Endpoint Management and Security

Channel profile:

Tips to Endpoint Management, Security and Compliance Challenges

This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.

Subscribers (6,167)
Point of Sale Systems: How to Stop Critical Entry Points for Malware Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.

During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

•3 Critical Entry Points to POS System Attacks
•Impacts to an Organization
•Top 3 Security Measures to Minimize Risk
Read more >
Feb 20 2014
62 mins
Play

Webinars and videos

  • Live and recorded (42)
  • Upcoming (0)
  • Date
  • Rating
  • Views
  • Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.

    During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

    •3 Critical Entry Points to POS System Attacks
    •Impacts to an Organization
    •Top 3 Security Measures to Minimize Risk
  • In 2012 we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate IT upside down. In this webcast, we’ll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns.

    During this webcast we will look at each of data protection trends, helping you define best practices for your organization to address the top concerns. We’ll also show you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
  • Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?

    For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.

    Join Larry Ponemon of the Ponemon Institute and Ed Brice of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:

    •IT perspective on the changing threat landscape and today’s Top 5 risks;
    •Disconnect between perceived risk and corresponding strategies to combat those threats;
    •Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
  • In April 2014, Microsoft ends support for Windows XP. In a perfect world, your organization will have developed a plan by the end of 2013 and will have migrated all XP systems before Microsoft stops providing security patches. Unfortunately, there are many obstacles to making this strategy a reality – time, resources, budget, etc.

    If your organization still uses WinXP – or other applications such as Office 2003 or Internet Explorer 6 for which support also ends – you need a plan B. Join this webinar to:

    •Learn what end of life means to your organization from a security perspective
    •What options are available to secure your organization from vulnerabilities
    •How other organizations are planning to remain secure and compliant until they are fully migrated

    Understand how you can protect your WinXP systems beyond end-of-support. With application whitelisting and advanced memory protection, you can effectively prevent security risks that are inevitable once your organization is no longer receiving Microsoft patches.
  • If you’re like most IT professionals, you’ve probably heard analyst firms like Gartner and Forrester recommend using application whitelisting to defend your endpoints. The latest generation of application whitelisting provides flexible protection against modern, sophisticated malware and targeted attacks. However, application whitelisting is not something you turn on overnight.

    Attend this in-depth technical webcast as we dive into the latest technologies, including reflective memory protection, and other whitelisting approaches, to learn best practices to begin preparing for your 2014 endpoint security strategy and the inevitable transition from traditional signature-based protection to a holistic solution that incorporates whitelisting.

    • Three Best Practice Steps: Prepare, Lockdown and Manage Change

    • Understand how to apply lessons learned during application whitelisting implementations by your peers

    • Gain knowledge of continuous improvements made in best practices for application whitelisting

    *Receive 1 CPE credit for attending this webcast. To earn this credit, viewers must be active participants for the duration of the webcast. Please enter your appropriate membership ID upon registration to ensure relevant credits are allocated to your accounts when we submit them.
  • Last year we offered our thoughts on buying Endpoint Security Management solutions — including patching, configuration, device control, and file integrity monitoring — which are increasingly bundled in suites to simplify management. For 2014, malware and mobility have become the most critical issues facing organizations at they look to protect their endpoint devices. Thus we've updated our research to make sure you have the latest and greatest information on which to base your buying decisions.

    Join Mike Rothman, Analyst & President from Securosis, as he dives into an interactive discussion around endpoint security in 2014, and provides clear buying criteria for those of you looking at these solutions in the near future.

    What you will learn:

    •Protecting Endpoints: How the attack surface had changed, and the impact to your defense strategy

    •Anti-Malware: The best ways to deal with today's malware and effectively protect your endpoints from attack

    •Endpoint Hygiene: Why you can't forget the importance of ensuring solid management of your endpoint devices

    •BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization

    •The Most Important Buying Considerations in 2014

    *Receive 1 CPE credit for attending this webcast. To earn this credit, viewers must be active participants for the duration of the webcast. Please enter your appropriate membership ID upon registration to ensure relevant credits are allocated to your accounts when we submit them.
  • Bring Your Own Device (BYOD) is a popular topic in 2013. The trouble is that IT is trying to understand the security risks and prepare strategies to either adopt employee-owned mobile devices or decide against it for security and data control reasons.

    The 160,000 member Information Security Community on LinkedIn conducted the survey “BYOD & Mobile Security 2013” to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.

    Participate in this interactive webcast to learn:

    •Current Mobile Security Threats
    •Top Trends & Drivers in BYOD & Mobile Security
    •Necessary Features to Minimize these Security Risks
    •Live, Interactive Q&A
  • Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.

    Join this expert panel webcast to learn how to:
    1)Understand your business audiences and evaluate their risk tolerance
    2)Leverage reputation management services that are appropriate for your organization
    3)Utilize realistic change management to secure prioritized data depositories
  • Many organizations are jumping on the “Death to Java” bandwagon, ranting about turning off Java to eliminate risk. However, it is important to put the issue in the proper context. The reality is that a Java vulnerability is not the end game for a cyber criminal, it is merely a delivery mechanism in the quest to install and execute bigger malware.

    There is no “one size fits all” recommendation for eliminating Java risks. But, you do want to eliminate as much exploitable surface area as reasonably possible on your critical endpoints. This should be the philosophy engrained in every organization’s security culture. If you’re not having this conversation about Java - and quite frankly all of the third-party applications in your environment - you are missing the mark and not calculating your risk. Join Paul Henry and Russ Ernst as they bring us up to speed on the Java vulnerabilities and how to limit your exposure without going overboard.
  • Businesses large and small continue to struggle with malware. As a result, 50% of endpoint operating costs are directly attributable to malware alone[1]. Traditional approaches to malware protection, like standalone antivirus, are proving themselves unfit for the task. Something has to give.

    In this roundtable discussion, independent information security expert Kevin Beaver and Lumension Security’s Chris Merritt will talk about what can be done differently, including:

    • How to get a better grasp of the weaknesses in endpoint security that continue to get overlooked,
    • Examining whether or not anti-virus as we’ve known it is effective, and
    • A comparison between a proactive versus reactive approach to fighting the malware fight.

    [1] Ponemon Institute, 2011 State of Endpoint Risk, December 2010

Embed in website or blog