Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Cybercrime continues to grow as an industry — costing the global economy billions per year. And government agencies in the US have become the leading target, with the number of attacks against public agencies outpacing those of the business sector. Watch this webinar “Cyberespionage: The New Paradigm” to find out:
How common cyberespionage tactics such as SQL injection and spear phishing are used to infiltrate government data and classified information
What enterprises can do to gain awareness of these activities that can inadvertently create a domino effect — impacting commercial and personal data and property
The Software Defined OpenFlow instruction-set breaks the boundaries of what we previously classified as control, management, and application network planes. Lack of structure is not an option if we want a robust infrastructure that scales and extends therefore we examine the new emerging standards-based architecture of FlowMapping overlays. Proven in large-scale complex carrier SDN deployments, FlowMapping is taking advantage of the new found agility in OpenFlow application networking without sacrificing scale, distribution, and interoperability.Read more >
Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.
Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.
Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.
Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
The National Security Agency (NSA) are acknowledged world-class experts on encryption technology. Yet, Edward Snowden, a junior consultant working for the Agency, managed to bypass all security to download and steal many gigabytes of highly classified information. This session will examine how it all went wrong for the vaunted NSA and what enterprises can learn about using encryption to protect their own sensitive information.Read more >
A Discussion on Trends and Dell SecureWorks’ New Vulnerability Prioritization Service with Risk I/O
As a valued client of Dell SecureWorks, we are inviting you to a discussion about our Vulnerability Monitoring and Prioritization service.
Vulnerability management is critical to any comprehensive defense strategy, and yet, organizations struggle with prioritizing vulnerabilities for remediation based on real risk to their organization.
Please join Dell SecureWorks’ David Langlands, (Director, Security and Risk Consulting), and Risk I/O’s David French, (Vice President), as they discuss how organizations are currently approaching vulnerability management today and the limitations with how risk associated with vulnerabilities is classified and remediated.
Dell SecureWorks, in collaboration with Risk I/O will paint a vision of how organization’s need to evolve their vulnerability management so that they are better assessing and remediating technical and business risk to their organization.
Presenters will discuss:
•Current state of vulnerability management and where it needs to go
•Intelligence-driven prioritization of vulnerabilities defense
•Visualization of vulnerability risk for effective decision-making
Many recent data breaches have exploited security weaknesses in third-party vendors to attack businesses. As supply chains grow and business functions increasingly get outsourced, the amount of data given to third parties has increased.
In this webinar, Benjamin Fagan, Product Marketing Specialist, will discuss why vendor risk management should be a top priority for your business. Additionally, he will discuss how BitSight can help manage the cyber risk of your vendors.
The Higher Education sector is a large target for cyberattacks because of their research in science and technology that can be leveraged for commercial gain. However, colleges and universities often have unique requirements and specific challenges to securing their networks.
In this webcast Stephen Boyer, of BitSight Technologies and Chris Schreiber of University of Arizona discuss:
- The specific challenges that universities and colleges face in mitigating cyber risk
- How threats like peer to peer file sharing present greater risk to this sector
- How universities can use BitSight Security Ratings to mitigate cyber risk and improve their security posture
Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.
Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:
- Which frameworks and methodologies can help get you started
- Vital questions you should be asking your vendors
- Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
During this webinar we will explain how a domain controller creates a seamless (net)work environment for Government and Defence and many-user organisations.
Benefit from quick and easy administration and happy users combined with the certified security of a Fox DataDiode.
With the end of 2015 in sight, we look back on a year when public and private sector cyber-attacks are almost commonplace headlines. Unfortunately confirming the reality that the digital domain is now one of the most dangerous battlegrounds in the modern era.
During this webinar we will use the intelligence gained from a comprehensive survey that we ran amongst 127,000 professionals in the Oil & Gas IQ community. We will dig deeper into the answers given, offer fortifying insights and suggestions. Additionally we will share example scenarios on how we believe IT Security should become a continuous process.