Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breaches are Coming! What To Do When They Go Beyond the Wall Breaches are Coming! What To Do When They Go Beyond the Wall Tony Thompson, Vice President; Rajdeep Wadhwa, Product Management Upcoming: Aug 10 2016 5:00 pm UTC 60 mins
    • Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.

      Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.

      A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.

      In this webinar, we will examine:
      • Why IT and cyber security organizations today struggle with breach detection and investigations
      • Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
      • A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow

      This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.

      Read more >
    • Breach Prevention is Dead - Long Live the Secure Breach Breach Prevention is Dead - Long Live the Secure Breach Jason Hart, CTO, Data Protection - Gemalto Recorded: Jul 12 2016 2:00 pm UTC 38 mins
    • Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.

      Read more >
    • Breach Readiness:  Next Generation of Incident Preparedness Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Jun 7 2016 6:00 pm UTC 56 mins
    • Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

      Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

      Register now for this compelling discussion on Next Generation Incident Preparedness.

      Read more >
    • Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant Recorded: Jun 14 2016 4:00 pm UTC 50 mins
    • Data Masking Is Changing How Businesses Prevent Data Breach
      With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach. Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data -- without the slowdown caused by traditional methods.
      Register and discover:

      The key reasons why next-generation data masking reduces risk of breach
      How masking compares to other security approaches such as encryption
      Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX

      Read more >
    • Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Data Breaches are Inevitable: Reduce your Risk with Cloud-Friendly Segmentation Eugen Rusen, Certes Networks Recorded: Mar 15 2016 3:00 pm UTC 61 mins
    • The mass of data breaches that hit the headlines in 2015 show organizations must accept that breaches are inevitable, and breach detection and protection strategies are no longer enough to keep the hackers at bay. To prepare for a breach, organizations should put in place a breach containment strategy that assumes a breach will happen, and limits the scope of a breach when it does occur. Application isolation, role-based user access control and cloud-friendly segmentation are examples of techniques that can limit a hacker’s access to sensitive applications. These techniques have become more widely adopted lately, based on the assumption that breaches are inevitable, and that no network, user or device is every fully trusted.

      Eugen Rusen, Technical Director, for Certes Networks, will discuss how organizations can prepare for security breaches with practical examples and best practice tips.

      Read more >
    • The Anatomy of a Cloud Data Breach The Anatomy of a Cloud Data Breach Krishna Narayanaswamy, Chief Scientist, Netskope Recorded: Mar 22 2016 6:00 pm UTC 27 mins
    • As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.

      Read more >