Leveraging Security Intelligence to Win the Information Security Arms Race

John Kindervag, Sr. Security Analyst, Forrester Consulting and Dan Holden, Director HP DVLabs
In today's security environment, threats can evolve more quickly than the ability to protect against them creating a security gap for most organizations. In this webcast, Forrester Analyst John Kindervag and HP DVLabs Director Dan Holden will discuss the importance of leveraging security research and threat intelligence to help close this gap. Through ongoing relationships with dedicated security and vulnerability research organizations, security professionals can gain proactive intelligence into potential future threats and how to better protect critical networks, applications and information against them.
Mar 28 2012
53 mins
Leveraging Security Intelligence to Win the Information Security Arms Race
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2856)
  • Upcoming (89)
  • Date
  • Rating
  • Views
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • Channel
  • Channel profile
Up Down
  • HP TippingPoint enhances perimeter protection to defend against advanced threats Apr 24 2014 6:00 pm UTC 60 mins
    Every time you add new software or devices to your network, you create new opportunity for hackers. To keep your business safe, you need a collaborative security strategy that defends against advanced threats like malware and botnet attacks. Staying ahead of persistent adversaries is critical—simple detect-and-block tactics will no longer keep you protected.



    Attend this webinar to learn:
    · How HP TippingPoint Security Management System works with Damballa to provide an advanced layer of protection

    · How Damballa uses the HP TippingPoint Advanced Threat application programming interface (API) to alert HP TippingPoint to infected devices in your network

    · How HP TippingPoint block identified threats at wire speed
  • Security Without Compromise: One Approach for the Financial Services Industry Recorded: Apr 15 2014 34 mins
    Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts. Updated every two hours, this robust security intelligence feed searches through hundreds of thousands of known malicious IPv4, IPv6, and DNS names and assigns a threat score of 1 to 100. Rated based on the analysis of the source, category, or threat, this score helps block traffic that poses a potential security risk. ING has had amazing success with HP TippingPoint RepDV:
    - 2 million connections blocked in 15 months
    - 75% decrease in total malware related incidents
    - 0 false positives
    ING will cover how deploying HP TippingPoint security intelligence helped simplify their network security strategy while increasing reliability and effectiveness.
  • Beyond best practices – Lessons from the HP Cyber risk report Recorded: Mar 25 2014 37 mins
    The complexity and difficulty of securing enterprises only grows with the passage of time. However, with the right information, organizations can significantly reduce their attack surface, substantially mitigate risks, and prevent the losses and damages associated with successful attacks. To that end, we examined the areas that significantly contributed to the growing attack surface in 2013. Come learn what those are and what – beyond standard best practices – you can do today.
  • Why You Need a Next Generation Firewall Recorded: Mar 3 2014 3 mins
    Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention. This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations.
  • Why you need to reconsider the OLD approach to Network Security Recorded: Feb 20 2014 42 mins
    Think your current approach to network security is lacking the next generation approach? You might be right! Join us for this webinar where Chris Rodriquez, Senior Analyst at Frost and Sullivan, will share current best practices in network security. He’ll cover approaches to network security hardware and software that will help your organization plan for the evolving threat landscape. Marco Ginocchio, Director of Regional Product Management from HP, will discuss how some of the next generation approaches to network security are being actualized in HP TippingPoint products.
  • Threat & Risk Management: Custom Digital Vaccine Creation Recorded: Feb 20 2014 48 mins
    HP TippingPoint DVLabs is on your side with over 8,600 filters right out of the box. These filters are focused on vulnerability and blocking all potential exploits on your network. But what if you need custom filter for your network? Watch Steve Povolny, manager of the Digital Vaccine team at HP TippingPoint, share best practices on how to follow the research, develop the filter, and test the performance with DV Toolkit. HP TippingPoint DVLabs allows organizations to tailor their network security strategies to even the score over the adversary.
  • Forrester's Take on the Next-Generation Firewall Market Recorded: Feb 10 2014 4 mins
    Watch this video to hear what John Kindervag from Forrester Research has to say about next-generation security.
  • Develop knowledge-based security using Zero Trust Recorded: Jan 22 2014 33 mins
    Threats are constantly mutating. Bad actors are everywhere. You could be attacked at any time from any direction. No longer are cyber attacks limited to external "hackers." All of these things makes the security professionals job much harder. To properly protect your organizations digital assets, you must transform your organization so that you can protect against all types of threats. By leveraging the concepts of Forrester's Zero Trust Network, you can build a secure network that you know is robust, agile, and able to meet the challenges of mutating threats. We call this "Knowledge-based Security". By leveraging the information, visibility, and proactive protections provided by Zero Trust, you can have the knowledge that you are providing your organization with state of the art protection.

    Additionally, you’ll hear from HP’s Senior Director of Network Security Product Management, Anthony Woolf, about how HP is providing zero-trust related capabilities through the HP TippingPoint IPS and NGFW devices.
  • How to Capture, Label, and Detect through a DNS Markov Model Recorded: Jan 16 2014 37 mins
    Quantifying which DNS hosts are unknown or infected is a complex undertaking. Building a Markov Model allows organizations to create data driven decisions based on calculated benchmarks to eliminate the guessing and diagnose infected hosts. Attend this webinar and see firsthand how the DVLabs organization custom builds a DNS Markov Model that allows for easier detection that will help you understand what is infected and what isn’t.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • 2013 4th Annual Cost of Cyber Crime Study Results: Europe Recorded: Oct 30 2013 62 mins
    2013 Cost of Cyber Crime Study: UK, Germany & France

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for the United Kingdom and Germany. For the first time, the research was conducted in France. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 110 UK, German and French organizations participated. According to the findings, cyber attacks increased 16 percent in the UK and 21 percent in Germany. The costs associated with this increase in the UK and Germany were £904,886 and €830,169, respectively. For the first time, it was determined that the average cost of a cyber attack in France was €3.89 million. Findings from the report also show that each week UK and German organizations experienced on average 1.3 successful attacks per company. French organizations experienced an average of 1 cyber attack per company.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Americas Recorded: Oct 29 2013 61 mins
    Join us for the 2013 results presentation of the 4th Annual Cost of Cyber Crime Study, conducted by Ponemon Institute and sponsored by HP Enterprise Security. This study, based on a benchmark sample of U.S. organizations, shows that cyber attacks not only increased 12 percent last year, the costs associated with those attacks increased by an average of 26 percent or $2.6 million per organization. Findings from the report also show that each week, an organization can expect two of the many cyber attacks launched against it to succeed.

    Join us for this important webinar and learn how:
    • All industries and all sizes of organizations fall victim to cyber crime, but to different degrees.
    • Denial of service, malicious insiders and web-based attacks comprise the most costly crimes.
    • Attacks can be mitigated by SIEM, enterprise governance, application security testing and other prevention-focused strategies and technologies.
  • Analyst Webcast: Not your Father's IPS: SANS Survey on Network Security Results Recorded: Oct 29 2013 54 mins
    Changing threats, business processes and technology call for a new look at network security and how it interacts with our intrusion prevention systems. But just what are the next-generation intrusion prevention systems we need to meet those threats, and what do your peers think should be in them?

    Join us for this Webcast, in which we unveil the results of our network security survey, to learn:

    •How you compare with your peers in management support for network security
    •Where you stand in IPS deployment vs. your peers
    •What features your peers would like to see in next generation IPS
    •Which elements, such as firewalls, routers, switches and clients they would like to see as part of a next generation fabric-based IPS.
    Register for this webcast and be among the first to receive access to a complimentary whitepaper on the same subject developed by Rob Vandenbrink.
  • Threat Central – Cloud based Threat Intelligence Sharing Recorded: Oct 9 2013 24 mins
    In the new generation of cyber defense, security intelligence becomes a key element. Recent technology advances provide the foundation for a new type of threat intelligence sharing platform to organize, collaborate, and manage risk more effectively. This sharing platform makes your security program more effective with actionable protection.
  • The lost art of vulnerability research Recorded: Oct 2 2013 51 mins
    What grade would you give your company on using vulnerability research to protect your organization from new security threats?
    If not an A+, learn best practices from Frost and Sullivan’s Chris Rodriguez, senior industry analyst on network security.

    In this webinar, we’ll discuss current threats that have been mitigated by leading vulnerability research and share how timely vulnerability research can help your organization prepare.
  • Cutting Through the Hype: What Is True “Next Generation” Security Recorded: Aug 13 2013 47 mins
    Organizations are struggling with new and more sophisticated threats, borderless networks, increased bandwidth requirements and more applications spread throughout the entire data center. A wealth of vendors are claiming to offer “next generation” security capabilities to address every security need under the sun. Cut through the nomenclature to learn what “next generation” really means and how it can actually help you meet today’s challenges head on and ignore all the hype.
  • Top 10 Tips to be Compliant and Secure Together Recorded: Jan 17 2013 45 mins
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • Modular Security For Today’s Cyber Threats and Cloud-Based Data Centers Recorded: Jan 17 2013 49 mins
    Network security is not just about eliminating bad traffic, it is also about making sure applications and critical data are always available to the right audience at the right time. The right network security architecture can provide security for physical assets, but also extend protection for virtual and cloud computing infrastructures without impacting performance. In fact, unlike in the past, a network security product should never be considered a bottleneck due to deep packet inspection, but should actually be capable of improving bandwidth and performance.

    About the Presenter:
    Sanjay Raja, Director of Product Marketing for HP TippingPoint, is responsible for marketing of HP TippingPoint’s Network and Cloud Security solutions. He has over 12 years of experience in various Product Marketing, Product Management, and Alliances roles primarily in IT Security. He has been in the IT industry for the last 18 years with experience in Security, Networking, Servers and Storage and Network and Application Performance Testing. In addition he has authored several papers and presented at various industry events on security, compliance and testing. Prior to HP he has worked at Cabletron Systems, 3Com, Nexsi Systems, Spirent Communications, Top Layer Networks, Symantec and most recently Crossbeam Systems. Sanjay currently holds a B.S.EE and MBA from Worcester Polytechnic Institute.
  • Social Networking: Risky for the Enterprise? Recorded: Sep 6 2012 49 mins
    Social networking for most of us is becoming wrapped into our DNA. This is especially important for the next generation workforce. Additionally, the employees today and those of tomorrow will expect the capability to blog and social network with corporate assets and corporate bandwidth. Additionally, these technologies are being widely used for corporate marketing and communication. That is why it's important to look at all aspects of securing your infrastructure and more importantly, the people that drive your organization today. This involves educating people, corporate process and the right security technologies. The following session will cover the benefits and the security risks inherit with social networking across all business verticals. Additionally, the author will provide a use case analysis of information that is gathered via web beacons that harvest information unknowing to the user.
  • Understanding Vulnerabilities to Better Mitigate Threats Recorded: Jun 21 2012 45 mins
    Vulnerabilities that exist in today’s commercial and custom software are the primary target for attackers. The most severe of these vulnerabilities are those that can result in remote code execution – that is an attacker can take complete control of another system for the purposes of stealing information, defacing property or just causing trouble. In this session, Brian Gorenc, will demonstrate how to analyze a vulnerability and the steps required to weaponize it. Centering on a vulnerability in a Microsoft application, the demo will show you how an attacker can quickly move from proof-of-concept to remote code execution. The discussion will also include thoughts on mitigation strategies for reducing risk.
Delivering Advanced Network Defense to the Enterprise
This channel covers the latest topics in network security, virtualization security, and threat research from HP TippingPoint and HP DVLabs to help security professionals protect their network against ever-evolving threats
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging Security Intelligence to Win the Information Security Arms Race
  • Live at: Mar 28 2012 4:00 pm
  • Presented by: John Kindervag, Sr. Security Analyst, Forrester Consulting and Dan Holden, Director HP DVLabs
  • From:
Your email has been sent.
or close
You must be logged in to email this