What is a vulnerability worth? If you are an attacker looking to launch an attack on an unsuspecting organization, your answer will be very different than the IT administrator running the organization. HP DVLabs runs the Zero Day Initiative, the industry’s leading organization for purchasing and dis
What is a vulnerability worth? If you are an attacker looking to launch an attack on an unsuspecting organization, your answer will be very different than the IT administrator running the organization. HP DVLabs runs the Zero Day Initiative, the industry’s leading organization for purchasing and disclosing vulnerabilities. In this unique position the DVLabs team must be keenly aware of both the black market for selling vulnerabilities and exploit information, as well as the potential costs to the enterprise affected by such vulnerabilities. Join Derek Brown, security research with HP DVLabs and liaison for the Zero Day Initiative for session on vulnerability disclosure and why it is so important to the security industry.
RecordedMar 14 201243 mins
Your place is confirmed, we'll send you email reminders
The cloud is here to stay. However, that also means more and more companies are realizing that they’ve built two separate IT teams and are struggling to deliver quality services without a unified view. A true hybrid monitoring solution is the answer to this common problem.
Join Jay Lyman, Analyst at 451 Research, and Kent Erickson, Alliance Strategist at Zenoss, as they discuss what is shaping hybrid IT, where it's going, and what to do about it.
Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.
Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.
With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.
The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
•Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
•Better Security: Helps protect identity, data and devices against modern security threats
•Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications
Watch this webcast to:
•Discover Windows 10 productivity, security and manageability features that new hardware lights up
•Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
•Get additional resources to evaluate when it might be time for new devices and what devices are right for you
Join Kate Leggett, VP Principal Analyst at Forrester and Becky Levy, Associate Director of Member Services & Development Operations at WGBH as they discuss tips to transform the customer experience, how to create a profitable customer service strategy, and what technologies to utilize when increasing business and customer value.
Learn more from WGBH on:
•The pains of an antiquated, disjointed contact center strategy.
•Vision for a modern customer service experience.
•The business value of a consolidated customer engagement strategy through Salesforce
•How they successfully led the evaluation and four-day implementation of NewVoiceMedia.
•Their transformation results and lessons learned along the way.
A lively Q&A will follow this presentation with Kate and Becky – come ready with your questions!
Improving the ITSM experience will improve customer satisfaction. In this session, we will take a user-centric approach to discuss methods for ensuring the customer experience is engaging, consistent, and memorable leading to higher customer satisfaction
Change Management challenges – people & process.
Bring sanity to your IT Change process: Influence the Change Management Culture
Change Management challenges with people & process – The first in a 3 part series on IT Change Management
Following the path of Crawl, Walk, and Run; learn to crawl before you fall. Many IT shops have change management where everyone submits changes for work they want done, process and enforcement is simplistic, and reporting is minimal. Join Acorio for this lively discussion as we cover the following topics:
Culture of Change
Change Management Steps of Maturity
Resistance to Process Enforcement
You’ll come away with a better understanding of the challenges and practical ways to address them.
If you're yearning for more than the built-in reports your ITSM suite provides, you are in the right place. Join us as Jeffrey Toaddy, ITSM Coordinator for Miami University, walks us down the rocky road to process scorecards and service metrics the rest of the IT organization and clients can understand.
Speaker bio: Jeffrey is an ITIL Expert with over ten years of IT Service Management experience. He currently serves as IT Service Management Coordinator and Adjunct Instructor at Miami University in Oxford, Ohio. Miami's BI unit has been supporting University-wide decisions leaving Jeffrey and his colleagues to develop their own scrappy approach to coaxing complex conclusions from internal systems.
As wireless networks and usage demands continue their explosive growth, management of and troubleshooting wireless issues demands a standard approach to assure high performance and get to the root cause of issues. In this webinar, Dan Klimke, NETSCOUT Product Manager, will discuss the interdependence between the wired and wireless networks and best practices for troubleshooting issues including:
- 4 key elements of usage vs. performance
- Managing a hybrid network (802.11x)
- Device discovery
- Infrastructure analysis
Operations teams face IT environments that are increasingly large, more dynamic, and distributed across private and public cloud infrastructure. To manage such environments effectively, IT operations team must reimagine traditional management models and design new approaches.
In this webinar, Vistara sales engineer, David Portnoy, will discuss how administrators can use Vistara’s powerful policy framework to preprogram actions and automate routine tasks.
Cultural Change is one of the hardest things to crack within any organisation, let alone within IT. IT is fast paced - moving responsively to the business, technological and even public requirements. However, a required cultural shift from within is rarely successful. On average a mere 30% of Cultural Change Initiatives are successful, and a lot can be lost when it fails!
Join Helen Windle, ITSM Consultant, as she guides you through the key points to get it right first time.
Most of you have started your journey to the cloud and for those farther along, you're probably using multi or hybrid cloud platforms and likely Azure, AWS, Google Cloud Platform, VMware or OpenStack – the most common today.
What are some of the challenges in getting a clear, holistic view across all cloud? How can you best manage usage and spend to optimize those investments? Can you show the business and finance teams exact spend today and clear forecast? Find out the tools, techniques, and capabilities you must have to do Cloud Analytics with hybrid cloud.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Robin Layland, Layland Consulting, Steve Povolny, TippingPoint DVLabs, Brian Foster, Damballa
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Hussain Abduljalil, Manager Solution Architecture at Gulf Air
Since 2006, Gulf Air has used HP TippingPoint Intrusion Prevention System (IPS) to protect their network from external threats. With the passage of time the internal attack vectors were also identified as being a high-risk area. In this webinar, Hussain Abduljalil of Gulf Air explains how Gulf Air evolved their network security from an external IPS setup to a unified IPS solution providing the required levels of protection and throughput needed. And why they did it with HP TippingPoint.
Watch the webinar to learn:
• The evolution of IPS setup in Gulf Air
• How advanced malware threats (like the Conficker worm) were identified as a risk
• Why Gulf Air choose HP TippingPoint for network security
• The way forward
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Bob Corson, Director, Solutions Marketing, TrendMicro & Patrick Hill, Sr Product Line Manager, DVLabs
Victims of targeted attacks, or advanced persistent threats (APTs), make the headlines. Attend this webinar to learn how APTs work and how to defend your business from them. Pat Hill, HP TippingPoint Product Manager, and Bob Corson, Director, Solutions Marketing, discuss the anatomy of an attack and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Attend this webinar to learn:
· How the bad guys evade your security
· The counter measures you need to detect and block them
· How HP TippingPoint and Trend Micro have partnered to neutralize patient zero
Bob Corson, Director, Solutions Marketing, Trend Micro & Patrick Hill, Senior Product Line Manager for HP Enterprise Security
Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs.
Register for this session to learn the 6 Keys to Success in Fighting Advanced Threats. Hear first-hand from security leaders at HP and Trend Micro how to:
- Monitor all attack phases;
- Mind security gaps;
- Defeat anti-evasion features & more.
A next-generation intrusion prevention system (IPS) shouldn't just keep your company safe, it should be quick to implement and easy to manage. HP TippingPoint is the simple, effective, and reliable solution for network security that protects you faster—when every second matters.
This video explains how TippingPoint stops threats faster. Watch it to learn:
•How HP TippingPoint provides 80% threat coverage out of the box
•How most companies install TippingPoint in less than two hours
•How TippingPoint filters key on vulnerabilities rather than exploits to keep you safer and reduce false positives
John Kindervag, Vice President and Principal Analyst, Forrester Research
Hackers don't have change management, so they can change and deploy threats faster than companies can respond to them. That's the message of Forrester Principal Analyst John Kindervag in this short but important video. He explores the impact of a changing threat environment and new zero-day threats on cyber defenses.
View it to learn:
•Why it's important for security professionals to change their mindset when dealing with the changed threat landscape
•Why conventional defenses based on exploit signatures no longer work
•Why context-aware defenses that correlate incoming attacks to outgoing data exfiltration are required for enhanced security
2014 has been an explosive year riddled with nasty security threats. Some of these you may have heard about like Heartbleed and Shellshock, but others like Sandworm, may have gone unnoticed or worse unprotected on your network. This webcast will offer an explanation of the top vulnerabilities, how they could have infected your network and security precautions to protect your organization. Don’t miss it.
As enterprise network design changes and evolves to incorporate mobile devices, BYOD and cloud solutions, the traditional network perimeter is breaking down. All this, while attacks are getting ever more sophisticated. This session will discuss the challenges facing the modern enterprise network, and show how HP TippingPoint network security products offer solutions that can help.
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
With malware and botnets wreaking havoc worldwide, stopping network infiltration and protecting confidential data is proving increasingly difficult. This session introduces you to a triple-threat triple ally against attackers: HP TippingPoint with ThreatDV. Join us and learn how HP TippingPoint and the power combo of ThreatDV, weekly Digital Vaccine package, and reputation feed help networks stay ahead of attacks by blocking infiltration, phone-home, command-and-control, and data exfiltration.
Russell Meyers, Global Product Line Manager, HP TippingPoint
Security defenses are only effective when you can easily deploy and manage them. HP TippingPoint Next-Generation Intrusion Prevention System and Next-Generation Firewall make it easy. And the TippingPoint Security Management System provides a dashboard to show you the state of your defenses and instantly see attacks that are blocked.
Every second matters. Watch this interactive demo to learn how:
· Easy it is to automatically download the latest Digital Vaccine packages to stay up-to-date with the latest security intelligence
· Simple it is to share security configurations and policies across devices
· The at-a-glance dashboard effortlessly shows your protection status
· To automatically create protection, status and network behavior reports
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
Threats to the network continually evolve, which makes isolating the victimized “patient zero” machine nearly impossible. Today’s advanced threats require an advanced approach to security. This session explores how HP TippingPoint stops these attacks in their tracks by neutralizing patient zero through behavior, static, and dynamic detection. Join us to learn how this layered security approach is the most effective way to minimize the threat of network infiltration and, when it does occur, protect your infrastructure from further damage.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response weighs heavily on the minds of security practitioners today. Prompted by the recent data breaches and attacks plaguing enterprises large and small, a new SANS survey project asked IT professionals to explain what steps they take immediately following a breach and to share how successful those steps really are.
Tune into Part 1 of the Incident Response Techniques webcast to hear highlights from the survey results and discussion concerning where we are as an industry in a typical six-step incident response process.
In application vulnerability testing performed by HP, 52 percent of total vulnerabilities found are on the client side, and 48 percent are on the server. That is one of the real-world statistics uncovered by the HP 2013 Cyber Risk Report and summarized in this informative four-minute video.
The Cyber Risk Report video presents the data you need to separate the hype from the real threats and better plan how to spend your security dollars. View it to learn the most common kinds of attacks and to hear the one lesson learned from the in-depth study of the 2013 attack that took down South Korean Banks.
Jennifer Ellard, HP, Patrick Sweeney, Dell, Robin Layland
Jennifer Ellard from HP, Patrick Sweeney from Dell and Robin explore what role research by security vendors plays in stopping threats. Issues examined include the definition and importance of good research and how vendors shine and fall short. The discussion then moves on to selecting a security solution that is backed by world-class research.
Delivering Advanced Network Defense to the Enterprise
This channel covers the latest topics in network security, virtualization security, and threat research from TippingPoint and DVLabs to help security professionals protect their network against ever-evolving threats