Hi [[ session.user.profile.firstName ]]
Sort by:
    • Hunting Attackers with Network Audit Trails Hunting Attackers with Network Audit Trails Tom Cross, Director of Security Research, Lancope Recorded: Sep 16 2014 5:00 pm UTC 47 mins
    • Sophisticated, targeted attacks have become increasing difficult to detect and analyze. Attackers can employ 0-day vulnerabilities and exploit obfuscation techniques to evade detection systems and “fly under the radar” for long periods of time.

      Gartner estimates 85% of breaches go completely undetected and 92% of the detected breaches are reported by third parties. New strategies for identifying network attack activity are necessary.

      Learn how network logging technologies such as NetFlow and IPFIX can be applied to the problem of detecting sophisticated, targeted attacks and used to create an audit trail of network activity that can be analyzed, both automatically and by skilled investigators, to uncover anomalous traffic.

      Lancope will demonstrate how these records can be used to:
      Discover active attacks in each phase of the attacker’s “kill chain.”
      Determine the scope of successful breaches and document the timeline of the attacks

      Read more >
    • Don’t allow security & data regulations to slow business transformation Don’t allow security & data regulations to slow business transformation Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Ravi Pather, VP EMEA, Cloud Data Protection Solutions - Bluecoat Upcoming: Nov 9 2016 11:00 am UTC 45 mins
    • The adoption of SaaS is accelerating faster than expected. However, as this SaaS adoption accelerates, enterprises are discovering various legal and regulatory data compliance responsibilities that maybe challenging to address in a seamless manner or potentially slow down the adoption of SaaS applications and potentially innovation.


      • How enterprises can leverage the full value of SaaS applications such but fully meet complex data compliance needs without impacting the usability of the SaaS application. Learn how sensitive data can be protected yet leverage the full benefits of the SaaS application without breaking SaaS application functionality such as searching, sorting and reporting of sensitive data.

      • The different methods of data obfuscation such as 'data tokenization' and 'data encryption' and understand the specifics when meeting and demonstrating data compliance in a SaaS environment.

      • If SaaS vendor application encryption can be relied upon to address your enterprises data compliance requirements when the sensitive data is encrypted just at rest. What are the data compliance implications of key management and who controls the encryption keys?

      Read more >
    • Building an Integrated Security Platform Building an Integrated Security Platform Robert Craig, McAfee Senior Product Marketing Manager Recorded: Mar 27 2014 5:00 pm UTC 37 mins
    • Over the past decade, the web has become an increasingly dangerous place, as attackers launch ever more sophisticated attacks. Enterprises of all sizes, from small to global, need to protect their internal systems against both inbound and outbound attack vectors.

      External attacks can take many forms. A user’s email address may be exposed to hackers who send a phishing message with links to a web site that downloads malicious software onto the user’s PC without them being aware of it. Or, an advanced malware attack may use sophisticated obfuscation techniques to hide its true identity, enabling it to slip past a signature-based malware detection tool.

      Data leakage can come from internal users who, inadvertently or deliberately, transfer sensitive or confidential information outside the network perimeter, or a botnet client transmitting a password file to a master server located overseas.

      To counter these threats, security professionals need to deploy interlocking, coordinated security systems designed to work together. In this session, McAfee will discuss how its security platforms work together to comprehensively address the multiple security threats that customer’s encounter.

      •Overview: current malware trends and frequently encountered attack types
      •Interlocking lines of defense:
      oFirewall, Intrusion Prevention Service
      oWeb Gateway
      oEmail Gateway
      oAdvanced Threat Defense
      oData Loss Prevention
      oMcafee Content Security Suite

      Read more >