Hi [[ session.user.profile.firstName ]]
Sort by:
    • Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Defending Against Cyberthreats: CyberEdge's 2016 Cyberthreat Defense Report Steve Piper, Co-founder and CEO of CyberEdge Group, Mike Reagan, CMO of LogRhythm Recorded: May 11 2016 6:00 pm UTC 60 mins
    • Despite record security spending, successful cyberattacks are on the rise. Seventy-six percent of organizations around the globe were compromised by a successful cyber attack in in 2015—up from 62% in 2014.

      Savvy IT professionals know that it’s no longer a question of if their network will become compromised, but when. Smart CIOs and CISOs must strike a balance between threat prevention and detection investments, as both are critical in the fight against today’s sophisticated threats.

      Steve Piper, CEO of the information security research firm CyberEdge Group, is joined by Mike Reagan, CMO of LogRhythm, to share the findings of the 2016 Cyberthreat Defense Report.

      This webinar will reveal the current security posture of today’s organizations, gauge perceptions about cyberthreats, and disclose future plans for improving security and reducing risk.

      You’ll discover:

      • Deep insights into how IT security professionals perceive cyberthreats
      • What they’re doing to defend against threats
      • How security information and event management (SIEM) can be implemented within an organization to increase confidence and decrease the time it takes to detect and respond to cyberthreats

      See how you compare. Register now for a 360-degree view of the threats, response plans, processes and investments that organizations are making in 2016.

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Jun 9 2015 4:00 pm UTC 27 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past.

      The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >
    • Step out of the day-to-day, let Internet Security Threat Report 20 guide the way Step out of the day-to-day, let Internet Security Threat Report 20 guide the way Sunil Choudrie - Product Marketing Manager Recorded: May 6 2015 9:00 am UTC 49 mins
    • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

      Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
      • How attacker techniques are evolving
      • Why vulnerabilities are still being exploited
      • The dramatic rise in ransom ware
      • Our simple steps that can yield big improvements across your security

      If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.

      Read more >
    • Is your security strategy on track? Internet Security Threat Report v20 is here! Is your security strategy on track? Internet Security Threat Report v20 is here! Sunil Choudrie - Product Marketing Manager Recorded: May 6 2015 10:00 am UTC 49 mins
    • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

      Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
      • How attacker techniques are evolving
      • Why vulnerabilities are still being exploited
      • The dramatic rise in ransom ware
      • Our simple steps that can yield big improvements across your security

      If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.

      Read more >
    • HP Cyber Risk Report 2015: The Past is Prologue HP Cyber Risk Report 2015: The Past is Prologue Jewel Timpe, Senior Manager- Threat Research, HP Security Research Recorded: Mar 12 2015 5:45 pm UTC 28 mins
    • In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

      The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.

      Read more >