The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.
Our personal and professional attack surfaces have never been greater, and they are only expected to grow as organizations and individuals continue to increase their reliance on the digitally connected world for a variety of tasks.
Throughout 2014, and into 2015, Verisign iDefense® Security Intelligence Services observed cyber criminals increasing their focus on attacking point-of-sale (PoS) systems and developing and deploying new banking malware. Global events continue to drive a higher frequency and severity of hacktivist activities and pro-state cyber operations. Vulnerable legacy and open-source operating systems continued to complicate the security of critical networks.
This report presents an overview of the key cyber security trends Verisign has noted and expects to see throughout the remainder of 2015. It features conclusions drawn from Verisign iDefense research and analysis covering cyber-crime, hacktivism and vulnerabilities.
This session will be about the process that takes place once a data breach occurs. The pressure is extremely high and various teams have to come together in this time of emergency, including incident response team, the board and the executive management, the PR team, risk management and legal. Goals are to strategize and minimize the damage, contain the threat, and ensure that the business continues running in spite of a major incident and at the same time public concerns and pressure are addressed in an efficient manner.
Getting the call
Arriving on scene (first observations and attacker profile analysis)
Crisis management with key internal tenants
Evidence collection and preservation, digital forensic investigation and analysis
As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.
During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data.
Join us on 8th July 4pm SGT to hear from Sean Duca, Vice President and Regional Chief Security Officer for Asia Pacific at Palo Alto Networks, as he shares highlights and key takeaways from the report, and answers questions during the Live Q&A session.
Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
Combating insider threats is an extremely daunting task. Even more challenging is to unearth and defend crimes that could be committed by potential malicious insiders who are organized and enjoy a high degree of trust. This presentation shall discuss the current state of insider threats, the detection mechanisms available, why they are not enough and also suggest practical methods that can help detect and prevent potential frauds. Elucidated through a case study, this presentation shall walk you through on how we developed and implemented a framework using BIG DATA technology, user attributes and proven methods of behavioral science to unearth potential malicious insiders. With a detection rate of 90 percent, this is a highly adaptable model and gets easily integrated within your SIEM/Incident management and delivers great Return on Investment.
With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have changed their tactics; so must you.
During this webcast, Rafe Pilling, Senior Security Researcher for Dell SecureWorrks Counter Threat Unit (CTU), will share advice based on real-world examples to help ensure your organisation is infinitely better prepared to respond to a security breach.
Key topics covered include:
· A view of the evolving threat landscape and how this could impact you
· Examples of critical mistakes Dell SecureWorks has viewed in real-world cases
· Developing a robust incident response plan
· Maximising the value of current controls and improving your overall security posture
We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider threats consistently rank as a top concern, they have not been decomposed and mitigated like enterprise exploits. We will uncover threat vectors and behavioural traits and present new techniques for discovering and mitigating cloud insider threats. This webcast will also include a breakdown and comparison of different cloud models.
Attendees will also learn:
• Techniques for reconstructing audit trails to help with the deconstructing of an insider threat
• Ways to quickly recover from the effects of an insider threat to minimize business disruption and impact
Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
Organizations spend millions to protect data from outside threats, but are investing far less to protect themselves against attacked from inside. Security experts agree that there is currently no way of completely block hacks or prevent insiders from leaking information. But is the situation completely hopeless?
This session will present a new paradigm for keeping sensitive data safe by classifying and protecting it at the source. How to enhance the performance of DLP? How to enable collaboration and BYOD in a secure manner? How can you track all organizational data and pinpoint risk? How can you make the threat of data theft and loss irrelevant?
In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.