ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Do you ever wonder:
• What to say that will make leads take action?
• How to structure your content so it converts?
In this webinar, you'll learn:
• Common advertising and marketing myths that small businesses fall for
• 3 ways to innovate your business so you stand out in any crowded marketplace
• A 5-step framwork to attract your ideal customer's around the clock
The results of the 2016 Cyber Resilience Survey confirm much of what we already suspected about the changing nature of the cyber threat and the way that cyber criminals have found new ways past corporate perimeter security. The increased difficulty of breaching perimeter security and the increased human resources available to cyber criminals has combined to produce a new point of attack. This is focused on the weakest link in the corporate security chain, which is now human beings rather than technology. The research shows clearly that phishing and social engineering is now the single top cause of cyber disruption, with over 60% of companies reporting being hit by such an incident over the past 12 months.
In this webinar, we will be looking at some of the findings from the study, and discussing what actions organizations can take to help improve their cyber resilience.
In this 1 hour webinar, Evan Bailyn, best-selling author of Outsmarting Google and SEO Made Easy, will teach you the lesser-known tactics of building a dominant web presence for your business utilizing the power of Google. In his clear, concise style, Bailyn will outline what these new tactics are and how to apply them in a practical and actionable way, using examples from his own clients. The result: a host of clever new ideas that will help you take your marketing to a higher level, resulting in a substantial number of new customers, greater influence in your industry, and even entrance to new markets.
Attendees will walk away with:
-Proprietary strategies developed over 12 years of working with some of the biggest websites online
-A specific explanation of the rules of Google's search algorithm that are most valuable for small businesses
-A list of common misconceptions and ways to avoid being penalized by Google
Would you like to get unstuck and automate your business?
Are you tired of the long hours, hard work, and not reaching the people you want to reach?
In this webinar, Noah St. John wants to show you:
• The secret to tripling sales after people get on your list
• The 5-step formula for an irresistible lead magnet
• The 5-steps to build a 6-figure business machine
How is social advocacy going to change over the coming year? Here we will be joined with Sally-Anne Kaminski, Global social media manager at Zebra Technologies and Andrew Moloney, Managing Director at Artisan Southwest Consulting to discuss how the social landscape currently looks in the IT industry, and the action plan required to keep ahead of the game for the coming year. Tune in to hear the untold secrets we all want to know.
If you're ever unsure what your Key Performance Indicators are telling you to do next; if you're unsure of where the insights lie, the answer lies in a simple, irrefutable formula.
Sure, measuring performance is vital. Measurement tells you if you took the right actions, whether you made the correct changes and if you're hitting targets. Once the great analysis battle is won, and the smoke clears, you’re left with only two, possible actions
Spend an hour with George Kinder as he leads a group meditation and discusses how to develop a mindfulness practice for yourself. There will be time for Q&A and discussion.
Can’t Miss Takeaways -
- You will:Learn the daily practice of Mindfulness and how it delivers practical benefits.
- Have access to an audio guide to a daily Mindfulness practice.
- Receive a free on-line copy of George Kinder’s book, Transforming Suffering into Wisdom: Mindfulness and The Art of Inner Listening.
Digital marketing has gone mobile. And thanks to smartphones and click-to-call, digital ads will drive over 100 billion calls to businesses in the U.S. this year. In today's mobile-first world, the success of your digital marketing often depends on your ability to drive calls. You now have to know the ads, keywords, and web pages driving good calls – so you can optimize for what’s bringing in not just the most leads, but the most customers.
Join call attribution experts from DialogTech to learn how today’s most successful marketers are using call data to prove and improve drive ROI. You’ll learn:
•The enormous impact smartphones are having on digital marketing
•How to optimize search, social, and display campaigns to drive calls and sales
•What data marketers must capture around phone calls to optimize ROI
•Real-world stories for how digital marketers use call data to drive revenue