The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.
Participants will learn:
· Methods for simplified discovery of anomalous user behavior
· Strategies for enabling fast incident response decisions
· How to cope when bombarded with false positive alerts
· Common attacker methods (and why they’re so often successful)
· Why you need to monitor privileged and risky accounts
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.
Attend this webinar and learn how to:
· Discover sensitive data, risk, and vulnerabilities
· Detect and block active attacks
· Investigate incidents and automate remediation
· Demonstrate consistent policy application across all sensitive data
Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.
With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.
All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.
The SHA-1 algorithm at the core of many SSL certificates is in danger of being compromised by criminals. Google, Mozilla, and Microsoft are phasing out SHA-1 support in their browsers very soon by showing degraded visual indicators.
Fortunately, SHA-2 replacement certificates are available and much stronger to protect your website. Join us for this webinar to learn:
-Key dates for replacing SHA-1 certificates
-How you can get a stronger SHA-2 certificate at no extra cost
-How to replace your certificate
We'll also highlight how Symantec is helping you stay ahead of internet threats and keeping your business secure.
Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.
To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.
In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.
Download this webinar to learn:
How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
Whether optimism bias exists in these industries and how it may be affecting overall security performance
Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
Insider Threats represent a major security blind-spot where an increasing number of today’s security incidents occur. Highly publicized insider data theft, such as the recent Morgan Stanley breach or AT&T call center incident, highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats.
Detecting insider threats has become increasingly difficult with the large volume of data generated through normal user activities and lack of visibility into actual user behavior. Most organizations rely on system logs from applications and devices that typically contain hundreds or thousands of discrete events in obscure technical language, making it nearly impossible to determine what a user actually did.
Join our upcoming webinar “Insider Threats: Out of Sight, Out of Mind?” to learn about the most popular tactics to combat insider threats and how to identify indicators of insiders becoming threats. This webinar will share best practices and how to adopt an early warning system to reduce your risk and strengthen your security posture.
When: Thursday, July 30th @ 11am EDT
• Insight into the state of insider threats
• Most popular tactics to combat insider threats
• Reduce the risks posed by insider threats
Traditional endpoint solutions were designed to deal with static, known threats. They accumulate large threat databases and signatures and when matches are found the threat is blocked. This approach simply does not work against today’s advanced and unknown attacks. And while organizations must protect every single endpoint, both traditional and mobile, an attacker only needs to compromise one to cause damage. Register now for this webinar where you will:
• Learn why protecting the multitude of endpoints is an on-going challenge
• Find out the importance behind detection and containment on all types of endpoints from PC to mobile
• Hear how FireEye offerings can help proactively protect against unknown threats on the endpoint
This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
So what can you do today to keep your security ahead of these trends?
This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.
We will also talk about:
- The latest strategies and techniques cyber-criminals are using today
- Concrete steps you can take to keep your organization safe
- What to do about Internet security in today's cloud and mobile first IT landscape
The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?
This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.
You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.
Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.
In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.
A seemingly never-ending string of large scale data breaches across all sectors of the economy and government have had devastating affects on countless individuals — and irreparably damaged organizations of all kinds. It’s been proven that privileged users, and the accounts and credentials they use, are a crucial element in conducting a successful attack. But it’s possible to protect those users and stop data breaches in their tracks.
In this webcast, we’ll explain how Xsuite and privileged identity management can stop attackers at multiple points in the data breach lifecycle, preventing damage and disruption. Join us to learn:
- Who are privileged users and why are they important?
- How do attackers exploit privileged users and their credentials to carry out breaches?
- See a hands-on demonstration of Xsuite and how it can manage, control, and protect privileged users and credentials and your business assets.
Register now to join us live at 1:00 pm ET Thursday, July 30, 2015 or on demand afterwards.
Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
Operating from the belief that education is the most powerful weapon, one of our foremost security researchers will provide an analysis on a recently documented stealthy malware family named Stegoloader. Our upcoming webcast will unveil the sophistication of Stegoloader’s characteristics which make it hard to analyze and detect. This webcast will help you understand the nature of Stegoloader in order to counter it more efficiently and effectively.
Pierre-Marc Bureau, Senior Security Researcher from the Counter Threat Unit (CTU), will discuss how Stegoloader cloaks its main component as a harmless Portable Network Image (PNG) while it extracts and executes malicious code hidden within an image. Although CTU researchers have not observed Stegoloader being used in targeted attacks, it has significant information stealing capabilities. Malware authors are constantly looking for ways to adapt and improve detection mechanisms, which makes Stegoloader a prime candidate for cyber-criminals arsenals. Learn how digital steganography may be a new trend for threat actors globally.
In this webcast, you will:
- Gain insight on when and where Stegoloader was first encountered.
- Learn characteristics of Stegoloader and how it operates.
- Understand digital steganography trends and how to detect and remediate.