Hi [[ session.user.profile.firstName ]]

Trustwave

  • Date
  • Rating
  • Views
  • Understanding PCI DSS 3.2: Minor Updates, Major Changes Understanding PCI DSS 3.2: Minor Updates, Major Changes J. Andrew Brinkhorst, CISM, Director of Product Management at Trustwave, and Dixie Fisher, Product Marketing Manager Recorded: May 25 2016 60 mins
    Payment Card Industry Data Security Standard (PCI DSS) 3.2 has now been announced - organizations who must comply need to understand the implications. Join us to learn more about the drivers for the early release of the mandate and how you can best prepare your organization.

    Attend this webinar for helpful insights about:

    -The scope of the new PCI DSS 3.2
    -What the updates mean for your business?
    -Why you would want to make these changes even if they weren’t mandated?
    -What may be on the horizon?
  • Understand Cybercrime Trends and Tactics to Defend Against Them Understand Cybercrime Trends and Tactics to Defend Against Them Lawrence Munro, Director of SpiderLabs EMEA and APAC at Trustwave Recorded: May 18 2016 50 mins
    The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

    Join this webinar as we highlight our major findings and offer you a chance to:
    • Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
    • Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
    • Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.
  • Understand Cybercrime Trends and Tactics to Defend Against Them Understand Cybercrime Trends and Tactics to Defend Against Them John Randall, Director of Product Marketing at Trustwave Recorded: May 10 2016 59 mins
    The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

    Join this webinar as we highlight our major findings and offer you a chance to:
    • Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
    • Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
    • Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.
  • How to Pacify Your Security Pressures How to Pacify Your Security Pressures Dan Kaplan, Editor at Trustwave, and John Ramsey, Strategic Partner Marketing Manager at Trustwave Recorded: Apr 6 2016 62 mins
    Security pressures are mounting - and there are more of them than ever before. We know you're under stress, understaffed, and likely, already under attack. Trustwave surveyed 1,414 information security professionals to understand the emotional factors that contribute to a security professional’s headaches and hardships. Join us to learn how to alleviate these pain points and escape the pressure.

    During this webinar we will break down the findings of the 2016 Security Pressures Report from Trustwave, including:

    • Do security pros feel they have enough skills and personnel?
    • How have overall security pressures changed year over year?
    • What are some practical recommendations you can implement in your organization to reduce the pressure?
  • Ask the Analyst: Breach Planning and Preparedness Ask the Analyst: Breach Planning and Preparedness Eric Ogren, 451 Analyst; Brian Hussey, Trustwave SpiderLabs Global Director Recorded: Jan 27 2016 60 mins
    It is always a good idea to be prepared. A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Even more, in today’s risk environment you need to know what tools to have in place to flag potential indicators of a compromise, have a response team on the ready and have a digital evidence trail for legal protection.
    Join us for an interactive discussion with guest speaker, 451 Research Senior Analyst, Eric Ogren and Trustwave SpiderLabs Global Director of Incident Response and Digital Forensics, Brian Hussey, to learn more about what you should do before, during and after a breach. Help drive the conversation by submitting a question for Eric and Brian in advance so we can tackle your biggest security concerns such as:
    • What is the likelihood of getting breached?
    • Best practices around building an IR plan
    • If you’ve been breached, what is the first thing you should do?
  • The Security Survival Guide for Growing Businesses The Security Survival Guide for Growing Businesses Chris Harget, Trustwave Senior Product Marketing Manager Recorded: Jan 13 2016 61 mins
    Join Trustwave for a deeper look at the topics highlighted in our new e-book, The Security Survival Guide for Growing Businesses. To help you navigate the many challenges around information security, we will focus on some key questions including:

    • Is your security growing with your business?
    • Do you have a viable plan to handle the 3 biggest security challenges facing growing businesses?
    • Where should you begin?

    In this interactive session, find out what your peers are most concerned with, how they prioritize, and what works best for reducing risk. We will feature a couple of real world examples of breach incidents, discuss how the breaches occurred and simple steps you can take to prevent your business from becoming the next victim.
  • Securing databases like a boss: Five winning moves Securing databases like a boss: Five winning moves Oliver Pinson-Roxburgh, EMEA Systems Engineering Manager at Trustwave Recorded: Nov 11 2015 56 mins
    As breaches of the network perimeter become more common, organisations that safeguard data where it lives - in the database - will prevail. Data stores are an enticing target for cybercriminals. This is only amplified by the common misconception many organisations have that their database assets - whether they are on premise, in a datacenter or in the cloud - are secure.

    So, where do you start? What can you do right now to secure your databases with authority and finesse?

    Join this webinar and learn:
    • The top five threats to database security
    • How a real-life database attack unfolds
    • The five quickest, highest-impact actions you can take right now to harden your databases

    BONUS: Attendees may be eligible for a 6-month database security assessment tool license at no cost.
  • Securing databases like a boss: Five winning moves Securing databases like a boss: Five winning moves Sam Bakken, Product Marketing Mgr, Mark Trinidad, Sr. Product Mgr, and Martin Rakhmanov, Sr. Security Researcher Recorded: Oct 14 2015 55 mins
    As breaches of the network perimeter become more common, organizations that safeguard data where it lives - in the database - will prevail. Data stores are an enticing target for cybercriminals. This is only amplified by the common misconception many organizations have that their database assets - whether they are on premise, in a datacenter or in the cloud - are secure.

    So, where do you start? What can you do right now to secure your databases with authority and finesse?

    Join this webinar and learn:
    • The top five threats to database security
    • How a real-life database attack unfolds with Trustwave SpiderLabs Senior Security Researcher, Martin Rakhmanov
    • The five quickest, highest-impact actions you can take right now to harden your databases

    BONUS: Attendees may be eligible for a 6-month database security assessment tool license at no cost.
  • The Wild Wild West of Secure Mobility: How to Holster Up & Win in a Lawless Land The Wild Wild West of Secure Mobility: How to Holster Up & Win in a Lawless Land Dixie Fisher, Product Marketing Manager at Trustwave and Jon Marler, Product Manager at Trustwave Recorded: Sep 16 2015 53 mins
    With smartphones and tablets rapidly replacing desktop computers and wearables and Internet of Things connectivity merging in to the expanding mobile landscape, it’s critical that the scope of your security practices move beyond BYOD and the confines of your corporate network. Tune in to our webinar, “The Wild Wild West of Secure Mobility: How to Holster Up & Win in a Lawless Land,” for new perspectives about protecting your mobile business as you venture ahead.

    During this webinar you will learn about:
    • Today’s mobility landscape
    • Tips for keeping the bad guys out
    • New frontiers: Cost-effective solutions for today and tomorrow
  • 7 Secrets to Defending Against New Advanced Threats on a Budget 7 Secrets to Defending Against New Advanced Threats on a Budget Chris Harget, Senior Product Marketing Manager at Trustwave Recorded: Aug 26 2015 57 mins
    Advanced threat techniques are available for purchase by cybercriminals who now target companies of all sizes for quick cash at high ROI. If you don’t have an army of IT security specialists and an unlimited IT budget, you’re probably feeling overwhelmed by the always-changing threat.
    Join us for an informative webinar, “7 Secrets to Defending Against New Advanced Threats on a Budget.”

    During this webinar you will learn the:
    •Business dynamics accelerating advanced threat use by criminals
    •Critical choke points that almost all advanced threats have to go through to succeed
    •Tips for the most cost-effective and achievable ways to stop advanced threats today and tomorrow

Embed in website or blog