll show you how to leverage Hub 3.0 to establish policies around the use of open source software in order to lower your organizational security, license and operational risk.

    Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions.

    You will learn:
    •Overview of the new features, including policy management, improved scanning, additional Linux distribution support, and integration with TeamCity
    •How to quickly establish open source security policies for existing and new projects
    •Ways to leverage policy violations to flag or fail builds in a continuous integration environment (such as Jenkins)

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Website Threats: It’s Not All About the Hacker Anymore
  • Live at: Jun 21 2012 9:00 am
  • Presented by: Mike Smart, Senior Manager, Products and Solutions, Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this