Hi [[ session.user.profile.firstName ]]

Contain Data Leakage by Raising Your Security IQ

Headlines about compromised enterprises seem to be a weekly occurrence lately, if not daily. Whether data leakage incidents are driven by the likes of botnets, malware, viruses, etc., or non-malicious insiders, organizations’ bottom line and reputations are being severely affected.

Fr
Headlines about compromised enterprises seem to be a weekly occurrence lately, if not daily. Whether data leakage incidents are driven by the likes of botnets, malware, viruses, etc., or non-malicious insiders, organizations’ bottom line and reputations are being severely affected.

From published internal emails to entire customer lists, intellectual property theft is often the result of a simple security program oversight. This webinar has been designed to help companies better comprehend the scope of data leakage and IP theft and, more importantly, how you can glean better security intelligence by:

· Considering the focus areas your company needs to encompass in your security program, from devices to education

· Understanding what use cases to look for and which Primary Data Sources to gather and monitor to gain the most visibility into the security and threats both internal and external

· Reviewing best practices for handling SIEM events and reducing Mean Time to Resolution (MTTR) for any detected breaches
Recorded Apr 5 2012 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Luke LeBoeuf, Principal Security Consultant, HP Enterprise Security
Presentation preview: Contain Data Leakage by Raising Your Security IQ
Recommended for you:
  • Date
  • Rating
  • Views
  • A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

    This session will cover:

    • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

    • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

    • How businesses are adapting and changing their threat detection and incident response to reduce risk posture
  • As recently reported in the WSJ, 1% of users represent 75% of cybersecurity risk. We know, we were surprised too. This and other shocking truths about the causes and consequences of cloud vulnerabilities are uncovered in our latest cybersecurity report - gathered from our findings across over 10 million users, 1 billion cloud assets, and 91,000 unique apps.

    Get the inside scoop in our webinar where you’ll learn what it all means directly from our customer insights and data guru, Ayse Kaya Firat:

    – Top cloud cybersecurity trends that fly under your radar
    – What the distribution of cloud cybersecurity risk means for your ability to act on it
    – Three key security skills you should master for an immediately safer cloud environment
  • Whether you are building an incident response program from scratch or expanding an existing security operations centre you need to ensure it is aligned to helping you build a better cyber defence centre. The services team at Mandiant have gained experience responding to hundreds of computer security incidents every year and with this knowledge we would like to take a few minutes to discuss how you can develop your organisation’s full portfolio of technical, organizational and administrative capabilities to effectively protect themselves against advanced threat actors.
  • Cloud adoption in higher education is greater than in any other industry, with 83% using Google Apps or Office 365. As universities move from on-premise to public cloud apps to meet the need for modern collaboration tools and the increasing demand for BYOD, IT leaders are increasingly aware of the security risk to sensitive research data and student personal information.

    In this webinar will discuss the unique security issues of higher education including faculty file sharing and employee BYOD.
  • Join the Informatica Cloud product team to see the new Informatica Cloud platform in action and find out what's new in the Winter Release of Informatica Cloud and explore all the key capabilities.
    The Winter release of the Informatica Cloud is packed with many rich functionalities, with a continued focus on self-service and ease of use. Updates include:
    •Enhanced Cloud Mapping Designer
    •Greater Data Masking transformation capabilities
    •Platform enhancements for REST API, Cloud Test Data Management, secure agent and Real-time processes
    •New connector capabilities for Salesforce Marketing Cloud, Microsoft Azure Data Lake, Microsoft DocumentDB, SAP Concur V2, JD Edwards, Zendesk and more!
    •Enhanced connectors for Tableau, NetSuite, Amazon, Oracle, Microsoft, Marketo, Workday, Zuora and others
    •And so much more!
  • Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

    Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

    - Which frameworks and methodologies can help get you started
    - Vital questions you should be asking your vendors
    - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.

    Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.

    Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.

    In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Contain Data Leakage by Raising Your Security IQ
  • Live at: Apr 5 2012 7:00 pm
  • Presented by: Luke LeBoeuf, Principal Security Consultant, HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this