The New Threatscape: What Security Managers Need to Know

Forrester, Vice President - Jonathan Penn | ESET, Director of Technical Education - Randy Abrams
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment.

Forrester Research: Understanding and adapting to the New Threat Landscape

* What you need to know about the changing nature of the threat landscape
* Which long-held security principles are outdated, and which ones should be adhered to
* Where to invest to maximize the impact of your efforts while minimizing risk

ESET: The New Threatscape - What hasn't changed?

* Recognizing old attacks in the context of new technologies
* Addressing the constants; Security software, patch management, password management, encryption, education

What is the Cybersecurity Masters Series?
ESET's Cybersecurity Masters webinar series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Register now >>
Apr 28 2011
59 mins
The New Threatscape: What Security Managers Need to Know
More from this community:

Mobile Computing

  • Live and recorded (1176)
  • Upcoming (33)
  • Date
  • Rating
  • Views
  • Business computing is changing before our eyes. Physical PCs and servers cannot keep pace with the mobile workforces of today or tomorrow. BYOD (Bring Your Own Device) is no longer a “nice to have”, it is a “must have”. The problem most companies face is providing secure and controllable access – anytime, anywhere – to the data, applications, tools and resources required to maintain an enterprise network. DaaS is quickly becoming the leading solution for companies to adopt a comprehensive BYOD policy while actually increasing security and ubiquitous access. Join Nuvestack, the leader in DaaS technology, for an informative and insightful look at what it really takes to implement and manage DaaS as a BYOD strategy.
  • Every year, businesses are making the decision to adopt a Unified Communications platform. Why? The reason is simple – Unified Communications capabilities save companies time and money, and increases productivity.

    Today’s mobile and resource-challenged workers require more freedom and flexibility in how they communicate with their colleagues, teams, partners and customers. Instant Messaging, Presence, Voice and Video Calling, SMS Texting, and Screen Sharing features enable employees to easily connect with their colleagues, partners and customers. Each of these tools have an associated cost, which can add up quickly per user. By removing the a la carte price tags and contracts and rolling all of the tools into one unified platform, both the business and its employees reap the benefits.

    In this webinar, we will cover the following:

    - Typical per-user spend on Screen Share, Video Conferencing, Presence, and IM tools

    - Why businesses are moving to Unified Communications

    - Features of a Unified Communications system
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • With 40% of time at work spent on administrative chores, inefficient communication is a big problem in business. Find out how to use tech to reduce wasted time in meetings, spend less time in your inbox and improve the way your company collaborates.

    About the presenter: Ray Gillenwater is the Co-founder and CEO of SpeakUp (getspeakup.com) an Enterprise Collaboration platform that enables collaborative problem solving and ideation. A student of Communications and a former executive at BlackBerry, Ray will share his experience and recommendations to help improve communication at your company.
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Speakers:
    John Koetsier: VP Research; VentureBeat
    Jen Kavanagh: EVP, General Manager (US); Beamly

    Abstract:
    The biggest apps and the most successful enterprises do things differently. Mobile marketing automation is how Subway Surfer improves monetization. It's how Starbucks engages deeper with its customers. And it's how Plants vs Zombies gets you back.

    We surveyed 375 mobile developers with over 900 million monthly average users to find the best mobile marketing automation platforms. Then we analyzed 1.8 million apps in Google Play and the iOS app store, conducted 17 live interviews, and surveyed 19 MMA providers.

    The result is the most complete report on mobile marketing automation available.
  • With 75% of enterprise users reporting that they use their cell phones for making work calls, the inevitable question we must ask is, "can we just run our business on cell phones and ditch the PBX?" In this webinar, we will review the massive changes in the wireless landscape that have made this viable in the past 3 months, the solutions that make it possible and what implications this has for the modern BYOD organization.
  • Channel
  • Channel profile
  • Next Generation IPS Recorded: Feb 26 2013 36 mins
    Next Generation Intrusion Prevention Systems – exactly what does that mean?

    We hear the same story from IT decision makers all the time –

    “How do we cut through all the marketing fluff and get to the real meat of the solution? Vendors are always jumping on the bandwagon with new buzzwords for what their products do.

    How do we get to the TRUTH about these solutions!?”
    That’s the purpose of this webinar. We will go through what Next Gen IPS can mean, and how it is interpreted differently by various vendors.

    In this webinar, you will learn:

    1.A clear Understanding of what IPS is
    2.The Features that make something “Next Gen”
    3.When those features are important to you
    4.How to determine if you need an IPS solution in your network
  • Steal This Data! Recorded: Jan 29 2013 56 mins
    Email is the #1 channel for lost data in the enterprise, and the most widely used!

    Email is essential to every aspect of business. It is a constant balancing act for security professionals to 1) make email usable and 2) make email secure.

    With the rise of regulations in almost every industry, each business has to resolve the challenge of securing email effectively and affordably.

    This webinar will go through Email Data Loss Prevention strategies that are you can implement today without slowing down your network or adding to your management overhead.

    Let’s Talk - Agenda
    What is DLP?
    Why Do You Need DLP?
    Regulations You Face
    Case Study: IronPort and DLP
    How To Evaluate DLP
    Why Galaxy Technologies
    Next Steps
  • Healtcare Data Protection: Weathering The Perfect Storm Recorded: Nov 2 2012 37 mins
    -How best to secure your digitized Health Care system/records
    -What that means to your regulations
    -Latest technologies developed to address these concerns
  • WARNING: Your Anti-virus Is Bleeding Money Recorded: Aug 31 2012 28 mins
    5 Ways To Tell If Your Current Anti-virus Solution Is Costing You Money And What You Can Do About It !
  • Key Considerations for Selecting Endpoint Security Solutions Recorded: May 18 2011 60 mins
    Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

    Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

    To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

    • The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
    • Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
    • High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
  • The New Threatscape: What Security Managers Need to Know Recorded: Apr 28 2011 59 mins
    Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment.

    Forrester Research: Understanding and adapting to the New Threat Landscape

    * What you need to know about the changing nature of the threat landscape
    * Which long-held security principles are outdated, and which ones should be adhered to
    * Where to invest to maximize the impact of your efforts while minimizing risk

    ESET: The New Threatscape - What hasn't changed?

    * Recognizing old attacks in the context of new technologies
    * Addressing the constants; Security software, patch management, password management, encryption, education

    What is the Cybersecurity Masters Series?
    ESET's Cybersecurity Masters webinar series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Register now >>
OK, you can stop worrying now.
Security is hard. Working with a security VAR doesn't have to be. At GalaxyTech International we focus on making your life easier. Simplified product offerings, professional services you can afford, and an attitude of service are how we do it. We want you so happy with our service, that you could never imagine working with anyone else!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The New Threatscape: What Security Managers Need to Know
  • Live at: Apr 28 2011 5:00 pm
  • Presented by: Forrester, Vice President - Jonathan Penn | ESET, Director of Technical Education - Randy Abrams
  • From:
Your email has been sent.
or close
You must be logged in to email this