When Insiders Go Rogue: Tactics for Monitoring and Containing Breaches
If today’s headlines about compromised enterprises are any indication, an insider data breach can cost a single organization as much as tens of millions of dollars. Another significant financial impact to an organization is the remediation cost that follows breach detection. This highly relevant Web
If today’s headlines about compromised enterprises are any indication, an insider data breach can cost a single organization as much as tens of millions of dollars. Another significant financial impact to an organization is the remediation cost that follows breach detection. This highly relevant Webinar that has been designed to help companies better understand the scope of insider threats and glean best practices for monitoring and containing breaches.
You will learn:
· The sources of insider threats, both careless employee behavior or malicious actions, and how to recognize them in your organization.
· Best practices for monitoring high-risk users and anomalous behavior to identify possible breaches before they become large scale.
· Reporting metrics to monitor the business threats and ensuring incident response processes are in place to quickly remediate any breach.
RecordedMar 15 2012
Your place is confirmed, we'll send you email reminders
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.
Join us for this live webinar where you will learn:
• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
As a cybersecurity professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
• An insider turns against your organisation
• A cyber-attacker steals a user’s credentials
• An administrator abuses account privileges
If you’re focused on addressing user threats, UBA can be a powerful tool in your kit. Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
• Why detecting user threats is so important—and so difficult
• Different approaches to UBA
• The value of data from across your business
• How to maximise the efficiency of your security analysts
Attend this webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.
There is a common theme for public and private organisations globally: there just aren’t enough cybersecurity professionals with the skills set required to defend organisations against advanced persistent attackers. With global demand for cyber security experts forecast to outstrip supply by a third before the end of the decade, companies are struggling against this huge skills shortage.
(ISC)2 predicts that companies and public sector organisations will need 6 million security professionals by 2019 but only 4.5 million will have the necessary qualifications and skill set. With countries such as the UK, increasing investment in cyber security and introducing new legislations this gap in professionals will only increase.
Join this webinar, to understand the skills shortage challenge organisations are facing and how security tools alone will not be able to fix these issues. In this webinar, Robin Farrell, Manager, Security Operations EMEA at FireEye will discuss the ways to mitigate this shortage risk:
- The challenge of staying ahead of the attackers with a skills gap
- How ROI on security tools will reduce without the adequate skilled workforce
- Adopting an adaptive defense model and the tools and techniques required
- Benefits of partnering with a threat management organisation
- Lessons learnt from building a SOC
IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.
However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.
This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
Kerry Matre, Senior Product Marketing Manager, HPE Security & Christian Christiansen, Vice President Security Products, IDC
Disrupt Business of Hacking
Enterprises spend millions protecting themselves from adversaries and attempting to reduce their risk. Are their investments paying off? Hear from industry expert Chris Christiansen what organizations are doing to effectively make themselves less of a target for cyber criminals and how some enterprises make themselves an easier target for their adversaries. Gain insights on how these tactics have evolved over time and get a glimpse of what the future holds.
Jewel Timpe, Senior Manager at HPE Security Research
In a world where all devices now have global reach, risk is no longer contained to just one organization. Breaches now have collateral damage and legislation threatens security practitioners in unintended ways. Just as attackers continue to evolve their techniques, defenders must accelerate their approach to detection, protection, response, and recovery as we move into the concept of the digital enterprise.
Jewel Timpe, Senior Manager at HPE Security Research, will highlight our unique perspective on the attack surface. Drawing from the latest findings from the 2016 Cyber Risk Report, this session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected world.
Expanding on the results of the 2015 SANS Incident Response Survey, the threat hunting survey explores the uses and benefits of threat hunting. Results of the survey will be presented in a two-part webcast.
In Part 1 of the webcast, attendees will gain insight into:
What threat hunting entails
What pitfalls stand in the way of attaining actionable results
What organizations are discovering through threat hunting
Farshad Ghazi, Global Product Management, HPE Security – Data Security
Data security is one of the most challenging areas facing IT across consumer-transacting businesses today. The mega-breaches in the news are not physical and traditional perimeter security is insufficient. Instead, cyber criminals steal business-critical and customer-confidential data through malware, hacking and attack vectors that exploit security gaps throughout the extended digital enterprise.
The good news is there are standards-based, innovative data-centric technologies that protect sensitive data at rest, in motion and in use. Most important, implementing a data-centric security program does not hamper your organization’s ability to access, move, analyze, and use your data across platforms, to enable business success. CISO’s can mitigate risk while saying ‘yes’ to the business.
Attend this session to gain a deeper understanding of how to get ahead of rapidly evolving cyber-threats to secure sensitive customer and corporate data across your ecosystem.
We often hear that cyber criminals are sophisticated and that they are organized. But what does that mean exactly? What does it mean to our organizations? Hear how HPE is digging into the world of cyber-criminals to understand it and to disrupt it. See how these businesses are organized and when we look closely, see how they look a lot like our businesses. With a value chain that includes finance, marketing, customer and even legal functions, our approach to adversaries’ shifts from one that is basic and rudimentary to one that recognizes these organizations as competitors. We can begin to take these competitors into account when planning for future business innovations. Learn about the most valuable hacking business types, their motivations, and the weaknesses of this underground marketplace so that you can most-effectively protect your enterprise against these adversaries.
Albert Biketi, HPE Security – Data Security; Steve Schlarman, RSA; Charles H. “Hank” Thomas, Booz Allen Hamilton
In 2015 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join this educational panel webinar to hear experts discuss how to establish a data protection plan and educate employees to maintain PCI compliance, and enforce basic security best practices and leverage technology solutions to prevent data breaches in 2016.
Michael Mackrill, Security & Intelligence Operations Consulting
SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?
We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.
Farshad Ghazi, Global Product Manager, HPE Security – Data Security
Join this webinar to learn how data-centric security brings next generation protection for reducing risk and protecting sensitive information as well as your brand, while enabling Cloud business practices. We’ll discuss how we help customers “accelerate next” and neutralize the possibilities of cloud data breaches. Find out how HPE SecureData for Cloud is a game changer.
Elisa Lippincott, Network Security Product Marketing Lead
Any organization deploying or looking to deploy an IPS recognizes that false positives are the bane of such systems, while intelligence about active and new threats is vital to keeping an IT organizations defensive posture at its utmost effectiveness and efficiency. Hewlett Packard Enterprise (HPE) TippingPoint IPS appliances inspect traffic in real time and take advantage of the latest warnings of network-based threats while reducing, and often eliminating, false positives; this webcast will discuss the technology behind the next-generation features and present the results of a review by SANS senior analyst and instructor Dave Shackleford.
Dr. Larry Ponemon, chairman and founder of the Ponemon Institute
On average, the 58 United States companies participating in the 2015 Cost of Cyber Crime study lost $15 million due to cyber crime, an increase of 19 percent from $12.7 million in last year's study. And other countries are close behind. These are results from the recently completed Ponemon Institute 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.
For a fuller look at these and other findings from the institute’s study, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn:
-What cyber crimes are most common and most costly
-The hidden internal and external costs you incur
-What security defenses are most effective in reducing losses
-How businesses with a strong security posture drive down costs
Mark Painter, Security Evangelist for Hewlett Packard Enterprise Security Products
In this webcast, a panel of peers as well as our very own Mark Painter examines the most common found vulnerabilities and ask how they’re being discovered, patched, and centrally-managed throughout the system’s life cycle. Listen to this webcast and learn best practices and advice from peers who’ve implemented or attempted to implement continuous monitoring within their organization.
The old school of cyber defense emphasized securing your infrastructure – protecting endpoints, your network, servers and inhibited data flows. But data needs to run free to power our organizations, and it's hard to protect something as fluid as data. Come see how the new school of cyber defense addresses this challenge. Join us to discover security that is agile and emphasizes protecting the interactions between our users, our applications and our data.
Dr. Larry Ponemon, Chairman of the Ponemon Institue & Brett Wahlin, VP and CISO of HP
Cyber Crime cost US companies an average of $15 million in 2015 – a significant increase from a year earlier. It’s a troubling trend unearthed by the Ponemon Institute’s 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction. In this Webinar Dr. Larry Ponemon and
HP CISO Brett Wahlin will explain how to craft an effective preemptive security strategy. You’ll learn:
-What cyber crimes are most common and most costly
-The hidden internal and external costs you incur
-What security defenses are most effective in reducing losses
-How businesses with a strong security posture drive down costs
Dave Shackleford, Farshad Ghazi, Sami Laine, Andrew Maguire and Swaroop Sayeram
This webcast presents the results of a new SANS survey that examines organizational use of public and private clouds and seeks to determine their best practices in securing content that traverses through both ecosystems.
Attend this webcast to learn:
-How organizations use the cloud
-What types of information they store in the cloud
-What concerns they have about data security
-How much they rely on cloud service providers and what difficulties they face
-What security and data protection technologies they use in the cloud environment
-How they manage cloud users
-And much more
Mark Henderson, Storage Technology Marketing Engineer, Intel & Patrick Osborne, Sr. Dir. Product Management & Marketing, HP
Once the decision to transition from spinning disks is made, you’ll want to have a robust recovery system put in place that matches the speed, scale and efficiency that Flash gives you. In this webinar, you’ll see how you can achieve 17 times faster backup than in the past with 5 times faster restore at significantly reduced cost. But that’s not all. You’ll also discover more about E2E Data Protection, Flat Backup Snapshot Management, Remote Copy and Asynchronous Replication.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response is a hot topic among the SANS audience. In SANS' 2014 survey on Incident Response, only 9% of organizations felt their incident response process were "very effective," yet the majority of respondents operated under the assumption that they will be breached. This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.
Part 1 of this webinar will include:
- A look at incident response expectations and the realities responders face
- The state of incident response policies and practices
- How those policies and practices have changed since the 2014 survey
Frank Mong, Vice President & General Manager of HP Security Solutions
The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.
The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
Chip Witt, Sr. Product Manager, Threat Intelligence, HP Security Research
Taking a page from the adversary playbook, security vendors and the organizations they protect are embracing threat intelligence sharing to improve their defenses. However, enabling trusted communities to access aggregated intelligence and share indicators is only the starting point. True actionable intelligence goes hand in hand with analysis and derived results that score threats intelligently. Learn about the HP’s approach to threat analysis, where context, relevance, and reputation and other factors combine to focus volumes of threat information down to what is most important to you and your company.
This animated video shows how you can protect the inevitable vulnerabilities in your production applications. Eliminate guessing and simplify application security by using App Defender to monitor and protect vulnerabilities from within the application.
Leading Security Intelligence & Risk Management Enterprise Platform
HPE is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products, the HPE Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and data security & encryption technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit HPE Enterprise Security at: www.hpe.com/security