Hi [[ session.user.profile.firstName ]]

HP Enterprise Security Products

  • Date
  • Rating
  • Views
  • Digitally Transform  with Confidence Digitally Transform with Confidence Sue Barsamian, SVP and General Manager HPE Security Products Recorded: Jul 6 2016 23 mins
    In today’s increasingly connected digital world, your organization needs to adapt to how employees and customers want to use IT to do business. But to embrace innovative IT with confidence, you must protect against the threats that target people, the applications they use, and the devices and data they access. In this session, we will share how building security into the fabric of your IT infrastructure, together with giving Security Operations the tools to address threats intelligently, will enable you to power your business forward with confidence.
  • Emerging Trends in Incident Response Emerging Trends in Incident Response Matt Bromiley, SANS & Mark Painter, HPE Security Recorded: Jun 29 2016 66 mins
    The third annual SANS survey on incident response will look at the continuing evolution of incident response, how tactics and tools have changed in the last three years and how security professionals are dealing with increasing numbers and kinds of attacks. The survey report and webcast will also look at key takeaways and recommendations for practitioners and management.

    In this session, we will look at emerging trends in addition to survey results. Attendees will learn:

    How integrated incident response tools are in the typical organization
    What impediments hamper effective incident response
    How budget allocations are projected to change over the next 12 months
    Improvements planned in the next 12 months
  • Enterprise Security: Are you wasting your money? Enterprise Security: Are you wasting your money? Kerry Matre, Senior Product Marketing Manager, HPE Security & Christian Christiansen, Vice President Security Products, IDC Recorded: Jun 14 2016 43 mins
    Disrupt Business of Hacking

    Enterprises spend millions protecting themselves from adversaries and attempting to reduce their risk. Are their investments paying off? Hear from industry expert Chris Christiansen what organizations are doing to effectively make themselves less of a target for cyber criminals and how some enterprises make themselves an easier target for their adversaries. Gain insights on how these tactics have evolved over time and get a glimpse of what the future holds.
  • Converged Security - Protect your Digital Enterprise Converged Security - Protect your Digital Enterprise Gerben Verstraete, HPE, John Kindervag, Forrester Recorded: May 24 2016 50 mins
    Join Forrester and HPE Experts discussing why enterprise investments in security aren’t having the desired impact due to reliance on point solutions and treating security as a silo, overlay function. Find out more about how Converged Security can help overcome these challenges:

    A use-case driven approach enhancing current security practices
    Integrates with existing security methods, creating a ‘security-by-design’ solution
    Uses end-to-end collaboration to embed security throughout the IT service value chain
  • Recognizing the Collective Risk, HPE 2016 Cyber Risk Report Recognizing the Collective Risk, HPE 2016 Cyber Risk Report Jewel Timpe, Senior Manager at HPE Security Research Recorded: May 17 2016 61 mins
    In a world where all devices now have global reach, risk is no longer contained to just one organization. Breaches now have collateral damage and legislation threatens security practitioners in unintended ways. Just as attackers continue to evolve their techniques, defenders must accelerate their approach to detection, protection, response, and recovery as we move into the concept of the digital enterprise.

    Jewel Timpe, Senior Manager at HPE Security Research, will highlight our unique perspective on the attack surface. Drawing from the latest findings from the 2016 Cyber Risk Report, this session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected world.
  • Threat Hunting: Open Season on the Adversary. Part 1 - Threat Hunting 101 Threat Hunting: Open Season on the Adversary. Part 1 - Threat Hunting 101 Mark Painter, HPE Security Evangelist Recorded: Apr 25 2016 62 mins
    Expanding on the results of the 2015 SANS Incident Response Survey, the threat hunting survey explores the uses and benefits of threat hunting. Results of the survey will be presented in a two-part webcast.

    In Part 1 of the webcast, attendees will gain insight into:

    What threat hunting entails
    What pitfalls stand in the way of attaining actionable results
    What organizations are discovering through threat hunting
  • Gamification of a Fortune 20 SOC Gamification of a Fortune 20 SOC Marcel Hoffmann and Josh Stevens Recorded: Apr 11 2016 61 mins
    Many Security Operations Centers (SOCs) struggle in 3 key areas when it comes to personnel: continuous training, extending retention and measuring effective KPIs. In this talk we introduce the combination of gamification, user experience and machine learning as a concept to address these 3 challenges. We plan to share our real world experience implementing these concepts for the internal SOC at Hewlett Packard Enterprise.
  • Data-centric Security Enables Business Agility Data-centric Security Enables Business Agility Farshad Ghazi, Global Product Management, HPE Security – Data Security Recorded: Mar 30 2016 31 mins
    Data security is one of the most challenging areas facing IT across consumer-transacting businesses today. The mega-breaches in the news are not physical and traditional perimeter security is insufficient. Instead, cyber criminals steal business-critical and customer-confidential data through malware, hacking and attack vectors that exploit security gaps throughout the extended digital enterprise.

    The good news is there are standards-based, innovative data-centric technologies that protect sensitive data at rest, in motion and in use. Most important, implementing a data-centric security program does not hamper your organization’s ability to access, move, analyze, and use your data across platforms, to enable business success. CISO’s can mitigate risk while saying ‘yes’ to the business.

    Attend this session to gain a deeper understanding of how to get ahead of rapidly evolving cyber-threats to secure sensitive customer and corporate data across your ecosystem.
  • Cybercriminals – The Unaddressed Competition Cybercriminals – The Unaddressed Competition Kerry Matre, Sr. Manager, HPE Security Recorded: Mar 28 2016 30 mins
    We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.
  • Best Practices to Stop Data Breaches in 2016 Best Practices to Stop Data Breaches in 2016 Albert Biketi, HPE Security – Data Security; Steve Schlarman, RSA; Charles H. “Hank” Thomas, Booz Allen Hamilton Recorded: Mar 16 2016 64 mins
    In 2015 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
    Join this educational panel webinar to hear experts discuss how to establish a data protection plan and educate employees to maintain PCI compliance, and enforce basic security best practices and leverage technology solutions to prevent data breaches in 2016.

Embed in website or blog