Web 2.0 is changing the way we can talk to our customers – Are you ready?

Mike Smart, Senior Manager, Products and Solutions, Symantec
Website Security Series Part 1
May 31 2012
45 mins
Web 2.0 is changing the way we can talk to our customers – Are you ready?
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • Website Security Threats: May Update May 22 2014 8:30 am UTC 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: Spotlight on the Netherlands May 2 2014 7:30 am UTC 30 mins
    The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Website Security Threats: April Update Recorded: Apr 17 2014 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: March Update Recorded: Mar 13 2014 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Is Your Website the Soft Underbelly of Your Organisation? Recorded: Mar 11 2014 44 mins
    Whilst not every organisation may be a target of an APT or targeted attack, it’s important that all companies large or small understand these attacks as a way to help build stronger defences against the constantly changing threat landscape.
    · Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010.
    · In 2012 the number of Web based attacks increased by 1/3 with approximately 247,350 Web-based attacks were blocked each day.
    · 5291 New Vulnerabilities were discovered in 2012
    · Spam accounts for 69% of all email and one in 414 emails are from phishers

    All security and IT professional need to understand the new reality classic textbook protections may well not be enough. Join Symantec Website Security solutions to understand how you can protect your websites from vulnerabilities and malware and how SSL can prevent your company and your customers.
  • The Rise of Hacktivism and Insiders: New Tactics, New Motives Recorded: Feb 18 2014 35 mins
    Insiders Outsiders, Hactivists, Cybercriminals – the lines have blurred but the game remains the same – how you can protect your infrastructure and organization from web based and cyber threats.

    With incidences of malware and vulnerabilities on the rise – how does your organisation measure up and how are you prepared for the future? Is your web infrastructure robust enough to cope? Join Symantec to understand the threat landscape and motivations that drive them.
  • Website Security Threats: February Update Recorded: Feb 13 2014 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • SSL Explained - Making the Best Choice for Your Business Recorded: Jan 23 2014 29 mins
    Website security is an essential but often overlooked part of an ecommerce or online strategy – join Symantec for this 30 minute webinar and learn how you can make the best choice for your business
  • Website Security Threats: January Update Recorded: Jan 9 2014 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: December Update Recorded: Dec 4 2013 28 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Cybercrime – Attack of the Cyber Spies Recorded: Dec 3 2013 42 mins
    The global price tag of consumer cybercrime is estimated to be some 133BN USD (97BN EUR) annually (which is enough to host the 2012 London Olympics nearly 10 times over) and impacts 12 victims per second every single day. But how do hackers crack a corporation and individuals?

    The weak link could be you and your employees…Join Symantec
    Website Security Solutions to understand the threat landscape, the implications and how you can take proactive steps to protect yourself and your organisation.
  • Website Security Threats: November Update Recorded: Nov 7 2013 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Maine, turvallisuus, luotettavuus... verkkokaupankäynnin valuutta Recorded: Oct 31 2013 31 mins
    Osallistu 30 minuutin webinaariin, jossa jaamme tuoretta tietoa verkkosivustojen tietoturvasta ja verkkokaupankäynnistä.Tavoitteemme on yksinkertainen: haluamme tehdä verkkoliiketoiminnan harjoittamisesta turvallisempaa sinulle, asiakkaillesi ja kaikille, joihin olet yhteydessä internetin välityksellä
  • Website Security Threats: September Update Recorded: Sep 26 2013 28 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: August Update Recorded: Aug 22 2013 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: July Update Recorded: Jul 4 2013 26 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • TURNING SECURITY INTO SALES SUCCESS - Seven concepts you need to know Recorded: Apr 4 2013 35 mins
    Starting up an online company can be a fraught business. So in the tradition of a Harvard Business School case study, we created a fictional company that uses real Symantec technology… to tell the story, help you to avoid some common mistakes and offer some real world tips on how you can help your business succeed in a competitive online world.
  • Next-generation Algorithms: Providing Better Security and Increased Performance Recorded: Mar 27 2013 35 mins
    The security environment is constantly changing as hackers become more sophisticated and your customers increasingly reach for mobile or tablet devices to carry out transactions online. Keeping up with the developments in malware and continuing to provide a secure and trustworthy experience for your customers is vital. As a leader in SSL security, Symantec is always working on new solutions that help your business to anticipate and meet increasing security demands, and provide a safe environment for your customers. Join the Symantec team to learn more about how your business can benefit.
  • Next-generation Algorithms: Providing Better Security and Increased Performance Recorded: Mar 27 2013 35 mins
    **The session time listed will update automatically to your local time once you have set up a BrightTALK account**

    The security environment is constantly changing as hackers become more sophisticated and your customers increasingly reach for mobile or tablet devices to carry out transactions online. Keeping up with the developments in malware and continuing to provide a secure and trustworthy experience for your customers is vital. As a leader in SSL security, Symantec is always working on new solutions that help your business to anticipate and meet increasing security demands, and provide a safe environment for your customers. Join the Symantec team to learn more about how your business can benefit.
Webcasts targeted to IT Security Professionals
.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 is changing the way we can talk to our customers – Are you ready?
  • Live at: May 31 2012 1:00 pm
  • Presented by: Mike Smart, Senior Manager, Products and Solutions, Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this