Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk.
But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives in a way that business professionals will understand--and fund.
Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.
But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.
The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:
• Reveals who is targeted and how
• Combats attacks before they reach your users, and
• Mitigates damage from the attacks that inevitably will
About the presenter:
With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
In this insightful webinar clip, we provide brief insights into how you can manage cyberthreats. Regional banks and credit unions often face the same security and compliance burdens to larger, well-resourced financial institutions with much smaller staffs. So, what should your security plan for managing cyberthreats look like?
To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.
By attending, you’ll:
- Understand best practices for working most effectively with third party providers
- Discover what security functions can be handled by third parties and what should be kept in-house
- Recognize how to avoid common pitfalls of working with third parties
- Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it
Save your seat now to learn more!
Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts you’ve put in place even make sense? The Building Security In Maturity Model, or BSIMM, is a metrics-driven study of existing security initiatives at other organizations. BSIMM results help you assess the current state of your software security initiative and determine which areas need improvement.
During the webinar, we’ll use a BSIMM broken down by the financial services industry to see what other companies are doing. We’ll also:
· Use real data to help drive your software security initiative
· Learn how organizations use the BSIMM to measure the maturity of their software security initiatives
· Look at the aggregate data of the FSI vertical in the BSIMM
· Discuss some of the most common activities that we observe with FSI companies and the drivers of those activities
Building a Cybersecurity Architecture to Combat Today’s Risks:
Foundations, Visions, Testing and the Role of SIEM
The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.
In this webinar, Erik Bartholomy – a Security Architect at LogRhythm – will be joined by Eric Parent – CISO at Sonepar – to discuss how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.
During the webinar our speakers will discuss:
•How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency
•The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework
•How security architecture helps align IT security with business strategy and current threats
•Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.
Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.
The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:
•Realize security operation efficiencies of $4.75M
•Avoid alternative security purchases of $3.5M
•Generate an ROI of 65%
Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.
***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks
Cybercriminals are constantly on the prowl, and personal and corporate data is their favorite catch. Confidential information is being traded in darknet underground markets at any moment, even years after being compromised. Learn about the different ways in which the data is stolen, how cyber crooks monetize it, and steps you can take to be better protected.Read more >
Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.
As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.
In this webinar you will learn:
• How cybercriminals are diversifying in order to remain profitable
• The new methods of threat propagation causing headaches for organizations
• The next generation of IoT threats
• Recent targeted attack campaigns
In this webinar clip, we dive into the impact a data breach can have for financial institutions. With smaller IT teams, regional banks and credit unions face similar security and compliance burdens to what larger, well-resourced financial institutions carry. So, what can you do if breached?
To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.
During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.
However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?
In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:
- What happens when a ransomware is exploded in a computer, with a demo
- How do you detect and respond to a ransomware attack?
- What is coming next in the world of ransomware?
To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?
On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.
What we’ll discuss:
How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.
The different layers needed in a next generation email protection solution.
How you can get started today.
With smart attackers seeking the weakest spots in network defenses and retooling to understand the changing attack surface – you need to get, and stay, ahead of the game.
As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes.
Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.
We’ll discuss recent breaches and share:
• An overview of the timeline announcement to public proof-of-concept release
• Alert Logic’s immediate coverage with generalized web coverage on our threat manager appliances
• The number of attacks over time
• Categorizing attacker payloads to define their initial compromise goals and intentions
• A look at understanding victim targeting
• Common outcomes in incidents where the attacks were successful
What you’ll take away:
• An understanding of the critical timing to patch vulnerable systems
• How Alert Logic’s SOC with Active Intelligence can carry the load for detection and response
• Ways to detect common attacker goals and intentions
Join us for these key take-aways and more, as we share critical insights for understanding today’s attack landscape.
Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
- Current threats and how they are evolving
- Comprehensive threat protection for the cloud
- Unified security for detecting threats and responding to incidents
Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.
Attend this webinar and learn about:
• Top cyberthreats facing financial institutions
• Financial services compliance evolution, security monitoring and incident response
• Differences between SIEM, SOC, and SOC-as-a-service
• Monitoring on premises and cloud resources without adding headcount
To gain insights on these challenges and how to solve them, save your seat now!
Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:
• Latest threats in cyber security
• Real world examples of using threat intelligence in defending against cyber attacks
• How to use threat intelligence to fine tune your security policies
• How to gain access to the information you need to stay ahead of the biggest cyber threats
Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.
Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
In this video clip, discover what security functions can be handled by third parties and what should be kept in-house. However, is this enough for you and your business?
To watch the full webinar on how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid=321811
Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.
Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.
Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:
- Why is it important to secure mobile devices?
- What is your advice to your peers who are starting their mobile security journey?
- What are the most important requirements of a mobile security solution?
By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.
Modern cyber defence strategy requires us to deal with multiple degrees of unknowns. The effectiveness of traditional risk management approach is greatly reduced by dynamics of modern technology and threat landscape. Enterprises must increasingly rely on security analytics to win the battle against various threat actors. However, to become an efficient tool, your security analytics practice must have both internal and external intelligence at its disposal. During this session, we will discuss the challenges in cyber-intelligence and how to build an effective security analytics practice.Read more >
If you are struggling to keep up with selecting, testing and deploying new security tools, you won’t want to miss this webinar.
You’ll learn how to:
- Address the unique challenges of securing your unique network.
- Implement smart network segmentation and intelligent tool routing.
- Facilitate testing and deploying tools through a security delivery platform.
- Handle the challenges of setting up realistic tests.
Learn how the GigaSECURE security delivery platform strengthens new security tool testing and streamlines deployment.
Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.
Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.
Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.
"Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."
- KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE
"Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
- PWC Global State of Info Security Survey, 2015