Educating employees about computer security is a vital part of your defense against cybercriminals and unethical competitors. Yet security training and education is often neglected, sometimes at great cost. A breach of your company’s network security can be hugely expensive, dwarfing the cost of the training that could have prevented it. To learn the role of education in security and discover ways to implementing training without breaking the budget, tune in to this webcast featuring Stephen Cobb, who has delivered computer security and data privacy training to companies large and small, including Microsoft and AT&T.
RecordedSep 5 201263 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Sr. Technical Content Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
The frequency of cyber-attacks continues to increase at an unparalleled pace. By attacking the most vulnerable value chains of organizations, they result in information confidentiality & integrity breaches, discontinuity of business activities and huge damages. Once considered predominantly as a technological issue, the risks related to the information systems are now evaluated within the Enterprise Risk Management scope. On the other hand, traditionally, Business Continuity Management (BCM) is mostly treated as a domain separate from Information System Security Management (ISSM). With the rapid explosion of cyber threats, the alignment between BCM and ISSM is now becoming a must, in order to provide management with a holistic view and enabling them to implement organizations where the teams closely interact with each other.
It goes without saying that the organizational part of security and BCM is the key for a successful implementation, yet the information system (IS) part needs to also be addressed in an efficient way. Various standards and frameworks exist to help organizations implementing a BCM, but they lack a strong link with the governance, architecture and security of the IS. In this webinar we will introduce very briefly an innovative approach and describe the first steps for the linkage between the two worlds, enabling an efficient implementation of BC based on an architectured and secured IS.
The webinar will report on the most comprehensive research to date about hotel social media. Social media plays an ever-increasing role in a hotel’s business; therefore, it is necessary for hoteliers to understand its use and impact. The research study was conducted by Bjorn Hanson, clinical professor, Tisch Center for Hospitality and Tourism at New York University, and Donna Quadri-Felitti, director and associate professor, School of Hospitality Management at Penn State University. Their study findings were based on responses of U.S. Hoteliers, just like you, and include investment, staffing, objectives, room nights generated, and differences and trends by location, size of hotel, franchised/managed and other attributes.
Right-sizing your fleet is more complicated than just slashing fleet size and requiring remaining vehicles to do more. But getting it right is worth the effort. With fleet management expert Matt Mikkelson, you’ll learn how a fleet management solution can help you improve fleet efficiency and lower costs. Join Networkfleet’s live webinar, “Five smart ways to help boost fleet utilization,” on September 22, 2016.
Effective organizational resilience depends upon the ability of senior management teams to predict and therefore adapt to rapidly changing external threats. The lead time once enjoyed by decision makers to analyse and respond is ever decreasing. Traditional planning methods, do not allow leaders to anticipate global challenges as they generally focus inwards and rely on historical data.
The presentation provides some basic advice on how you could use horizon scanning methodology to help predict future risks to your organization.
Finding the right candidates to prepare for high-volume times of the year is a rising challenge for many companies. Even organizations with their own dedicated recruiting or talent acquisition function struggle with the lack of qualified applicants.
There is a need for a holistic approach to seasonal hiring, and companies must look closely at their internal operations as they seek to solve external talent challenges. Experts from ManpowerGroup Solutions and Lowe’s Companies will discuss solutions to overcome seasonal hiring challenges, including collaborative talent pools and other innovative solutions.
By participating in this webinar, you will:
•Learn how the World of Work is changing and the impact on seasonal hiring
•Identify solutions for companies to overcoming their seasonal hiring challenges
•Gain insights from real-life examples of companies like Lowe’s that are leading the industry and benefiting from collaborative talent pools
Video is a very persuasive medium; it’s engaging and leads can use it to make their way through the entire funnel at their own pace – all you have to do is set up the content journey. At the bottom of the funnel, video can help you seal the deal when it comes to closing and can even help you post-purchase when you want to reinforce that you were the right choice.
In this webinar, we will share tips on how real-world B2B marketers can use video to turn late stage prospects into buyers. We'll also cover:
• 8 different video types to support the BoFu
• How to map your content to different stages of the funnel
• What information your potential buyers are looking for
• How to connect your video marketing campaigns to ROI
Beginning a video marketing campaign can be daunting, in this webinar we will discuss what to expect when hiring a video production company, where to look for inspiration within your business, and how to leverage one video shoot into multiple pieces of content.
Video is absolutely everywhere these days. It’s in our Facebook and Twitter feeds. It’s in our Snapchat and Instagram. It’s the very essence of Periscope and Meerkat, apps specifically designed for live broadcasting. But, is it in your email? In email, the impact of video is amplified. Why? Because unlike random videos or ads that pop up on Facebook, video emails are distributed directly and precisely to your subscriber audience.
In this webinar learn the reasons to incorporate video into email and tips on how to make your email campaigns even better for better engagement and ROI.
We’ve commissioned the first ever npower Business SME Growth Forecast Index – an extensive report from Capital Economics about the fastest growing areas and sectors for SMEs in Britain. Entrepreneur, Dale Murray CBE - named by Debrett’s as one of Britain’s 500 most influential people - will be running an exclusive webinar to delve into its findings and share some advice on how to grow your business. Dale is a successful entrepreneur and investor who helps businesses of all sizes grow, and holds board positions in both the public and private sector.
In this session we’ll cover:
- Which regions in the UK have the best prospects for growth
- Detailed analysis of the UK’s SME sector
- How your business can grow in the next five years