Browse communities
Browse communities
Presenting a webinar?

Centralizing Compliance Controls: Achieving Scale and Cutting Costs

Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
Organizations often approach regulatory compliance with one-off projects, deploying a set of controls for each regulation. This approach to enterprise-wide management of compliance can become expensive and difficult to sustain, let alone develop and expand to meet growing demands. This presentation will address how a centralized system coupled with an IT governance framework may be used to achieve multiple compliance regulations and manage them efficiently with a consolidated view across an entire organization.
May 22 2012
44 mins
Centralizing Compliance Controls: Achieving Scale and Cutting Costs
  • Channel
  • Channel profile
  • HP Cyber Risk Report 2015: The Past is Prologue Recorded: Mar 12 2015 28 mins
    Jewel Timpe, Senior Manager- Threat Research, HP Security Research
    In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

    The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
  • If SIEM is Dead It’s Because You Killed It Recorded: Feb 26 2015 31 mins
    Jesse Emerson - Director, Security Intelligence & Ops Consulting
    Deploying and managing security information and event management systems can tax the brain and budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what's happening on the entire network and enabling security teams to focus on the most pressing priorities to make sure their organizations' infrastructures are safe and sound from attacks. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use.
  • Applied Security Analytics Recorded: Feb 26 2015 45 mins
    Jeff McGee, Solutions Innovation Data Scientist, HP
    Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
  • Outthinking the Bad Guys Recorded: Feb 6 2015 22 mins
    Art Gilliland, General Manager of HP Enterprise Security Products
    Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Defending Against Advanced Attacks Recorded: Jan 5 2015 25 mins
    Mark Nicolett - Managing VP, Gartner
    A webinar with Gartner VP Mark Nicolett, provides solid tips to reduce your vulnerability.

    The recent data breach cost Target more than $60 million in recovery costs. And even that has been exceeded at other companies that have fallen victim to advanced targeted cyber attacks.

    View the webinar to learn:
    •How to present a hard target to hackers
    •How advanced persistent attacks work
    •How the SOC and NOC can work together
    •Best practices for security information and event management (SIEM)
  • Advancing Incident Management: The Next Evolution Recorded: Dec 18 2014 38 mins
    Mitchell Webb
    To combat advanced adversaries, we must improve our detection and response capabilities. This presentation will cover emerging processes and technologies in security operations that allow organizations of all sizes to improve their detection and response effectiveness. The capabilities presented here have been used by HP to detect and remove advanced threats for organizations across the globe.
  • Top 10 tips to be compliant and secure together Recorded: Dec 8 2014 37 mins
    Sridhar Karnam, Sr. Product Marketing Manager, ESP HQ Team
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • The cost of inaction—what cyber crime could cost your business Recorded: Oct 29 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    The average company in the United States loses $12.7 million annually to cyber crime. Other countries are close behind. These are results from the recently completed Ponemon Institute 2014 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    View this webinar with Dr. Larry Ponemon to get the information you need. You’ll learn:

    - What cyber crimes are most common and most costly
    - The hidden internal and external costs you incur
    - What security defenses are most effective in reducing losses
    - How businesses with a strong security posture drive down costs.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: APJ Recorded: Oct 10 2014 56 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Asia Pacific and Japan

    The cost of cyber crime is on the rise in the APJ region, according to the 2014 Cost of Cyber Crime study from the Ponemon Institute. Among 30 companies surveyed in Australia, the reported per-company cost for Internet-driven crime was $4 million, up 8.4% from 2013. In Japan, the per-company average hit $6.9 million in the study, up 5.7% from 2013.

    On the more optimistic side, companies in the region are achieving notable ROI for their investments in cyber security solutions. The average ROI for seven security technologies was 16% in Australia and 17% in Japan. For a close-up view of these and other findings from the institute’s research in Australia and Japan, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our APJ Security webinar.
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: Americas Recorded: Oct 9 2014 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in the Americas

    In the 2014 Cost of Cyber Crime study, U.S. companies reported an average of $12.7 million in losses to cyber crime. That was the highest national average in the study by the Ponemon Institute. Among the 59 U.S. companies in the survey, the average cost of cyber crime climbed by more than 9% over the course of the year.

    Among other findings, the study noted that the most costly cyber crimes are those caused by denial of services, malicious insiders, and malicious code. These threats account for more than 55 percent of all cyber crime costs. For a fuller look at these and other findings from the institute’s study of U.S. companies, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our AMS Security webinar
  • 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA Recorded: Oct 8 2014 59 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    Explore cyber crime in Europe

    For its 2014 Cost of Cyber Crime study, the Ponemon Institute expanded its focus in Europe to encompass the Russian Federation, as well as France, Germany, and the United Kingdom. Collectively, the institute surveyed 137 companies in Europe in a study that found broad differences in the reported costs of cyber crime across the region. The per-company average ranged from $3.3 million in the Russian Federation to $8.1 million in Germany.

    The study results indicate that over the course of the year, cyber crime rose 20.5% in France, 17.4% in the U.K., and 7.2% in Germany. For a closer look at these and other findings from the institute’ European research, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our EMEA Security webinar.
  • Catching Insiders: It's a 'People' Problem (Technology Can Help) Recorded: Sep 17 2014 45 mins
    Jesse Hughes, Managing Principal, HP
    “Et tu, Brute? Then fall, Caesar!” A rather famous line from Shakespeare’s Julius Caesar that, whether historically accurate or not, encapsulates the terror and surprise felt at the discovery of an Insider, and serves to highlight the persistence of the problem we refer to as the Insider Threat. There has always been an Insider Threat, the hard question is, why have we not done more about it? Once we understand the ‘why’ and the ‘who’ (who are Insiders, and who are the rest), we can move on to the ‘How’ we are going to find them. In this presentation we will discuss Insider Threats, their varying levels of sophistication, and different ways in which others might use them. We then apply this understanding to enabling discovery. Join us for an interactive presentation, and discussion on this persistent security challenge.
  • A look at the common, the curious, and the future of SIEM Recorded: Aug 12 2014 26 mins
    Mary karnes, Strategic Solutions Portfolio Manager
    SIEMs can be a useful and powerful platform functioning as the cornerstone of a security program. In this webinar we will explore the various ways we see clients using SIEM technology, how customers grow and mature their SIEM capabilities over time, and a sneak peek into the more interesting ways we see SIEMs being used right now.
  • State of Security Operations 2014 Report Recorded: Jul 15 2014 7 mins
    Chris Triolo, VP ProServ, HP Enterprise Security & Charles Sterner, Senior Manager, HP Cyber Defense Center
    1 in 4 Security Operations Organizations is ineffective. See how HP assesses security operations capabilities and how they used lessons learned in building their own Cyber Defense Center.
  • Top 10 ways to Solve Your Security Puzzle with ArcSight Logger Recorded: Jul 2 2014 34 mins
    Sridhar Karnam
    Organization’s today are faced with a key business challenge –massive amounts of useful data is being lost every second! According to IDC’s ‘The Digital Universe’, only 3% of data is actually being tagged for Big Data value. How do you ensure your business is handling Big Data challenges? This presentation highlight the top 10 ways HP ArcSight Logger can solve your security challenges. ArcSight’s newly released Logger is the fastest search engine on the planet for machine data. The universal log management solution collects, stores, and analyzes all of your Big Data for security event management and is used for IT operations, compliance, flow analytics, email security, weblog analysis, and more. ArcSight unifies your entire IT data through a unique technology called normalization and categorization, and then correlates the events across the devices in real-time. Find out how Logger can enable your business to stop the bleed and turn data into actionable security decisions.
  • From zero to SOC in 10 steps Recorded: Jun 17 2014 49 mins
    Paul Brettle, Pre-Sales Manager, HP
    In this presentation, we will look at what it takes to become a success when trying to address security monitoring and alerting. It is commonly regarded that log management, monitoring and alerting is seen as a corporate or enterprise solution due to is complexity and costs, but this presentation will address the steps that any organization can take to go from zero to hero. Building on a easily followed process and step by step guide, we will cover the way that organizations can move from one step to the next, managing costs and complexity at each stage. Starting with the basic steps needed to build a foundation, a SOC can be build up and deliver real value and capability without excessive cost or complexity.
  • Compliance. Check. Now what? Recorded: May 27 2014 40 mins
    Jesse Emerson, Global Director of Security Intelligence and Operations Consulting (SIOC) HP
    Organizations are tasked with various compliance standards – from PCI to HIPAA - yet less than 1/3 of organizations are achieving their compliance objectives with their security operations centers.  Those that have achieved compliance are still falling short on maturity and effectiveness.  The 2014 State of Security report compiles information from 90+ maturity assessment performed over 5 years. Hear the revelations behind the report and what you can do to move your security organization from mere compliance to true effectiveness.
  • 5 Steps to Improve Your Incident Response Plan Recorded: May 20 2014 57 mins
    Ted Julian, CMO, Co3 Systems & Richard White, Principal, HP Security Intelligence & Operational Consulting, MBA CISSP CHP
    In today’s world, your organization needs an incident response plan to cover disasters, cyber-attacks, and other threats. While simply having a plan will help you check the box on the audit, it doesn’t guarantee effectiveness in a real-world situation. An Incident Response Assessment—done through fire drills, desktop exercises, functional scenarios, and full scale exercises—will help your organization truly validate the effectiveness of your plan.

    IR assessments are meant to:
    • Evaluate plans, policies, and procedures
    • Find weaknesses in the plan and gaps in resources
    • Improve coordination and communication internally and externally
    • Define and validate roles and responsibilities
    • Train personnel in their roles and responsibilities
  • Closing the Book on Heartbleed - and Avoiding Future Sad Stories Recorded: May 14 2014 61 mins
    Joanna Burkey, TippingPoint DVLabs Manager, and Joe Sechman, Manager, Software Security Research for HP
    The Heartbleed vulnerability in OpenSSL forced millions of users to changed passwords and enterprises to rapidly patch thousands of servers.Because of all the publicity there continues to be a lot of CXO-level awareness around cyber security and now is the perfect time to recommend strategies for avoiding or mitigating the next Heartbleed - and there *will* be a next one. There were many lessons learned during Heartbleed than can be used to bolster your plans and your presentations to management to gain funding.
    In this SANS Special webcast, John Pescatore, SANS Director of Emerging Security Trends will present an overview on the details around Heartbleed and an update on the current status, risks and industry efforts around software security. He will then moderate a panel of vendor experts in a discussion around lessons learned from dealing with Heartbleed and best practices for mitigating or shielding the risks due to vulnerabilities in open source and other third party software. Panelists will include Joanna Burkey, TippingPoint DVLabs Manager, and Joe Sechman, Manager, Software Security Research for HP.
  • How to Act with Laser Clarity Against Threats that Matter Recorded: Apr 25 2014 4 mins
    Eric Schou, Director of Product Marketing, HP ArcSight
    Organizations, regardless of size, are under attack every day. The bad guys are sophisticated, organized, specialized, and they collaborate. The question is no longer have I been breached, but how many times and to what severity. HP ArcSight provides the clarity you need to find and fix the threats that matter faster.

    Watch now to learn how. 
Protect your business with security analytics and compliance solutions
Your organization, regardless of its size, must turn security and log data into actionable intelligence to make smarter, more efficient decisions. This channel features presentations that help answer your security questions. For example, you can learn how to manage business risk, monitor your IT infrastructure and automate compliance. Take your security knowledge a step forward with best practices in the latest security trends like Big Data Security Analytics, combating Advanced Persistent Threats and understanding the costs of cyber crime.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Centralizing Compliance Controls: Achieving Scale and Cutting Costs
  • Live at: May 22 2012 3:00 pm
  • Presented by: Marc Blackmer, Senior Product Marketing Manager, Solutions at HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this