Top Security Threats and Trends: 2011 Cyber Risk Report
Enterprise organizations have been under security attacks for the past decade, but security events in 2011 have created a ripple effect that will be felt for years to come and will actually start to shift the way we view security. This webcast will highlight the latest threat trends and risks from the new 2011 Cyber Risk Report from HP Enterprise Security and will cover:
• Why a decline in vulnerabilities disclosed may lead to a false sense of security
• How changing attack motivations are increasing security risks
• What the biggest risks to the enterprise were in 2011
RecordedMay 2 201247 mins
Your place is confirmed, we'll send you email reminders
TJ Alldridge and Satinder Khasriya, Product Marketing, Trend Micro TippingPoint
The Trend Micro TippingPoint Threat Protection System (TPS) family offers comprehensive threat protection against known and zero-day attacks. Attend this webinar to see the many ways the TPS can be used to protect your environment against the latest threats as well as the old ones too.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Robin Layland, Layland Consulting, Steve Povolny, TippingPoint DVLabs, Brian Foster, Damballa
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Hussain Abduljalil, Manager Solution Architecture at Gulf Air
Since 2006, Gulf Air has used HP TippingPoint Intrusion Prevention System (IPS) to protect their network from external threats. With the passage of time the internal attack vectors were also identified as being a high-risk area. In this webinar, Hussain Abduljalil of Gulf Air explains how Gulf Air evolved their network security from an external IPS setup to a unified IPS solution providing the required levels of protection and throughput needed. And why they did it with HP TippingPoint.
Watch the webinar to learn:
• The evolution of IPS setup in Gulf Air
• How advanced malware threats (like the Conficker worm) were identified as a risk
• Why Gulf Air choose HP TippingPoint for network security
• The way forward
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Bob Corson, Director, Solutions Marketing, TrendMicro & Patrick Hill, Sr Product Line Manager, DVLabs
Victims of targeted attacks, or advanced persistent threats (APTs), make the headlines. Attend this webinar to learn how APTs work and how to defend your business from them. Pat Hill, HP TippingPoint Product Manager, and Bob Corson, Director, Solutions Marketing, discuss the anatomy of an attack and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Attend this webinar to learn:
· How the bad guys evade your security
· The counter measures you need to detect and block them
· How HP TippingPoint and Trend Micro have partnered to neutralize patient zero
Bob Corson, Director, Solutions Marketing, Trend Micro & Patrick Hill, Senior Product Line Manager for HP Enterprise Security
Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs.
Register for this session to learn the 6 Keys to Success in Fighting Advanced Threats. Hear first-hand from security leaders at HP and Trend Micro how to:
- Monitor all attack phases;
- Mind security gaps;
- Defeat anti-evasion features & more.
A next-generation intrusion prevention system (IPS) shouldn't just keep your company safe, it should be quick to implement and easy to manage. HP TippingPoint is the simple, effective, and reliable solution for network security that protects you faster—when every second matters.
This video explains how TippingPoint stops threats faster. Watch it to learn:
•How HP TippingPoint provides 80% threat coverage out of the box
•How most companies install TippingPoint in less than two hours
•How TippingPoint filters key on vulnerabilities rather than exploits to keep you safer and reduce false positives
John Kindervag, Vice President and Principal Analyst, Forrester Research
Hackers don't have change management, so they can change and deploy threats faster than companies can respond to them. That's the message of Forrester Principal Analyst John Kindervag in this short but important video. He explores the impact of a changing threat environment and new zero-day threats on cyber defenses.
View it to learn:
•Why it's important for security professionals to change their mindset when dealing with the changed threat landscape
•Why conventional defenses based on exploit signatures no longer work
•Why context-aware defenses that correlate incoming attacks to outgoing data exfiltration are required for enhanced security
2014 has been an explosive year riddled with nasty security threats. Some of these you may have heard about like Heartbleed and Shellshock, but others like Sandworm, may have gone unnoticed or worse unprotected on your network. This webcast will offer an explanation of the top vulnerabilities, how they could have infected your network and security precautions to protect your organization. Don’t miss it.
As enterprise network design changes and evolves to incorporate mobile devices, BYOD and cloud solutions, the traditional network perimeter is breaking down. All this, while attacks are getting ever more sophisticated. This session will discuss the challenges facing the modern enterprise network, and show how HP TippingPoint network security products offer solutions that can help.
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
With malware and botnets wreaking havoc worldwide, stopping network infiltration and protecting confidential data is proving increasingly difficult. This session introduces you to a triple-threat triple ally against attackers: HP TippingPoint with ThreatDV. Join us and learn how HP TippingPoint and the power combo of ThreatDV, weekly Digital Vaccine package, and reputation feed help networks stay ahead of attacks by blocking infiltration, phone-home, command-and-control, and data exfiltration.
Russell Meyers, Global Product Line Manager, HP TippingPoint
Security defenses are only effective when you can easily deploy and manage them. HP TippingPoint Next-Generation Intrusion Prevention System and Next-Generation Firewall make it easy. And the TippingPoint Security Management System provides a dashboard to show you the state of your defenses and instantly see attacks that are blocked.
Every second matters. Watch this interactive demo to learn how:
· Easy it is to automatically download the latest Digital Vaccine packages to stay up-to-date with the latest security intelligence
· Simple it is to share security configurations and policies across devices
· The at-a-glance dashboard effortlessly shows your protection status
· To automatically create protection, status and network behavior reports
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
Threats to the network continually evolve, which makes isolating the victimized “patient zero” machine nearly impossible. Today’s advanced threats require an advanced approach to security. This session explores how HP TippingPoint stops these attacks in their tracks by neutralizing patient zero through behavior, static, and dynamic detection. Join us to learn how this layered security approach is the most effective way to minimize the threat of network infiltration and, when it does occur, protect your infrastructure from further damage.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response weighs heavily on the minds of security practitioners today. Prompted by the recent data breaches and attacks plaguing enterprises large and small, a new SANS survey project asked IT professionals to explain what steps they take immediately following a breach and to share how successful those steps really are.
Tune into Part 1 of the Incident Response Techniques webcast to hear highlights from the survey results and discussion concerning where we are as an industry in a typical six-step incident response process.
Delivering Advanced Network Defense to the Enterprise
This channel covers the latest topics in network security, virtualization security, and threat research from TippingPoint, DVLabs, and the Zero Day Initiative to help security professionals protect their network against ever-evolving threats.
Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.
Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
•Unsurpassed views into the users, devices and connections on your network
•An easy-to-use dashboard and analytics engine
•Triggered alerts based on pre-defined metrics
•Improved reporting with pre-configured templates
Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.
Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.
Register for the live webinar to learn more about:
• Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
• Why it is important to take an asset-centric approach to effectively manage cyber risk
• How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
By 2020, Gartner predicts 60% of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. With Target, Apple, Nissan, and Twitter all making the news recently for their security failures, CIOs and CISOs are under tremendous pressure to keep the business secure -- without slowing the business down.
In this session, Uri Sarid, MuleSoft CTO and Kevin Paige, MuleSoft Head of Security, discuss the application networks and an emerging approach that CIOs and CISOs are driving together to deliver both security and business agility.
Attendees will learn:
– How to deal with security no longer resting in the hands of the security team due to shadow IT and other factors
– How a well-defined API strategy can reduce risk
– How application networks have emerged as an approach to deliver security and agility
– How CISOs can drive agility and promote security by shifting mindsets
If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.
Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
This month’s webinar will feature information from our 2016 mid-year security roundup report where we detail out the latest trends within the threat landscape affecting the world. From Ransomware and Business Email Compromise to Data Breaches we’ll cover the most important threats that are targeting our customers and businesses. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top threats observed.
Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.
In this webcast, you will learn:
- About other available Azure programs
- Application development tests on Azure
- What other customers are doing on Azure and how it is paying large dividends