Leon Brown - Product Marketing, Symantec Website Security & Avishay Zawoznik - Security Researcher, Imperva Incapsula
After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.
Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service
With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:
- the value of code signing today and the new code signing use cases in the world of IoT
- the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.
- the security and development costs to take into account
- how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing
Akhil Verma, Product Marketing Manager at Symantec and Andy Shoemaker, Founder and CEO of NimbusDDOS
Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.
Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.
Ben Herzberg, Head of Security Response at Imperva Incapsula and Akhil Verma, Product Marketing Website Security at Symantec
The latest DDoS Threat Report from Imperva Incapsula shows that DDoS attacks continue to grow in size with a significant increase in network layer attacks. With the scale and reach of DDoS threats increasing, enterprises need to be vigilant to protect their assets and customer data. Join our webinar to learn how you can protect your enterprise from global cybersecurity threats.
At the webinar you’ll learn:
• Insights into global DDoS attack patterns
• Best cyber security practices
• How to harden your current security practices
• How to build a scalable cyber security strategy
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).
The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.
Join us in this webcast and find out:
-what are the main benefits of ECC in terms of strength, reliability and capacity
-how ECC/RSA hybrid certificate chains work
-what is the enrolment process
Everything you need to know about website security and online threats
Symantec Website Security Solutions take SSL protection and trust to a whole new level. Secure your website, increase customers' confidence, and reach the full online potential of your business. You can learn about the threat landscape and Symantec product updates by subscribing to this channel.
This month’s webinar will feature information from our 2016 mid-year security roundup report where we detail out the latest trends within the threat landscape affecting the world. From Ransomware and Business Email Compromise to Data Breaches we’ll cover the most important threats that are targeting our customers and businesses. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top threats observed.
Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.
In this webcast, you will learn:
- About other available Azure programs
- Application development tests on Azure
- What other customers are doing on Azure and how it is paying large dividends
What every organization needs to know before, during, and after a ransomware attack.
Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.
Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.
Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.
•Why ransomware is surging.
•Where it comes from.
•What to do before, during, and after an attack.
•Should you pay or not? What to consider.
Exploit kits don’t stop. Neither should your business.
La versión 3.2 del PCI DSS (Payment Card Industry Data Security Standard) ha sido anunciada - las organizaciones que deben cumplir precisan entender los cambios y sus implicaciones. Participe de nuestro webinar para entender más sobre por qué fue lanzado tan rápido y cómo puedes parar mejor a tu organización.
• El alcance de la nueva versión PCI DSS 3.2
• ¿Qué significa para su negocio?
• ¿Por qué deberías implementar los cambios, aunque no sean mandatorios?
• ¿Qué puede venir en el futuro próximo?
Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?
Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
•A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
•A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
•Best practices and technologies for protecting your organization against ransomware.
Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
Christopher Ellefsen, BKK Group, Senior Network Engineer
Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
Jack Whitsitt, EnergySec, Senior Security Strategist
Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.