Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breach Readiness:  Next Generation of Incident Preparedness Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Upcoming: Jun 7 2016 6:00 pm UTC 60 mins
    • Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

      Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

      Register now for this compelling discussion on Next Generation Incident Preparedness.

      Read more >
    • Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant Upcoming: Jun 14 2016 4:00 pm UTC 60 mins
    • Data Masking Is Changing How Businesses Prevent Data Breach
      With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach. Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data -- without the slowdown caused by traditional methods.
      Register and discover:

      The key reasons why next-generation data masking reduces risk of breach
      How masking compares to other security approaches such as encryption
      Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX

      Read more >
    • Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Eugen Rusen, Certes Networks Recorded: Mar 15 2016 3:00 pm UTC 61 mins
    • The mass of data breaches that hit the headlines in 2015 show organizations must accept that breaches are inevitable, and breach detection and protection strategies are no longer enough to keep the hackers at bay. To prepare for a breach, organizations should put in place a breach containment strategy that assumes a breach will happen, and limits the scope of a breach when it does occur. Application isolation, role-based user access control and cloud-friendly segmentation are examples of techniques that can limit a hacker’s access to sensitive applications. These techniques have become more widely adopted lately, based on the assumption that breaches are inevitable, and that no network, user or device is every fully trusted.

      Eugen Rusen, Technical Director, for Certes Networks, will discuss how organizations can prepare for security breaches with practical examples and best practice tips.

      Read more >
    • The Anatomy of a Cloud Data Breach The Anatomy of a Cloud Data Breach Krishna Narayanaswamy, Chief Scientist, Netskope Recorded: Mar 22 2016 6:00 pm UTC 27 mins
    • As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.

      Read more >
    • Advanced Threat Protection: If a breach is inevitable, what should I do? Advanced Threat Protection: If a breach is inevitable, what should I do? Sunil Choudrie and Laurence Pitt – Security Solution Specialists Recorded: Sep 17 2015 9:30 am UTC 49 mins
    • How best to prevent attack, and keep bad stuff out

      But this is no longer the case. Firstly, the business perimeter is dissolving under pressure from mobile adoption and cloud-services. Secondly, threats continually evolve and there has been a five-fold increase in highly advanced and stealthy targeted attacks since 2011. Business has to recognize that it’s no longer possible to keep everything out – the posture has to change, business must become cyber-resilient to attack and make use of advanced intelligence in order to react faster when a breach does occur. Remediating the breach, and at the same time protecting valuable data on the inside; ensuring attackers cannot remove or access it.

      Join our Advanced Threat Protection (ATP) webcast series and over the three webcasts hear from Symantec about how using ATP technologies can help to reduce this noise, and ensure that business is ready to react fast if, or when, a breach occurs.

      Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast -
      https://www.brighttalk.com/webcast/5691/170133

      Webcast 3 - Piecing back the jigsaw, what can I learn? Understanding what happened, and getting back on track fast-
      https://www.brighttalk.com/webcast/5691/170143

      Read more >
    • Safely Enabling the Cloud in a World of Malware and Data Breaches Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 5:00 pm UTC 61 mins
    • Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

      - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
      - How to securely enable the use of cloud services for enterprise employees;
      - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.

      Read more >
    • Fuel Incident Response With Threat Intelligence to Lower Breach Impact Fuel Incident Response With Threat Intelligence to Lower Breach Impact Ondrej Krehel, Chief Executive Officer, LIFARS Recorded: Mar 29 2016 6:00 pm UTC 51 mins
    • As we’ve all learned from recent incidents at large companies, a data breach can cause insurmountable damage that is difficult to rebound from. To effectively counteract cyber attacks, companies need to have a two-pronged approach that includes both targeted threat intelligence and expedient incident response (IR).

      In this webinar, Scott Donnelly of Recorded Future, will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, and how a thorough threat intelligence program can reduce the risk of breaches.

      Next, LIFARS CEO and Founder Ondrej Krehel will discuss how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.

      Register now to learn:

      * How threats manifest in different ways on different layers of the Web.
      * The difference between a hoax and a possible threat to companies, customers, or infrastructure.
      * How having the right threat intelligence will speed up an IR process and reduce the business impact of a data breach.
      * The steps of an effective IR and how having a proper incident response plan in place makes all the difference.

      Read more >