Hi [[ session.user.profile.firstName ]]

Top PCI DSS 3.0 Questions Answered

Still figuring out how your organization is going to comply with PCI DSS 3.0 by the end of 2014? Wondering if PCI compliance really means your organization is secure? Have unanswered questions about PCI DSS 3.0? Look no further! Join Jeff Tutton from Intersec Worldwide and Chris Noell from Alert Logic for an in-depth discussion about PCI DSS 3.0 and how meeting these security requirements will impact your security posture.

Jeff and Chris are experts who approach PCI from different and unique perspective. After a short presentation to cover some last minute suggestions for PCI DSS 3.0 compliance, they’ll spend time answering your compliance and security questions. If you have questions now, submit them here:

https://www.surveymonkey.com/s/LCG9HYR

Or bring them to the live webinar.
Recorded Sep 24 2014 72 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diane Garey - Alert Logic
Presentation preview: Top PCI DSS 3.0 Questions Answered

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Understanding Your Cloud Attack Surface Sep 27 2017 3:00 pm UTC 60 mins
    Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing
    As organizations continue to shift to cloud computing, new research reveals a significant consolidation of threats in specific layers of the computing model. Effective attackers, always seeking the weakest spots in network defenses, understand the changing attack landscape, have adapted their attack methods to this new paradigm. How do we evolve our security strategies to meet this challenge?

    Join Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing, as they share impactful insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world. They will discuss:

    • How security incidents differ on hybrid networks versus public-cloud installations
    • What the top 6 web attack types are that account for 75% of verified incidents
    • Machine learning’s impact on detecting incidents and understanding attack progression
    • Important steps to preventing targeted attacks and protecting your data

    Watch ‘Understanding Your Cloud Attack Surface’ to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security and manage risk.
  • Preparing for Cyber Attacks… Expect the Unexpected Sep 12 2017 3:30 pm UTC 60 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud
    Your company is constantly under the threat of a potential cyber attack that can wreak havoc and impact your business. Cyber criminals are finding new ways to compromise systems and the hacking community continues to fine-tune their methods of attack. The maturation of hacking groups around the globe poses a cyber security threat that never stops.

    Join Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud, as they present, “Preparing for Cyber Attacks… Expect the Unexpected.” Hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.


    In this webinar, these experts will reveal:

    • The true impact of a cyber attack on a company from the bottom line to the board room
    • The importance of having a business continuity/disaster recovery plan in place
    • How business continuity planning tools and security software go hand in hand
    • The significance of exercising and testing a plan prior to an attack
  • Web App Attacks: Hacker Methodologies and Remediation Strategies Aug 23 2017 3:00 pm UTC 60 mins
    Stephen Coty, Chief Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?

    Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:

    • The global perspective of the current state of web application vulnerabilities
    • Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • Remediation strategies to help defend against web apps attacks
  • Why the Web Apps You're Worried About Least Could Be Your Most Critical Exposure Recorded: Aug 2 2017 64 mins
    Misha Govshteyn, Founder and SVP Products at Alert Logic; Allison Armstrong, VP Product Marketing at Alert Logic
    What’s the best way to breach your most critical cloud workloads? Compromise your least critical web applications while no one is watching.

    Join Alert Logic’s Founder and SVP of Products, Misha Govshteyn, as he shares what’s behind the rise in web app driven breaches and how Alert Logic’s managed security solutions help organizations focus on reducing their ever-changing attack surface.

    Hold your spot for this webinar and learn about:
    • Why bad actors are using your web apps for malicious gains
    • Better assessing your cloud attack surface and where to focus when developing and deploying web apps in the cloud
    • Using supervised machine learning to detect the most prolific and damaging attacks
    • Why full-stack security is critical to your cloud security strategy

    Register now to learn more.
  • Web App Attacks: Stories from the SOC Recorded: Aug 1 2017 58 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
  • How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS Recorded: Jul 19 2017 44 mins
    Alert Logic - Ryan Holland, Dir. of Cloud Arch.; AWS - Patrick McDowell, Partner SA; Retail Insights – Orion Newman, VP of IT
    Learn about AWS customer Retail Insights’ several security and compliance needs when protecting their AWS environment and how Alert Logic helped develop a comprehensive security strategy by understanding their security posture, gaining visibility into their environment and proactively protecting against threats and attacks. Attendees will gain a deep understanding of securing the full application stack and the value of having a security solution tightly integrated with AWS.
  • Your Business Apps Are Under Attack: Are You Really Protected? Recorded: Jun 15 2017 48 mins
    James Brown, Global VP Technical Solutions at Alert Logic
    According to Verizon’s 2017 Data Breach Investigation Report, web application attacks are the leading cause of breaches, more than tripling from 9% to 30% since 2014. And as alarming as that sounds, it makes sense as only 24% of organisations said that their application security is mature with all aspects of security measures covered according to Cybersecurity Trends: 2017 Spotlight Report.

    What does this mean for you? If web application attacks are the number one source of data breaches, it means that properly securing your applications must be your top priority. It also means that it is time to rethink your current security best practices, what tools you choose to employ in the cloud, and how you will incorporate expertise and intel into your security strategy.

    Register for this impactful webinar presented by James Brown, Global VP Technical Solutions at Alert Logic who will discuss that when launching an application in the cloud, it’s important to understand the risks you face when you do so without a comprehensive cloud security strategy in place:
    - The value and risk of your business applications
    - The complexities of protecting applications in the cloud
    - The Shared Security Model: What you are responsible for
    - The importance of incorporating security into DevOps workflows
    - Meeting compliance and what you should know
    - Best practices to protect against the latest threats

    This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
  • Protecting your Azure Cloud Workloads with Alert Logic Cloud Defender Recorded: Jun 7 2017 50 mins
    Vince Bryant, Cloud Platform Partner Executive, and Troy White, Sr. Manager – Deployment Architecture
    According to Verizon’s latest breach report, web application attacks are the number one source of data breaches, up 300% from 2014. Defending the application layer from attacks is complex, especially in the cloud. Although cloud platforms come with security built into the platform, securing the application layer is the responsibility of the organization using the cloud, not the responsibility of the cloud service provider.

    Please join Azure cloud security experts from Alert Logic for this webinar to learn how organizations use Alert Logic Cloud Defender® to protect the full-stack in workloads running on Microsoft Azure. Unlike other offerings, our service is architected for the cloud and fully managed 24x365 by cloud security experts.

    In this webinar, we will cover:

    o Challenges of detecting and blocking web attacks in the cloud
    o How Cloud Defender service protects workloads in Azure
    o Walk through a typical deployment for an Azure IaaS environment
    o Discuss advanced deployment options, including:
    1. Optimized deployment for environments with multiple VNETs
    2. Web Application protection for Azure App Services environments
    3. Securing workloads deployed with Docker containers
  • Fireside Chat: Cloud Trends Around Security and Innovation Recorded: Jun 1 2017 24 mins
    Misha Govshteyn, SVP of Product Management & Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic
    Join Misha Govshteyn, SVP of Product Management and Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic for this fireside chat as they discuss:

    - The security industry has pivoted from Intrusion Prevention, to Intrusion Detection: Where is it going next?
    - Lessons Learned: The Alert Logic journey of migrating its SaaS service from a hosting environment to AWS
  • Detecting Threats With Machine Learning Recorded: Jun 1 2017 29 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    As more cyber-attacks dominate our news, Security Operation Centers are under increasing pressure to make sense of millions of security alerts processed every day to find that needle in the haystack and stop the attacks before they inflict significant damage. Until recently, the use of Machine Learning and Artificial Intelligence has been discussed as a technology which may transform the security field in the future, but few examples of real world applications exist. Alert Logic will discuss how advancements in Machine Learning are helping human security operators:

    • Identify meaningful real-world incidents from vast amounts of security data
    • Identify security breaches previously unseen by modern Security Operation Centers
  • Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey Recorded: Jun 1 2017 39 mins
    Wesley Childs at IDBS and Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic
    Join IDBS, a leading provider of advanced R&D data management software for this insightful webinar into the security and compliance challenges they faced on their cloud journey.

    Wesley Childs from IDBS will address the business driver’s behind developing their public-facing web applications in the cloud, provide insight on the challenges that needed to be addressed from a cultural, business and regulatory perspective and conclude with his top 5 lessons learns and pitfalls to avoid to maximise business value of moving applications to the cloud.
  • Protecting Web Applications in AWS Recorded: Jun 1 2017 27 mins
    James Brown, VP, Technology Solutions Group at Alert Logic
    The growing use of public cloud services has created a gap in the defenses of most companies. Not because cloud platforms are insecure themselves, as was once feared, but because the clear majority of legacy on-premises security products do not work for cloud workloads - contrary to claims from legacy security vendors. AWS have the expertise and level of investment required to ensure their cloud infrastructure is hardened, giving traditional infrastructure attack methods fewer avenues for compromise. Now adversaries are setting their sights on the weakest link in the security chain: applications and workloads that run on cloud environments.

    Register for this impactful session as we walk through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • The Good, The Bad & The Ugly of Threat Detection Recorded: Jun 1 2017 20 mins
    Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic
    The challenge all organisations face today is the accuracy of threat detection. In the “old days” we faced mostly worms and viruses and it was easier to create rules to detect and block these types of attacks from even entering your network. The threat landscape has evolved for far past those types of threats. A persistent attacker now approaches a target with a much more concerted effort to gain access to your environment and will use all forms of attack to succeed. Through advanced technologies, machine learning, and security expertise it is easier to cut through the noise of what is good (let it through), what is bad (block it), and what needs further investigation.

    Join Marc Willebeek-Lemair for an in-depth discussion on the essential ingredients needed to deliver a well-integrated security model that combines machine learning and human expertise, to harden your environment against modern cyber threats.
  • Better Detection: Keeping Pace With The Changing Threat Landscape Recorded: Jun 1 2017 22 mins
    Misha Govshteyn, SVP of Product Management and Founder at Alert Logic
    The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?

    In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
  • Security Agility: Enabling Innovation Recorded: Jun 1 2017 23 mins
    Misha Govshteyn, SVP of Product Management and Founder at Alert Logic
    Security and innovation are not often mentioned in the same sentence, but with more and more business-critical applications being moved, or built in the cloud, it is essential that security becomes an agile enabler to cloud adoption. This is where the balance has shifted to integrating security controls into the DevOps lifecycle. Join this session as Misha Govshteyn, SVP of Product Management and Founder at Alert Logic will walk through how to integrate workloads security without slowing down innovation, including:

    -The role of DevOps in security agility
    -Different stages to cloud security maturity
    -The cultural needed for secure innovation
  • Cyber Attack Detection for AWS Recorded: May 24 2017 26 mins
    Matt Curie, Solution Architect at Alert Logic
    Want to keep your cloud-based web applications in Amazon Web Services from getting hacked? Then you do not want to miss this live webinar with a demonstration of Alert Logic Cloud Defender.

    With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.

    Join Matt Curie, Solution Architect at Alert Logic, for an in-depth discussion on steps that you can take to harden your environment against modern cyber threats.

    In the webinar you will learn:
    - How the threat landscape has changed with the emergence of public cloud
    - How Alert Logic can help organizations deal with increasing web application attacks
    - View a live demo of Alert Logic Cloud Defender
  • Is Your Security Keeping Pace with Your Cloud Initiatives? Recorded: May 2 2017 47 mins
    Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • Protecting Yourself from Top Threats in 2017 Recorded: Mar 29 2017 37 mins
    Charles Johnson, Alert Logic Sales Engineering Manager
    In 2016 attackers raised the stakes and became more organized in the effort to monetize pirated systems and proliferate data.  We’ll cover the trends and some of the new interesting exploits while providing strategies on how to best defend against what may come in 2017.  Whether you’re an individual hoping for more privacy or a business owner looking to stay out of the headlines, you’ll be better equipped to guard your data and information systems after this presentation. 
  • GDPR: Ready or not, here it comes Recorded: Mar 16 2017 59 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.

    Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:

    - Cutting through the ambiguity and focusing on the key cloud security considerations
    - Data breach responsibilities and what that means to your organisation
    - What is the role and expectation of your cloud provider when it comes to GDPR
    - Insight into real-life case studies

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Recorded: Feb 23 2017 57 mins
    Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
Security. Compliance. Cloud.
Alert Logic's channel is aimed at empowering IT Managers, CIOs, security analysts and business owners with the knowledge to make the right investment in IT security. Our channel will feature webcasts on compliance, cloud security and security-as-a-service.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top PCI DSS 3.0 Questions Answered
  • Live at: Sep 24 2014 5:00 pm
  • Presented by: Diane Garey - Alert Logic
  • From:
Your email has been sent.
or close