Target lost 40,000,000 records in 2014 in a breach that cost them $148 million dollars. Ouch. They had lots of fancy tools watching the perimeter, but fell short when it came to securing insider access.
Protecting against insider threats, whether malicious or accidental, is extremely difficult, especially when 71% of employees say that they have access to information they aren’t supposed to see.
How can you maximise value and minimise risk in the biggest reservoirs of data you have - the unstructured and semi structured data stores? Organizations are beginning to realize that they need to harness the power of metadata in order to better manage, protect, and get the most out their valuable and voluminous user generated content. Metadata framework technology provides a platform to answer fundamental questions such as: who has and is accessing, who should and shouldn’t have access, what's in use and what isn't, what's sensitive, who owns it, who’s abusing it? Learn how Big Data Analytics and automation can transform the way in which your organization collaborates and governs its data.Read more >
Join David Gibson as he discusses the challenges that face IT professionals today. The fine line businesses tread between securing data whilst making sure that it is easily accessed by the end user.Read more >
Pizza Webinar W/ Strategic Hardware & VaronisRead more >
Ransomware’s showing no signs of slowing down – and neither are we!
We'll teach you about ransomware, how you can protect your data AND demonstrate why Varonis customers have some of the fastest response times in the industry.
Attend our Webinar to discover:
Warning signs of an impending ransomware attack
The most recent ransomware threats (Cryptolocker & its variants, Zcrypt, Locky, and more)
How Varonis customers:
Use DatAlert to detect suspicious behavior and insider threats
Stay up-to-date defending against the latest ransomware variants
Discover which files were affected and how to recover quickly
The GDPR is uniform law across the EU and beyond, with new
requirements for documenting IT procedures, performing
risk assessments, rules on breach notifications, and
tighter data minimization – establishing a single law to
enforce European data protection rules and regulation
and the right to personal data protection.
Watch our webinar & learn:
The new requirements of the adopted GDPR
How to address the challenges and implement the changes
The consequences of non-compliance (and how to avoid them)
How the Varonis DSP helps you meet these requirements.
IT managers from all industries are experiencing exponential growth of unstructured data. This data is coming from an ever increasing proliferation of video, sensor and machine generated data as well as richer file and print data. All of this data needs to be securely protected, managed and stored for future use and analysis. If you are faced with similar challenges, join Varonis and Quantum for a joint webinar to learn how you can securely protect, manage and store your organization’s unstructured data files.Read more >
From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.
John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.
Where cybersecurity preparedness falls short (public and private sector)
Practical takeaways to meet the cybersecurity needs of C-Suite executives
How to manage the evolving threat landscape - and what you can do to stay secure
Ransomware strains are targeting healthcare providers knowing they will pay to reduce life-threating downtime. Even if the data is restored, do you need to report it as a breach? Were you in violation of HIPAA data protection laws?
Don’t put your reputation and patients at risk! Join our HIPAA expert as he outlines a compliance program that also protects against ransomware attacks.
Our educational webinar focuses on:
The anatomy of HIPAA including the final omnibus rule
How to identify and protect ePHI
The risks and penalties of non-compliance
New strains of ransomware, including their behavior and entry methods
A step-by-step plan for HIPAA compliance and ransomware defense
Want to successfully detect and react to Cryptolocker infections?
Join us for an informative, actionable webinar that discusses:
What Cryptolocker does once it breaches your security
Steps for limiting the scope of what can be encrypted
File access activity that indicates a Cryptolocker breach
How to correct what you detect faster with automation
Criminals, competitors, and nation-states have all discovered the value of hacking from the inside. Even your own employees plan to take your sensitive data when they leave. Is it any surprise then that insider threats have increased, as have avenues to profit from selling sensitive information?
It’s time to understand what motivates insiders and what you can do to protect your sensitive business data. Join us as we discuss how to:
•Understand what motivates insiders
•Assess your organization's data security posture
•Apply practical, real-life steps for securing databases, files, and Web applications
Raphael has done pioneering work championing the importance of unstructured data governance and educating organizations on data protection and security. Prior to joining Imperva, Raphael held senior positions at Varonis, Cisco, Check Point, Echelon and Network General. Additionally, Reich was a software engineer at Digital Equipment Corporation. He has over twenty years of business experience and holds a bachelors degree in computer science from UC Santa Cruz and an MBA from UCLA.