Big Data, Big Risk, Big Opportunity

Nathan Gilks, Solution Lead, HP Enterprise Security Services & Dietrich Benjes, Director, Varonis
How can you maximise value and minimise risk in the biggest reservoirs of data you have - the unstructured and semi structured data stores? Organizations are beginning to realize that they need to harness the power of metadata in order to better manage, protect, and get the most out their valuable and voluminous user generated content. Metadata framework technology provides a platform to answer fundamental questions such as: who has and is accessing, who should and shouldn’t have access, what's in use and what isn't, what's sensitive, who owns it, who’s abusing it? Learn how Big Data Analytics and automation can transform the way in which your organization collaborates and governs its data.
Jun 12 2012
37 mins
Big Data, Big Risk, Big Opportunity
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4539)
  • Upcoming (145)
  • Date
  • Rating
  • Views
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Join us to hear from product expert Rob Singh to learn more about Mocana Atlas Certificate Enrollment
  • Collaboration is crucial when it comes to your marketing team. No matter if you're based locally or globally, the concept of work and the way we interact is completely changing. With smartphones and tablets taking over our lives, efficient collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a marketing organization.

    Join this webinar to discover:

    - The latest and greatest in marketing automation and file sharing platforms
    - Content collaboration tools that save time and keep branding consistent between teams
    - How centralizing assets can ease global content translation and localization
    - Real-time content and campaign sharing that can spark new ideas and educate your organization
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
  • Channel
  • Channel profile
Up Down
  • Big Data Security Demystified Recorded: Apr 8 2014 48 mins
    The presentation will discuss both the promises and challenges presented by big data analytics to information security. To help take advantage of the former without the penalty of the latter, we will learn about the building blocks of a big data security solution and explore the most cost-effective uses of big data analytics to enhance security.
  • Why Vendor-driven Threat Intelligence is not Sufficient Anymore Recorded: Mar 11 2014 43 mins
    While threat intelligence promises to help with the effective detection of advanced threats, it usually achieves the opposite: detecting the most predictable attackers. To be included as part of a vendor provided threat intelligence feed, an attacker must have tried attacking several potential victims before, and must have used the exact same method to be captured in the threat intelligence feed.

    In this presentation we will see how to make threat intelligence valuable for detecting advanced targeted threats directly aimed at your organization. We will see how to create a threat intelligence feed close to the target, as a shared effort between departments, subsidiaries or organizations working closely together to ensure identification of targeted threats. In addition we will see how to extend the term intelligence into additional detection mechanisms such as behavioral patterns.
  • Securing your On-line Applications with Fortify on Demand Recorded: Feb 25 2014 40 mins
    Web applications continue to represent a major source of risk to organizations. Not only is the number of web application growing but the associated risk is increasing as they are evolving from informational web-sites to interactive sites that capture customer data. The IT security teams are aware of the problem but all too often do not have then bandwidth to effectively assess these application or the budget to engage expensive penetration testers to do the work on their behalf. The problem is compounded as now it’s not only web-sites that need to be secured but Facebook and mobile applications too.

    In this webinar, you will learn how Fortify on Demand, HP’s cloud based application security testing service, can provide a cost effective solution to all your application security testing requirements. With Fortify on Demand you can start testing within a day, scale rapidly to test all your applications, whether they are developed in-house or produced by third-parties, and importantly support the developers to fix any vulnerabilities that we find.
  • The Insider Threat – Today’s Greatest Security Challenge Recorded: Feb 18 2014 47 mins
    In today’s ever evolving threat landscape and with the increasing requirements by the business users for access to business information from various locations and from a multitude devices, the Information Security Professional is required to understand the threats and the mitigation techniques available to them. During this presentation we will explore the attackers motivation and understand their eco-system and then we will look at how users are being leveraged to gain access to our business information. Lastly we will look at ways we can mitigate the kill chain at various stages and provide better reporting to the business stake holders.
  • How can You Secure Your Mobile Applications? Recorded: Jan 22 2014 49 mins
    The rapid adoption of mobile devices has created significant security risks and challenges for IT organizations. In a recent study by HP of 120 mobile applications for a single enterprise customer found that 66% of applications contained vulnerabilities that could have led to the disclosure of personal data or the compromise of a back-end system.

    In this webinar you will learn more about these vulnerabilities and how you can identify and remediate these risks.
  • La Sécurité de votre SI dans le contexte du Big Data Recorded: Jan 15 2014 48 mins
    Depuis de nombreuses années déjà, le système d’information est devenu un support indispensable à la stratégie et aux activités des Entreprises et des Organisations. L’essor du Big Data confirme l’évolution du SI avec l’accès à des données hétérogènes et en grand nombre. Malheureusement, l’apparition de nouvelles menaces, ainsi que la pression règlementaire démontrent le caractère indispensable de la gouvernance du SI et de la gestion opérationnelle de la sécurité et impliquent l’adoption d’une posture de sécurité dynamique.

    Face à ces enjeux,les entreprises doivent non seulement trouver les meilleurs experts et savoir les garder, mais elles doivent aussi s’organiser avec des équipes et des processus adaptés à leurs exigences et enfin, elles doivent s’appuyer sur technologies éprouvées qui leur permettent d’anticiper et de détecter les menaces.

    Dans ce contexte d’enjeux toujours plus important, les technologies de SIEM sont devenues essentielles. La technologie HP ArcSight, solution leader dans le marché du SIEM, a contribué à améliorer de manière significative la posture de sécurité de milliers de clients à travers le monde. Ces clients sont des acteurs de secteurs industriels de l’aéronautique et de la défense, l’énergie, les services, la finance, la santé, les hautes technologies, l’assurance, la distribution et les technologies de communications.
  • Addressing Advanced Threats with a Joined-Up Security Approach Recorded: Dec 5 2013 39 mins
    With the modern and emerging threat landscape, it is clear that adding more and more layers isn’t going to provide the answers that it once did. Using a joined-up approach, it is possible to start to build a true solution that helps manage the risks and threats, and to provide visibility that wasn’t previously possible. Addressing security at the network and application layers and proving a real-time view of the risks and threats as they happen, it’s now possible to start to address these new emerging threats.

    Importantly though, by using this approach, it is possible to be prepared today and tomorrow to provide pro-active identification and resolution to the threats.
  • Controlling the Uncontrollable - Application Security in 3 Simple Steps Recorded: Nov 12 2013 44 mins
    The business is demanding more apps and more channels for customer engagement. In turn you know this means more risk. The app development team is swamped just trying to keep up, and your security team is stuck in the middle, trying to secure what you already have - let alone all this new stuff. Sound familiar?

    Join us for 45 minutes where you will learn:
    - Why the developers are struggling to deliver secure applications
    - Why the business doesn't seem to 'get' application security
    - How you can start managing your application risk, today, for free
  • 2013 4th Annual Cost of Cyber Crime Study Results: Europe Recorded: Oct 30 2013 62 mins
    2013 Cost of Cyber Crime Study: UK, Germany & France

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for the United Kingdom and Germany. For the first time, the research was conducted in France. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 110 UK, German and French organizations participated. According to the findings, cyber attacks increased 16 percent in the UK and 21 percent in Germany. The costs associated with this increase in the UK and Germany were £904,886 and €830,169, respectively. For the first time, it was determined that the average cost of a cyber attack in France was €3.89 million. Findings from the report also show that each week UK and German organizations experienced on average 1.3 successful attacks per company. French organizations experienced an average of 1 cyber attack per company.
  • The Rising Tide of Information Sharing Recorded: Sep 11 2013 39 mins
    Evidence is mounting that current IT security models are simply no longer sufficient to support the hybrid enterprise. The extensive flow of enterprise information, well beyond the traditional purview of IT, necessitates an expansion of security scope to identify and control vulnerabilities. Lack of focus can be putting your information at risk.

    This session reviews findings from the HP Enterprise Security Services Security Assessment Report. The report utilizes data and survey responses on customer security maturity assessments.
  • Anti-Fragile: How to Strengthen your Enterprise Security with Big Data Recorded: Sep 11 2013 43 mins
    While organizations continue to battle cyber criminals, it seems that security professions are always fighting a losing war. However, a new weapon has been building up within the domain of most organizations, one that can help tip the balance in favor of the good guys. Find out how we can take the massive amounts of information we are generating and turn it to help bring valuable intelligence that can stop cyber-attacks from compromising your enterprise
  • The Enterprise Security Kill Chain Recorded: Aug 14 2013 43 mins
    The Enterprise Security Kill Chain concept describes the five steps of a security breach. This session will describe the steps that attackers use and suggestions that organisation can use to identify and mitigate these attempts and reduce risk.

    About your speaker:
    Rich Agar CISSP has been working in the IT industry since the late 1990’s. He has worked as a freelance consultant, at systems integrators and vendors with various customers across the UK and Europe. Rich holds a Master’s degree in Information Security from Royal Holloway, University of London, and is currently working as a Solutions Architect for Enterprise Security at Hewlett Packard.
  • Your Network is Full of Fish: How do You Ensure Compliance? Recorded: Jul 29 2013 33 mins
    Enterprises today have become highly extended environments with multiple users inside the network at any given time. That extended enterprise also includes multiple vendors and suppliers, but nearly half of reported breach incidents are the result of a mistake by a trusted supplier. Protecting the enterprise from both inadvertent and malicious errors requires extension of enterprise compliance requirements across the supply chain.

    In this webinar, we will cover security compliance services that enhance budgeting and spending effectiveness, expand visibility, reduce complexity, and improve compliance reporting; resulting in better cost control, faster incident reaction, reduced risk exposure, and better audit response.
  • How to proactively protect against emerging DDoS threats Recorded: Jul 11 2013 47 mins
    Distributed denial-of-service (DDoS) and web application attacks can be critical threats to your enterprise. Defending against them takes a comprehensive cloud-based managed service coupled with on-premise DDoS appliance solutions. Learn how to effectively maintain availability and defend your enterprise from denial-of-service attacks using HP’s new Distributed Denial of Service Protection Services.
  • Proactive Risk Management - A Use Case Approach Recorded: Jul 11 2013 35 mins
    In this webinar, Michi will discuss how an organization can take the requirements of their infrastructure around operational controls, compliance and security to extend and expand them into a Security Intelligence solution.

    Using a use case approach, organizations can look to extend and build upon their existing systems and controls to provide real-time warnings and feedback that allows them to make informed decisions focused around their business needs. Rather than just having a "top 10 attacker" reports and dashboards, how about a system that focuses around application lines and how this impacts business is more useful.
  • Security Lessons from Cybercriminals Recorded: Jun 12 2013 43 mins
    Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.

    What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?

    Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.
  • SAP – The blind Spot in Security Monitoring Recorded: Jun 4 2013 62 mins
    “The new information security frontier is applications, and for many this means SAP, which is the backbone of IT in many organizations but is little understood by most. While the number of security notes and patches for SAP increases exponentially, solutions still focus on authorization and entitlement management, leaving a security gap in areas such as misconfiguration, patch management and application security and abuse of trust.

    In the Webinar we will discuss AgileSI, an innovative solution which utilizes an approved SAP add-on and HP ArcSight to help protect your SAP systems.

    iT-CUBE SYSTEMS is a privately held company headquartered at Munich, Germany. The company was awarded in December 2012 with the Deloitte Technology Fast 50 Award Germany.
  • Stop Chasing Clouds: You Can Securely Adapt Recorded: May 15 2013 39 mins
    Enterprise is adapting to embrace new technologies and capture new opportunities. Cloud capabilities are attractive, but concerns for information security remain. In this webinar, Dr. Jeremy Ward will discuss how you can adapt and embrace change, while maintaining the security of your infrastructure and information. The key points discussed will include choosing a security service that helps you form better cloud security strategies that manage data risk, reduce complexity, identify vulnerabilities, and ease user access; resulting in improved security governance, enhanced visibility, increased cost control, and reduced risk exposure.
  • How Do You Respond to Risk? The Use Case Approach Recorded: Apr 17 2013 39 mins
    Synopsis:
    In this webinar we will discuss how an organization can take the requirements of their infrastructure around operational controls, compliance and security to extend and expand them into a Security Intelligence solution.

    Using a use case approach, organizations can look to extend and build upon their existing systems and controls to provide real-time warnings and feedback that allows them to make informed decisions focused around their business needs. Rather than just having a "top 10 attacker" report and dashboard, how about a system that focuses around application lines and how this impacts business?

    About the speaker:
    For the past 5 years Paul has been working for the market leading Security Information and Event Management (SIEM) solution, HP ArcSight. Spending considerable time assisting organizations across the EMEA region to define their needs, understand their threats and risks and architect SIEM solutions to address this.

    Focusing on: Risk management, threat intelligence, SIEM solutions and architecture, log management, correlation and vulnerability management.
  • Your VP Just Resigned, What Did He Take With Him? Recorded: Apr 17 2013 49 mins
    Your VP just resigned and took a position at your biggest competitor. Did you remember to examine the Salesforce logs to see if he downloaded your entire customer database and history of purchases? Do you even have access to those logs? And if you did, and found the obvious, how would it help now? Catching Bradley Manning who stole sensitive government information, Ross Klein who took with him an entire hotel brand concept and Gary Min that copied chemical formulas was too late for the US government, DuPont and Starwood hotels respectively.

    In this presentation we look into how to proactively monitor user activity to detect potential threats from employees before the damage occurs. Focusing on how to effectively collect activity logs and analyze them against user, role and entitlement information, to detect abnormal activity, predict which employees may pose more threat if not loyal and to reduce the associated risk.
Begin the journey to your secure enterprise
The days of locked down security are over. Today’s enterprise must be as fluid as the clients they serve, sharing information whenever, wherever and on whichever device they choose. This new fluidity requires a comprehensive approach to security to enable interaction while driving operational effectiveness and reducing business risk.
Getting to your secure enterprise is a journey and we have designed capabilities to help you get there.
Are you ready to begin the journey to your secure enterprise?
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Big Data, Big Risk, Big Opportunity
  • Live at: Jun 12 2012 3:00 pm
  • Presented by: Nathan Gilks, Solution Lead, HP Enterprise Security Services & Dietrich Benjes, Director, Varonis
  • From:
Your email has been sent.
or close
You must be logged in to email this