Hi [[ session.user.profile.firstName ]]
Sort by:
    • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
      2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: May 16 2017 5:00 pm UTC 61 mins
    • 2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

      This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

      Get the facts in this highly respected research report and learn why:

      •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

      •One in 131 emails contained a malicious link or attachment – highest rate in five years

      •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

      •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

      Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.

      Read more >
    • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
      2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: May 23 2017 5:00 am UTC 54 mins
    • 2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

      Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

      • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
      • One in 131 emails contained a malicious link or attachment – highest rate in five years
      • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
      • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

      Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

      Register for the Symantec 2017 Internet Security Threat Report Webinar today.

      Read more >
    • Value at the Speed of Business: Insights from the 2016-17 World Quality Report
      Value at the Speed of Business: Insights from the 2016-17 World Quality Report John Jeremiah, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Feb 14 2017 3:00 am UTC 52 mins
    • Today we are in an age of digital consumers who are hyper-connected, expecting information and service wherever and whenever they want. Companies must be able to respond to the increasing demands of their customers with superior products and services without sacrificing quality or security.

      In this webinar you will learn about key findings from the eighth edition of the World Quality Report, which illustrates the impact of trends like Agile, DevOps, IoT and others. These trends are forcing organizations to disrupt with digital at an ever-faster pace. Specifically you will learn more about these 4 key trends in QA and Testing:

      • Digital Transformation driving and shaping IT strategy
      • Agile and DevOps continue to expand and grow in adoption
      • Internet of Things a disrupting force with real implications on quality
      • Infrastructure costs (test environments); a rising concern

      Read more >
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report
      Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: Dec 15 2016 12:00 am UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report
      Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 11 2016 6:00 pm UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue
      HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Jun 9 2015 4:00 pm UTC 27 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past.

      The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >
    • The Staffing Advantage Report: How to Get Your Staffing Firm to the Top
      The Staffing Advantage Report: How to Get Your Staffing Firm to the Top Eric Gregg, CEO, Inavero Recorded: Nov 10 2016 6:00 pm UTC 53 mins
    • Did you know that the average client works with three different staffing firms? The majority of them (59 percent) say it gives them better access to talent because if one firm can’t help them, they have other options, according to CareerBuilder and Inavero’s 2016 Staffing Advantage survey.

      It’s safe to say the competition is fierce among staffing firms vying for business today.

      That’s why CareerBuilder has partnered with Inavero to bring you exclusive market research and industry insights to help you go inside the minds of both candidates and clients to better understand the competitive staffing landscape.

      The 2016 Staffing Advantage Webinar hosted by Kyle Braun, CareerBuilder Staffing and Recruiting Group, President, CareerBuilder, and Eric Gregg, CEO, Inavero will also help you answer questions such as:

      - What are your competitors doing?
      - How can you outpace the best staffing firms out there?
      - How can you run your staffing firm the smartest way?
      - How can you win business?
      - How can you win over candidates?
      - How can you use technology as a competitive advantage?

      Read more >