Danielle Kriz, Sr Director, Global Policy at Palo Alto Networks and Aravind Swaminathan Global Co-Chair, Orrick
Doing business in the European Union is changing. By May 2018, companies must comply with the new General Data Protection Regulation’s (GDPR) data breach notification requirements and the Network and Information Security (NIS) Directive’s security incident notification requirements.
Notification requirements make it imperative to prevent incidents before they happen. To help you prepare for these new requirements, Palo Alto Networks is hosting a webinar with cybersecurity and data privacy lawyers from Orrick Herrington & Sutcliffe to discuss:
· What are the requirements and the deadlines under each law?
· What are the thresholds for notification, and who needs to be notified?
· How should companies prepare for their oncoming obligations? What strategies should be in place? What have other international companies done to prepare and communicate?
· What might be the legal consequences of non-compliance?
Gregory Albertyn, Sr Director Cybersecurity & Privacy at PwC, Simon Mullis, Global Technical Lead GSIs at Palo Alto Networks
Traditional approaches of detecting and remediating threats are becoming increasingly inadequate to effectively manage risk in today’s increasingly regulated, cyber threat landscape.
Join a live webinar and Q&A to learn how PwC and Palo Alto Networks have formed a strategic partnership to help more customers achieve cyber resilience.
The webinar will introduce
•The emerging regulatory landscape that is driving the need for organizations to redesign their incident response and data compliance programs
•A state-of-the-art security framework that serves as a guide for organizations to assess, develop, and implement a breach prevention security posture.
•Recommended security architectures, organizational structures, and computing processes that enable breach prevention.
•Live Q&A with cybersecurity experts from PwC and Palo Alto Networks, for practical insights and real world experiences.
Fred Streefland, Leaseweb Global and Dharminder Debisarun, Palo Alto Networks
The cynical would suggest that cyber insurance is growing as some look for a cheaper route to manage risk. However many see the cyber insurance industry as potentially the new enforcer of good security practices.
Palo Alto Networks customer Leaseweb is an organization that recently purchased cyber insurance. We invite you to join us on Thursday September 22 for an interview with Fred Streefland, IT Security Manager at Leaseweb Global. Palo Alto Network’s Dharminder Debisarun interviews him to learn more their decision to purchase cyberinsurance. You will hear what is generally covered and how it can be part of a prevention strategy. There will also be a chance to answer questions at the end of the session.
A cloud-based community-driven approach for advanced threat detection and prevention is paramount to successfully combatting attackers. The scale, speed of enhancements, community leverage, and automated prevention that WildFire provides is unparalleled. At the same time, some organizations are concerned about data privacy and protection when dealing with cloud-based threat analysis.
Palo Alto Networks is proud to introduce the WildFire EU cloud. Customers now have the option to submit unknown files and e-links to the WildFire EU cloud for analysis, where data is fully analyzed without ever leaving European borders. This is of particular interest to companies within the European Union and international organizations looking for localized clouds combined with the power of global cloud threat analytics.
At this valuable and information webinar we will explore how WildFire EU cloud helps you:
1. Address data privacy needs – Data analyzed by WildFire EU cloud remains within the boundaries of the EU. This alleviates data transfer concerns shared by some of our customers and addresses the needs of many international organizations.
2. Leverage global threat intelligence – WildFire EU cloud leverages access to the largest threat analysis tool in the World used by more than 10,000 customers as part of the Palo Alto Networks next generation security platform, providing complete prevention capabilities.
3. Take advantage of groundbreaking Threat Analytics and Correlation – Security teams can accelerate threat hunting, analytics and response efforts with globally correlated intelligence from the entire WildFire community, made directly accessible through the AutoFocus service.
Michael Davis - CTO, CounterTack and Prashant Verma - Sr. Practice Manager, Paladion Networks
Join CounterTack and Paladion Networks for a live webinar as we walk through the attack that shook banks across the globe. We'll hear from the incident response team at Paladion who supported the investigation, and will discuss:
· How the criminals gained access to the SWIFT servers
· The timeline of events that took place
· A fatal mistake that led investigators to the discovery
· Takeaways organizations can learn from to prevent similar attacks
Greg Day, Chief Security Officer EMEA at Palo Alto Network
Digital Transformation is the primary driver of business innovation for the rest of this decade. But security is in danger of being left behind, as mobile, big data and cloud solutions go mainstream. Security is often seen as the blocker to innovation, so businesses avoid talking to security professionals until it’s too late. A disregard for security exposes the business to risk at a time when data protection compliance regimes are tightening. This session shows how organizations can deploy next generation security approaches to accelerate digital transformation while increasing security and reducing risk.
Jonathan Armstrong: (Cordery Compliance), Florian Malecki; (Dell) & Luke Shutler (Absolute Software)
The webinar will enable you to hear from an independent Legal Specialists on the real challenges and impacts of the EU GDPR and then the webinar will demonstrate how Dell & Absolute can support your business in overcoming these challenges.
The webinar will focus on:
• Implement a seamless, connected security strategy that works across the organisation, from device to data centre to cloud
• Prove that a lost device is inoperable or has had its data completely wiped
• Gain visibility of data breaches and contain and eradicate threats
• Eliminate the blind spots between networks, identity and access management, data encryption, endpoint security and security managed services
• Enable security decisions based on intelligence that takes into account user, content, location and context
Paolo Passeri, Consulting Systems Engineer Security at OpenDNS
Ransomware has become a common and dramatic problem and the recent waves of attacks are demonstrating that new variants emerge each day in what seems an endless arms race where the attackers seem to prevail.
However, even if the attack vectors are increasingly complex, the attackers cannot conceal themselves as the infrastructures used to launch these campaigns, despite extremely volatile, exploit elements of the internet, such as IP and domains, that cannot be hidden.
Monitoring large scale data allows to identify these infrastructures, where attacks are staged, and to enforce a new predictive security model particularly effective against Ransomware.
Peter Smith, Regional Sales Manager - Europe & Russell McDermott, Sales Engineer, Netwrix
With a recent increase in high-profile security breaches and compliance violations, traditional security mechanisms, such as firewalls, IDS, and antivirus are no longer enough to defend against external attackers, and insider threats. By having increased visibility into internal changes, configurations, access events, and permissions across the IT infrastructure, organizations can far more effectively defend against such attacks.
So, please join our local auditing and compliance team from Netwrix, Pete Smith (Regional Sales Manager Europe) and Russell McDermott (Pre-Sales Engineer) and see how Netwrix Auditor can unlock the door into possible breaches in your IT environment.
From our brief session you will learn:
• How deeply security breaches and data leaks are really effecting organizations
• How to protect your data from the insider threats
• How to have “peace of mind”, and achieve complete visibility of your IT infrastructure
Dan McWhorter, Chief Intelligence Strategist at FireEye
Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
Sunil Choudrie, Global Solutions Marketing Manager
When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?
Organizations today face the following challenges:
•Identifying the type of data that needs to be protected
•Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
•Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015
Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.
Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
Leon Brown - Product Marketing, Symantec Website Security & Avishay Zawoznik - Security Researcher, Imperva Incapsula
After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.
Matt Webster, CTU Security Researcher, SecureWorks
SecureWorks® incident responders assist hundreds of organisations annually with the containment and remediation of threats during suspected security incidents.
Visibility of these incidents provides the SecureWorks Counter Threat Unit™ (CTU) research team with a unique view of emerging threats and developing trends. This Threat Intelligence is then continuously provided to clients, arming them with the information they need to stay one step ahead of adversaries trying to compromise their networks.
In this webcast Matt Webster, CTU Security Researcher, will discuss developments in the threat landscape observed through SecureWorks’ Incident Response engagements from April to June of 2016, including;
- Key developments of the APT threat
- Criminal cyber threat trends
- Developments in Ransomware
Matt will also discuss observations of how the affected organisations could have better prepared for the threats they encountered.
Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
Michael Suby, Vice President of Research at Frost & Sullivan
Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.
The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.
In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.
• How to calculate the total cost of ownership of a SIEM
• The basic functionality that every SIEM should have to confidently breeze through preliminary activities
• The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk
Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.
Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.
On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
Bots are more than just trendy. They’re increasingly becoming a smart business decision and one that more than just the big players are sitting up and noticing. From Foursquare’s Marsbot (eatery recommendations) to Uber (rides) to the many bots that plug in to Slack, it’s clear there is both a B2B and B2C purpose for bots.
For Activision, using bots via Facebook to announce this year’s Call of Duty: Infinite Warfare release to consumers netted them over 6 million messages between users. The beauty of bots, as Activision and others have discovered, is that they allow businesses greater access to increasingly mobile messaging consumers. Facebook is investing fully in the chatbot experience with brands including Staples, Bank of America, and Taco Bell.
For both consumer brands and B2B companies, the time is now to consider the implications of bots for the bottom line.
Join this panel of executive leaders as they discuss the use cases for bots for consumers and between businesses, including:
• Elements of a successful bot strategy
• Where consumers prefer to interact with bots
* In-depth discussion of the B2B use cases for bots
* Amir Shevat, Head of Developer Relations, Slack
* Robert Hoffer, "The Bot Father"
• Jon Cifuentes, Analyst, VentureBeat
• Wendy Schuchart, Moderator, VentureBeat
Find out about how organizations can dramatically lower storage infrastructure costs by deploying a cloud-based object storage solution.
Led by Google executives, Brian Stevens and Carl Schachter, this webcast will discuss:
●The benefits of using cloud as another storage tier?
●When to consider Cloud Storage (GCS) for secondary storage
●How to potentially use Cloud (Google Compute Engine) for Disaster Recovery
●Potential issues with bandwidth, recovery time, cost, security and usability
Google Cloud Storage Nearline is a low-cost, highly-durable and highly available storage service for infrequently accessed data, data archiving, online backup and disaster recovery. Data is available instantly, not within hours or days. With sub-second average response times and 1 cent per GB/month pricing, Cloud Storage Nearline gives you terrific performance at a low cost.
What every organization needs to know before, during, and after a ransomware attack.
Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.
Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.
Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.
•Why ransomware is surging.
•Where it comes from.
•What to do before, during, and after an attack.
•Should you pay or not? What to consider.
Exploit kits don’t stop. Neither should your business.
Join us for Part 3 of this compelling 4-part series on mobile data. After all, it’s not news that when it comes to apps, consumers can be very fickle, engaging for one download and then abandoning the app. In many ways, an app marketer’s real job only begins after the install. Boosting engagement metrics and increasing the lifetime value of app users is what really matters more than ever.
A compelling value prop and smart design are necessary but not sufficient to keeping people engaged. You also need to apply data and technology on an ongoing continuous basis to strengthen and sustain your user relationships, and in turn boost the LTV of the average app user by extending both their “lifetime” and their value. Furthermore, being proactive about managing churn, and retargeting users outside of the app itself, can mean the difference between success and failure.
Join this exclusive VB Live event as experts from retail, hospitality and on-demand services demonstrate how to:
* Use the right technology to maximize LTV of app users
* Optimize each user engagement to avoid app abandonment and churn
* Learn acquisition-engagement tactics such as: pre- and post-install segmentation, organic growth, retargeting and reward-based acquisition
* Aaron Price, SVP of Marketing, Expedia
* Rob Willey, VP of Marketing, TaskRabbit
* Jillian Burnnett, Director of Customer Success, mParticle
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
The journey to the mobile enterprise is a challenging one. Employees expect consumer-app-like experiences, business owners want sophisticated apps quickly and IT is dealing with maintaining current infrastructure while tackling other hot priorities such as moving to the cloud and big data.
At Magnet, our mission is to help the enterprise move to mobile. Our enterprise-grade Magnet Mobile Platform empowers companies to build powerful and highly engaging mobile apps that take advantage of all the innovative features in the native OS.
Join Tom Ku, VP Enterprise Mobility to learn more about the Magnet Mobile Platform and see how you can build and deploy successful enterprise mobile apps.
Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.
These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.
Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.
Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:
· How cybercriminals craft Email Fraud messages and where they get their information
· How to help executives hide the information that cybercriminals may be using to shape Email Fraud
· Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
· What kind of business controls can be put in place to protect against Email Fraud manipulations
In a recent survey commissioned by Uniphore, Opus Research asked 500 influential executives in the contact center and customer experience domain about the perceived value of Speech Analytics and to ascertain the impact on plans to procure and deploy such resources in the future.
With completed interviews of decision-makers (Director, VP, C-level) from firms with revenue of more than U.S. $50 million, the survey respondents included a mix of vertical industries, including: telecommunications, healthcare, financial services, retail, pharmaceuticals, travel & tourism, and commercial banking.
Join Dan Miller, lead analyst & founder at Opus Research, and Derek Top, director of research with Opus Research, as they unveil the key findings from this exclusive executive survey on speech analytics:
* Implementation of speech analytics is poised for growth: New, real-time applications create better customer experience
* Findings attest to maturity of technologies, applications and options: Support of multi-channel support strategies
* Mix of premises, cloud and “hybrid” architectures
* Respondents see a bright future: Most expect to increase spending and investment & finding means to build a business case
*This webinar will be conducted in Mandarin
Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.
In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:
The foundational security controls now required by law
How these controls are applied to mobile
Best practices to achieve compliance
The central role of Enterprise Mobility Management (EMM)
In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.
Join this web event for a deeper dive, and be the first to see this new suite in action:
Manage hybrid and multi-cloud environments
Develop, deploy, and scale cloud-native applications
Drive business performance with focused analytics
More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.
View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517