Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?
RecordedDec 7 201150 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
GPU technology improves Citrix virtual desktops and applications, but to truly deliver an immersive user experience that scales, organizations need to manage the complete GPU deployment lifecycle – from designing the infrastructure, to managing and optimizing a production environment, to responding to user issues dynamically, in real-time.
eG Innovations in partnership with NVIDIA is delivering comprehensive monitoring capabilities that enable IT to better manage all aspects of the user experience, tapping into new GPU-sourced insights that aid in design right-sizing, proactive infrastructure optimization and help desk issue remediation. This new joint solution integrates eG Enterprise with NVIDIA GRID software to provide actionable insights through host-level, guest-level, and application-level analytics.
Attend this webinar to learn how to deliver complete lifecycle management of the end user experience for GPU-powered applications and desktops.
Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.
Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.
Every organization’s Agile transformation is different, however there are key landmines that can cause an organization’s Agile transformation to struggle. Join Andy Jordan, ProjectManagement.com as he discusses how you can avoid seven common Agile transformation mistakes and put your organization on the right path with Agile.
This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.
In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
Packet flow switching for today’s enterprise networks
Presenter: David VanValkenburg, Product Expert Infrastructure Management Devices
To take advantage of Digital Transformation (DX) initiatives, enterprises must collect, organize, and optimize the packets traversing their networks. But how do you handle such a monumental task, given the prevailing 10G+ speeds in your datacenters? Join our webinar to learn more about packet flow switching and its role in the “collect” step of DX. We will cover:
Options available to you when it comes to network visibility
Packet conditioning and its critical role in reducing the burden on your monitoring infrastructure
Lessons learned in deploying visibility infrastructures for service assurance and cybersecurity
CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.
Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.
Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.
At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
This webinar is being delivered in conjunction with the UKDCIG, PTS Consulting and Square Mile Systems.
Migrating data centres or moving to co-location is complex and subject to cost overruns, especially where existing infrastructure documentation is of questionable quality. We'll show how the use of database driven toolsets can help automate the project processes and avoid many of the typical problems that organisations with overstretched teams encounter.
The best network management teams know the value of investing in Training and Tools. In this webinar, Mike Pennacchi of Network Protocol Specialists will discuss how network performance is impacted with or without tools and training, including:
- Network visibility
- System changes & technology upgrades
- Team communication
- Perception & Morale
Success in the idea economy requires technological agility. You have to act quickly to seize opportunity, respond to threats, turn great ideas into reality and stay ahead of the competition – and these capabilities rely on having an amazing IT organization.
Amazing IT teams are competent, aligned to the business, highly collaborative and constantly adapting to change. These attributes just don’t happen. You need talent, you need a continuous education strategy and you need the tools to make it happen. Join this webinar to learn how implementing a continuous education strategy using the new HPE ART Enterprise Learning Edition (ELE) will help your journey to amazing.