Hi [[ session.user.profile.firstName ]]
Sort by:
    • Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Eugen Rusen, Certes Networks Recorded: Mar 15 2016 3:00 pm UTC 61 mins
    • The mass of data breaches that hit the headlines in 2015 show organizations must accept that breaches are inevitable, and breach detection and protection strategies are no longer enough to keep the hackers at bay. To prepare for a breach, organizations should put in place a breach containment strategy that assumes a breach will happen, and limits the scope of a breach when it does occur. Application isolation, role-based user access control and cloud-friendly segmentation are examples of techniques that can limit a hacker’s access to sensitive applications. These techniques have become more widely adopted lately, based on the assumption that breaches are inevitable, and that no network, user or device is every fully trusted.

      Eugen Rusen, Technical Director, for Certes Networks, will discuss how organizations can prepare for security breaches with practical examples and best practice tips.

      Read more >
    • The Anatomy of a Cloud Data Breach The Anatomy of a Cloud Data Breach Krishna Narayanaswamy, Chief Scientist, Netskope Recorded: Mar 22 2016 6:00 pm UTC 27 mins
    • As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.

      Read more >
    • Advanced Threat Protection: If a breach is inevitable, what should I do? Advanced Threat Protection: If a breach is inevitable, what should I do? Sunil Choudrie and Laurence Pitt – Security Solution Specialists Recorded: Sep 17 2015 9:30 am UTC 49 mins
    • How best to prevent attack, and keep bad stuff out

      But this is no longer the case. Firstly, the business perimeter is dissolving under pressure from mobile adoption and cloud-services. Secondly, threats continually evolve and there has been a five-fold increase in highly advanced and stealthy targeted attacks since 2011. Business has to recognize that it’s no longer possible to keep everything out – the posture has to change, business must become cyber-resilient to attack and make use of advanced intelligence in order to react faster when a breach does occur. Remediating the breach, and at the same time protecting valuable data on the inside; ensuring attackers cannot remove or access it.

      Join our Advanced Threat Protection (ATP) webcast series and over the three webcasts hear from Symantec about how using ATP technologies can help to reduce this noise, and ensure that business is ready to react fast if, or when, a breach occurs.

      Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast -
      https://www.brighttalk.com/webcast/5691/170133

      Webcast 3 - Piecing back the jigsaw, what can I learn? Understanding what happened, and getting back on track fast-
      https://www.brighttalk.com/webcast/5691/170143

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >
    • Fuel Incident Response With Threat Intelligence to Lower Breach Impact Fuel Incident Response With Threat Intelligence to Lower Breach Impact Ondrej Krehel, Chief Executive Officer, LIFARS Recorded: Mar 29 2016 6:00 pm UTC 51 mins
    • As we’ve all learned from recent incidents at large companies, a data breach can cause insurmountable damage that is difficult to rebound from. To effectively counteract cyber attacks, companies need to have a two-pronged approach that includes both targeted threat intelligence and expedient incident response (IR).

      In this webinar, Scott Donnelly of Recorded Future, will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, and how a thorough threat intelligence program can reduce the risk of breaches.

      Next, LIFARS CEO and Founder Ondrej Krehel will discuss how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.

      Register now to learn:

      * How threats manifest in different ways on different layers of the Web.
      * The difference between a hoax and a possible threat to companies, customers, or infrastructure.
      * How having the right threat intelligence will speed up an IR process and reduce the business impact of a data breach.
      * The steps of an effective IR and how having a proper incident response plan in place makes all the difference.

      Read more >
    • What Every GC, CFO and CCO Needs To Know About Data Breach Response What Every GC, CFO and CCO Needs To Know About Data Breach Response John Reed Stark, Brian Rubin Recorded: Jan 7 2016 6:00 pm UTC 64 mins
    • A data breach responder is like a high-tech plumber. Just like a plumber does when a house’s basement floods, data breach responders identify the cause of a breach; combine forces to contain its damage; and collaborate on remediation.

      But while a plumber can provide reasonable assurances that the basement will not flood again, a data breach responder cannot promise the same about a future data breach. In fact, another breach is not only possible, it’s likely. That is why data breaches don’t define victim companies – how they respond to data breaches does.

      Yet while today’s news outlets provide an endless stream of data breach reports, rarely is an actual incident response ever discussed. Understanding data breach response workflow not only helps a company prepare for a breach, it also helps a company manage cybersecurity risk overall. This webcast covers the most typical workflows that companies must undertake amid the incident response of a data breach.

      Read more >