According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.
Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.
Join this webinar to learn:
• The key stages in the evolution of a post-infrastructure approach to security
• Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
• Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps
As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.
This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.
Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people to help them understand how threat detection works. Having the best firewall and antivirus in the world will not keep you safe from cyber attacks. Attend this webinar to see why advanced monitoring is the only way to ensure vigilant cybersecurity.Read more >
Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.Read more >
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
Cloud Cybersecurity Lessons From 1B Files and 10M Users
Did you know that only 5% of all organizations actively care to protect user credentials in the cloud? Or that 1% of users in Financial Services represent 99% of exposure risk?
Our cyberlab data scientists gathered data from 1B files and 10M users to compile a fascinating cybersecurity report outlining The Riskiest Industries in the Cloud.
Join this webinar to see where your organization stands against your peers and competitors.
The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.
In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.
Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.
Learn how your organization must demand solutions that enable you to:
• Take measures to secure data
• Effectively track incidents and remediate incidents
• Report out on compliance status
There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.
As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?
Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:
-How investors assess cybersecurity in the M&A diligence process
-What institutional shareholders want to know about cyber risks to their investments
-How shareholders can meaningfully engage with companies on cybersecurity
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.Read more >
Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.Read more >
Michael Daniel is the Special Assistant to the President and Cybersecurity Coordinator to the White House. Daniel leads the development of national and international cybersecurity strategy and policy and oversees implementation of those policies; ensuring that the federal government is effectively partnering with the private sector, non - governmental organizations and other branches and levels of government, and nations. He will discuss the current state of cybersecurity and share valuable insights and predictions.Read more >
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
Although cyber attacks are on the rise, cybersecurity in state and local governments around the country often remain woefully underfunded. In an era of limited budgets and competing priorities, the behind-the-scenes risk mitigation of cybersecurity can be underappreciated and pushed down the list.
This digital viewcast will explore some of the biggest cyber challenges facing state and local governments such as outdated IT systems, the rise of IoT, budgetary constraints and hiring the correct workforce, while also examining how to effectively communicate cyber risks to both internal and external stakeholders. Route Fifty will sit down with cyber experts to discuss the following essential elements of a successful cybersecurity program:
- Implementing the strategy: Defining the correct priorities, tools, and tactics
- Training the workforce: Communicating best practices in cybersecurity to employees across an organization
- Transforming the culture: Instilling the importance of cybersecurity beyond just the office of information technology
- Developing the partnerships: Working across both different agencies and different levels of government and collaborating with the private sector
- Making the case: Effectively securing cybersecurity funding from skeptical stakeholders
Cyberattacks are on the rise, with increasingly sophisticated and persistent cyber threats promoting the Obama administration to issue the Cybersecurity Strategy and Implementation Plan (CSIP) and Cybersecurity National Action Plan (CNAP) to enhance cybersecurity capabilities within the federal government and across the country.
As agencies work to implement these plans, issues such as outdated infrastructure systems, inconsistent capabilities, and inadequate resources hinder their efforts to detect, prevent, and recover from cyber attacks. In this webcast, we will explore the power of big data and analytics to overcome these challenges and talk with experts about leveraging existing infrastructure with an integrated cyber analytics approach to help government agencies:
•Detect the overall exposure
•Predict and prevent cyber attacks
•Improve cyber defense
•Automate threat indicator sharing
Over the past year, a spotlight has been cast on the federal government's insecure,often outdated, digital infrastructure and activities underway to identify and tackle threats to high-value content. What is the current state of security in federal government and how are agencies across government protecting their most prized data?
At this event, Nextgov will sit down with experts to discuss how cybersecurity has changed the wake of recent breaches of federal IT systems as well as the various policy responses to these breaches and how they are being implemented at an agency level. We'll take a look at federal cybersecurity spending, the new layers of cyber defense through data protection, and how agencies have used the Cybersecurity Strategy and Implementation Plan to improve their systems against hackers and other cyber threats.
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.
Topics covered will include:
-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
-Its use in both Regulated and Non-Regulated
No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.
Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:
•Implications of breach impacts for organizations
•Benefits of a risk management strategies
•Current trends in information-security threats
Register for this webinar today!
Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.
During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.
An audience Q&A will follow the technical presentations.
CISOs are often asked to justify a growing budget by showing ROI. But at the end of the day the security organization spends a lot of money and the answer to what is the ROI is that nothing happened. Because when the security leader is doing their job they are invisible. That is a very difficult conversation to have when you are trying to justify growing budget. The challenge is to change the perception as a cost center and become visible. This webinar will explore how to overcome these challenges by influencing the larger company’s budget to eliminate security concerns.
•Thinking Differently about ROI as companies build IoT businesses and move into cloud-based environments where there are no walls
•Mind Mapping the Business: The ROI Mind-Set of Security
•How Threat Detection and Incident Management Becomes a Competitive Advantage
•The Vision for Next Gen Automated Cybersecurity
Speaker: Michael Schiebel
45 Minutes Presentation/15 Minutes for Q & A/Crowdchat
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
Category: Research Overview
Cut through the noise and identify the three biggest challenges to cyber security. In this live webinar, Sam McLane, Head of Security Engineering at Arctic Wolf Networks, will provide the most effective strategies to combat threats such as ransomware, targeted phishing attacks, and other threats that bypass perimeter defenses. Join this presentation and learn the insights gained from working with real customers and how Arctic Wolf Networks helped them combat cyber attacks.Read more >