Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?
RecordedDec 7 201150 mins
Your place is confirmed, we'll send you email reminders
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
The 2.4GHz ISM band has been the foundation of Wireless LAN technology for nearly two decades. With few exceptions, the 2.4GHz band is nearly (or completely) saturated with Wi-Fi and modulated and unmodulated interference sources almost everywhere. It’s for this reason that regulatory authorities like the FCC have begun making more spectrum available in the 5GHz UNII bands. If the myriad of respected analyst firms, who are all predicting the same 30+ billion always-connected devices by 2020, are correct then the 2.4GHz band will go from merely saturated to completely unusable in a very short time. Phenomena like BYOD and IoT will force Wi-Fi connectivity in homes and enterprises to move to 5GHz bands for a reasonable user experience.
Every time you turn around, you hear about yet another organization’s successful Agile transformation – so what are you waiting for? Join Andy Jordan, ProjectManagement.com as he discusses the benefits of Agile (even if your organization is predominantly waterfall-focused) and how you can help get your organization on the path to Agile success. By attending, you will gain practical knowledge on how to help your organization quickly and confidently respond to change, deliver value faster than your competition, and build high-quality products - that your customers really want!
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Manny Segarra, Agile Coach at HOSTING, will dive into a discussion on the benefits that values have on company culture. During the webinar, Manny will hit on a few key benefits of incorporating more accountability and respect into your everyday office practices, including:
-Building a stronger work culture, not just a stronger environment
-Creating a more agile team
The best network management teams have 7 habits in common. In this webinar, Mike Pennacchi of Network Protocol Specialists, will share 2 of the practices that separate the good from the great including:
-What keeps people from documenting and validating
-The risks and drawbacks of not doing these tasks
-What should be included in documentation
-Simplify these tasks using an OptiView XG
Stop saying ‘we should’ and go from good to great!
With all the technology and process improvements over the past 20 years, and with almost every IT organization wanting to increase ITSM maturity, you would think that maturity levels would have increased; but that is not the case. This webcast will discuss how to increase ITSM maturity in eight different areas including user experience, process automation, and incident, problem, change, configuration, request and knowledge management, and more.
Um im Zeitalter der digitalen Transformation überleben zu können ist eine klare Service Orientierung unabdingbar. Im Fokus steht die zu erbringende Leistung bzw. der Nutzen den sie erzeugt. Die sogenannten „Digital Natives des 21. Jahrhunderts“ wie amazon, Tesla oder airbnb nutzen die Mechanismen des digitalen Zeitalters nicht nur um neue Märkte zu erschließen, sondern auch um nachhaltig die Spielregeln traditioneller Märkte zu verändern.
Wer mithalten möchte, kann nicht mehr dem alt-bewährten Build-to-Order Ansatz folgen. Überleben werden jene Unternehmen, die es schaffen, Services schnell, agil und kostengünstig zu produzieren. Über Jahre gewachsene, hybride IT Landschaften machen die Umsetzung dieser Aufgabe aber nicht leichter.
Lernen Sie in diesem Webcast, was sich hinter „Service Design Thinking“ verbirgt und welchen Weg es gibt, um diese Herausforderungen erfolgreich zu meistern.
The Internet of Things (IoT) is empowering businesses with unprecedented ways to serve customers, rapidly solve problems, and optimize operations. Using IoT, savvy companies are transforming their products to enable the delivery of connected services that deliver new customer experiences and unlock new sources of revenue.
From enabling leaders in agribusiness to increase crop yields, to amplifying connected car innovation, Cisco Jasper Control Center cloud platform powers more than 5,000 companies in dozens of industries. Leveraging learnings from a decade of IoT experience, we’ll look at how real-world businesses are using IoT innovation to capture their share of this multi-billion-dollar opportunity.
- How IoT helps you drive successful business outcomes
- Best practices for accelerating your IoT service business
- Lessons from leaders that can help you work smarter and scale faster
Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
Power over Ethernet (PoE) simplifies and reduces installation costs as only one cable needs to be installed, supplying both data and power. This can be useful in older buildings where it’s not easy to install additional power for powering devices that may be ceiling or wall mounted, such as cameras and wireless access points. Devices that typically use PoE are security cameras, access points, and VoIP phones. Join this session and learn best practices for configuration and setup of PoE as well as how to troubleshoot the most common problems you might run into.
Wireless Interference can be the monkey on your back. Without the right tools you could spend hours troubleshooting to no avail. Learn what kind of interference is out there and some tricks of the trade to track down the root cause. Join this session and be armed with best practices around wireless interference.