Hi [[ session.user.profile.firstName ]]

Best Practices in Responding to the Next Vulnerability

GHOST, Shellshock, Heartbleed and POODLE are just some of the vulnerabilities identified recently - and the outlook going forward is no better. So how can you be more prepared to respond when a vulnerability is identified? Join this webinar to get practical advice on responding to the next vulnerability.
Recorded Feb 3 2015 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Coty - Alert Logic Chief Security Evangelist
Presentation preview: Best Practices in Responding to the Next Vulnerability

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Ins & Outs of Your Ever-Evolving Cloud Security Strategy Feb 27 2018 2:00 pm UTC 60 mins
    Dan Pitman, Senior Solution Architect, Alert Logic
    There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.

    Highlights include:

    •Understanding your cloud provider’s security model and where you need to assume security responsibility
    •Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
    •Best practice ideas for ensuring security in any cloud environment

    This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
  • The SOC Protection You Need To Defend Against Cloud Threats Feb 21 2018 4:00 pm UTC 60 mins
    John Carse, VP Security Operations, Alert Logic
    It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.

    Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.

    Register now to get answers to these important questions:

    • What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
    • How does a 24x7 managed security service integrate with and enhance your security capabilities?
    • How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?
  • Get Your Cloud Security in Shape for 2018 Recorded: Jan 24 2018 51 mins
    Misha Govshteyn, Co-Founder and Senior Vice President of Products, Alert Logic
    Last year, there were several major breaches across various industries, from Equifax to Uber and everything in between. There’s no discrimination when it comes to a security breach: everyone is at risk. So how does your organization stay ahead of tomorrow’s threats in 2018? Alert Logic is here to help you find an answer!

    Join Co-Founder, Misha Govshteyn, as he presents the key learnings on last year’s top breaches along with insight to shape up your cloud security for the new year. Register now and gain the best strategies to protect your business-critical applications.

    In this engaging webinar, you’ll discover:

    • Where Are They Now: The breaches of 2017
    • Remedies to the top misconfigurations in your cloud workloads
    • The 5 security issues you’ll face in 2018
  • From Data to Action: Extending GuardDuty with Cloud Insight Recorded: Dec 12 2017 40 mins
    Patrick McDowell, Amazon Web Services, and Ryan Holland, Alert Logic
    Knowing the where, why, and how to respond quickly to cyber threats is the foundation of protecting your AWS workloads. But due to rapid deployment and constant changes in the cloud, it’s easier said than done. Fortunately, we’re turning cloud security findings into prioritized, actionable insight.

    Join Ryan Holland, Senior Director, Technology Services Group at Alert Logic, and Patrick McDowell, Global Technical Lead, Security Partners at AWS, for an overview of two new integrated security solutions: Amazon GuardDuty™ and Alert Logic Cloud Insight™ Essentials. This engaging webcast covers:

    • Quickly attaining complete visibility of your cloud environment
    • Identifying unexpected and malicious activity through Amazon GuardDuty
    • Transforming security findings into action with Cloud Insight Essentials
    • Preventing future compromises with prioritized AWS cloud configuration best practices
  • Achieving Compliance in Azure: A Panel Discussion Recorded: Nov 8 2017 55 mins
    Tom Quinn, Microsoft, Gururaj Pandurangi, Avyan Consulting, and Vince Bryant, Alert Logic
    Organizations are rapidly moving to highly scalable, multi-cloud, and hybrid environments, which adds layers of compliance complexity and blurs the lines of responsibility. How do you achieve and maintain compliance in such a dynamic environment?

    Join us for an informative round table discussion with experts from Microsoft, Avyan Consulting, and Alert Logic, as they discuss key considerations for staying compliant and secure in Azure Cloud and hybrid environments. Learn how you can capture the benefits of using cloud for your regulated workloads:

    • Best practices for running workloads in Azure and hybrid environments
    • Business benefits of leveraging the Azure partner ecosystem
    • How addressing compliance can help improve your overall security posture

    Register for Achieving Compliance in Azure today!
  • Overcoming PCI DSS Challenges While Driving Innovation Recorded: Oct 25 2017 41 mins
    Cindy Stanton, VP of Commercial Product Management, Alert Logic, and Mike Santimaw, VP of Information Security, Rent-A-Center
    Out of nearly 300 payment card data breaches investigated by Verizon between 2010 and 2016, not one of the organizations was fully PCI DSS compliant at the time of their breach. When organizations start with a robust security program, the PCI DSS compliance they achieve is supported by a program that allows them to maintain that compliance and be in the best position to secure their customers’ information. Without the proper security tools and expertise in place, businesses expose themselves to the risks of damage to their reputation, brand, and financial health. So how do you stay on top of PCI compliance?

    We sit down with Mike Santimaw, Vice President of Information Security, Innovation Labs & Corporate Solutions at Rent-A-Center, as he discusses the PCI challenges faced when making the business transition to a cloud-first approach. You’ll gain first-hand experience on the steps taken to maintain compliance for their digital presence and in over 3,000 stores across North America, while enabling customer experience innovation.

    Claim your spot and learn about:
    • The business consequences and impact when not PCI DSS compliant
    • The key steps for maintaining an effective security program and PCI compliance in a hybrid environment
    • The benefits to leveraging managed security for compliance mandates
  • Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks Recorded: Oct 11 2017 61 mins
    Misha Govshteyn, Co-Founder and SVP Products at Alert Logic
    Is your organization better protected than Equifax or Yahoo, as both were compromised using common web application attack vectors? Web application attacks are by far the largest source of breaches. And with historically low spending on web application security, more breaches are expected to come. Now is the time to push for change – and budget -because everyone is paying attention to cyber security again.

    Join Misha Govshteyn, co-founder of Alert Logic, as he presents, “Shrinking Your Attack Surface: Preventing and Containing Multi-Stage Web Attacks”.” Learn how companies of all sizes and industries are preventing exploits and containing web attacks that can’t be stopped at the perimeter. Gain a better understanding of what your organization needs for your next layer of defense.

    In this webinar, you will get insight on:

    • How Alert Logic solutions prevent and contain the damage from multi-stage attacks
    • How advanced analytics like machine learning, is put to work for you
    • Key buying criteria for web app and cloud workload security solutions
  • Understanding Your Cloud Attack Surface Recorded: Sep 27 2017 60 mins
    Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing
    As organizations continue to shift to cloud computing, new research reveals a significant consolidation of threats in specific layers of the computing model. Effective attackers, always seeking the weakest spots in network defenses, understand the changing attack landscape, have adapted their attack methods to this new paradigm. How do we evolve our security strategies to meet this challenge?

    Join Scott Lambert, VP of Threat Intelligence, and Allison Armstrong, VP of Product & Technical Marketing, as they share impactful insights from Alert Logic’s 2017 Cloud Security Report, based upon findings from verified security incidents from thousands of companies around world. They will discuss:

    • How security incidents differ on hybrid networks versus public-cloud installations
    • What the top 6 web attack types are that account for 75% of verified incidents
    • Machine learning’s impact on detecting incidents and understanding attack progression
    • Important steps to preventing targeted attacks and protecting your data

    Watch ‘Understanding Your Cloud Attack Surface’ to understand how today’s vulnerabilities are being exploited and key strategies you can adopt to increase security and manage risk.
  • Assess Your GDPR Cloud Security Readiness Recorded: Sep 19 2017 60 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Are your cloud applications GDPR ready?

    Gartner predicts that, “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”*

    In less than a year, the EU General Data Protection Regulation (GDPR) will require global organisations to control, process and protect the personal data of EU citizens at a much higher level than they do now. It’s arguably the most important regulation in a generation, but it is time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you are going to address it especially with your cloud-based applications.

    The first step for any organisation to operate within the boundaries of GDPR, is to understand how important your data is and the risk of it being compromised. To protect from hackers, you need to think like one. How are you assessing vulnerabilities and configuration flaws that might leave your data comprised? Breaches are often not discovered until weeks or months later, how are you detecting and assessing indicators of compromise so that you can know you have been breached and respond within the 72-hour deadline?

    Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:
    • Cutting through the ambiguity and focusing on the key cloud security considerations
    • Important steps to preventing targeted attacks and protecting your data
    • How to develop GDPR and Cloud enabled security blueprints
    • Best practices to getting on the road to GDPR-ready in the next 30 days

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.

    *Gartner, Focus on Five High-Priority Changes to Tackle the EU GDPR, Bart Willemsen, 30 Sept 16
  • Preparing for Cyber Attacks… Expect the Unexpected Recorded: Sep 12 2017 60 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud
    Your company is constantly under the threat of a potential cyber attack that can wreak havoc and impact your business. Cyber criminals are finding new ways to compromise systems and the hacking community continues to fine-tune their methods of attack. The maturation of hacking groups around the globe poses a cyber security threat that never stops.

    Join Paul Fletcher, Cyber Security Evangelist at Alert Logic, and Frank Shultz, Managing Director at BC in the Cloud, as they present, “Preparing for Cyber Attacks… Expect the Unexpected.” Hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    In this webinar, these experts will reveal:

    • The true impact of a cyber attack on a company from the bottom line to the board room
    • The importance of having a business continuity/disaster recovery plan in place
    • How business continuity planning tools and security software go hand in hand
    • The significance of exercising and testing a plan prior to an attack
  • Web App Attacks: Hacker Methodologies and Remediation Strategies Recorded: Aug 23 2017 53 mins
    Stephen Coty, Chief Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report, but have you ever wondered how adversaries conduct their attacks and what methods they use to successfully compromise their web application targets?

    Register for this eye-opening webinar presented by Stephen Coty, Chief Security Evangelist at Alert Logic, who will discuss the realities of web application attacks and:

    • The global perspective of the current state of web application vulnerabilities
    • Understand how reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • Remediation strategies to help defend against web apps attacks
  • Why the Web Apps You're Worried About Least Could Be Your Most Critical Exposure Recorded: Aug 2 2017 64 mins
    Misha Govshteyn, Founder and SVP Products at Alert Logic; Allison Armstrong, VP Product Marketing at Alert Logic
    What’s the best way to breach your most critical cloud workloads? Compromise your least critical web applications while no one is watching.

    Join Alert Logic’s Founder and SVP of Products, Misha Govshteyn, as he shares what’s behind the rise in web app driven breaches and how Alert Logic’s managed security solutions help organizations focus on reducing their ever-changing attack surface.

    Hold your spot for this webinar and learn about:
    • Why bad actors are using your web apps for malicious gains
    • Better assessing your cloud attack surface and where to focus when developing and deploying web apps in the cloud
    • Using supervised machine learning to detect the most prolific and damaging attacks
    • Why full-stack security is critical to your cloud security strategy

    Register now to learn more.
  • Web App Attacks: Stories from the SOC Recorded: Aug 1 2017 58 mins
    Paul Fletcher, Cyber Security Evangelist at Alert Logic
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
  • How Retail Insights, LLC Met Compliance Mandates and Enhanced Security on AWS Recorded: Jul 19 2017 44 mins
    Alert Logic - Ryan Holland, Dir. of Cloud Arch.; AWS - Patrick McDowell, Partner SA; Retail Insights – Orion Newman, VP of IT
    Learn about AWS customer Retail Insights’ several security and compliance needs when protecting their AWS environment and how Alert Logic helped develop a comprehensive security strategy by understanding their security posture, gaining visibility into their environment and proactively protecting against threats and attacks. Attendees will gain a deep understanding of securing the full application stack and the value of having a security solution tightly integrated with AWS.
  • Your Business Apps Are Under Attack: Are You Really Protected? Recorded: Jun 15 2017 48 mins
    James Brown, Global VP Technical Solutions at Alert Logic
    According to Verizon’s 2017 Data Breach Investigation Report, web application attacks are the leading cause of breaches, more than tripling from 9% to 30% since 2014. And as alarming as that sounds, it makes sense as only 24% of organisations said that their application security is mature with all aspects of security measures covered according to Cybersecurity Trends: 2017 Spotlight Report.

    What does this mean for you? If web application attacks are the number one source of data breaches, it means that properly securing your applications must be your top priority. It also means that it is time to rethink your current security best practices, what tools you choose to employ in the cloud, and how you will incorporate expertise and intel into your security strategy.

    Register for this impactful webinar presented by James Brown, Global VP Technical Solutions at Alert Logic who will discuss that when launching an application in the cloud, it’s important to understand the risks you face when you do so without a comprehensive cloud security strategy in place:
    - The value and risk of your business applications
    - The complexities of protecting applications in the cloud
    - The Shared Security Model: What you are responsible for
    - The importance of incorporating security into DevOps workflows
    - Meeting compliance and what you should know
    - Best practices to protect against the latest threats

    This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
  • Protecting your Azure Cloud Workloads with Alert Logic Cloud Defender Recorded: Jun 7 2017 50 mins
    Vince Bryant, Cloud Platform Partner Executive, and Troy White, Sr. Manager – Deployment Architecture
    According to Verizon’s latest breach report, web application attacks are the number one source of data breaches, up 300% from 2014. Defending the application layer from attacks is complex, especially in the cloud. Although cloud platforms come with security built into the platform, securing the application layer is the responsibility of the organization using the cloud, not the responsibility of the cloud service provider.

    Please join Azure cloud security experts from Alert Logic for this webinar to learn how organizations use Alert Logic Cloud Defender® to protect the full-stack in workloads running on Microsoft Azure. Unlike other offerings, our service is architected for the cloud and fully managed 24x365 by cloud security experts.

    In this webinar, we will cover:

    o Challenges of detecting and blocking web attacks in the cloud
    o How Cloud Defender service protects workloads in Azure
    o Walk through a typical deployment for an Azure IaaS environment
    o Discuss advanced deployment options, including:
    1. Optimized deployment for environments with multiple VNETs
    2. Web Application protection for Azure App Services environments
    3. Securing workloads deployed with Docker containers
  • Fireside Chat: Cloud Trends Around Security and Innovation Recorded: Jun 1 2017 24 mins
    Misha Govshteyn, SVP of Product Management & Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic
    Join Misha Govshteyn, SVP of Product Management and Founder and Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic for this fireside chat as they discuss:

    - The security industry has pivoted from Intrusion Prevention, to Intrusion Detection: Where is it going next?
    - Lessons Learned: The Alert Logic journey of migrating its SaaS service from a hosting environment to AWS
  • Detecting Threats With Machine Learning Recorded: Jun 1 2017 29 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    As more cyber-attacks dominate our news, Security Operation Centers are under increasing pressure to make sense of millions of security alerts processed every day to find that needle in the haystack and stop the attacks before they inflict significant damage. Until recently, the use of Machine Learning and Artificial Intelligence has been discussed as a technology which may transform the security field in the future, but few examples of real world applications exist. Alert Logic will discuss how advancements in Machine Learning are helping human security operators:

    • Identify meaningful real-world incidents from vast amounts of security data
    • Identify security breaches previously unseen by modern Security Operation Centers
  • Journey To The Cloud: Jumping The Invisible Hurdles And The Cultural Journey Recorded: Jun 1 2017 39 mins
    Wesley Childs at IDBS and Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic
    Join IDBS, a leading provider of advanced R&D data management software for this insightful webinar into the security and compliance challenges they faced on their cloud journey.

    Wesley Childs from IDBS will address the business driver’s behind developing their public-facing web applications in the cloud, provide insight on the challenges that needed to be addressed from a cultural, business and regulatory perspective and conclude with his top 5 lessons learns and pitfalls to avoid to maximise business value of moving applications to the cloud.
  • Protecting Web Applications in AWS Recorded: Jun 1 2017 27 mins
    James Brown, VP, Technology Solutions Group at Alert Logic
    The growing use of public cloud services has created a gap in the defenses of most companies. Not because cloud platforms are insecure themselves, as was once feared, but because the clear majority of legacy on-premises security products do not work for cloud workloads - contrary to claims from legacy security vendors. AWS have the expertise and level of investment required to ensure their cloud infrastructure is hardened, giving traditional infrastructure attack methods fewer avenues for compromise. Now adversaries are setting their sights on the weakest link in the security chain: applications and workloads that run on cloud environments.

    Register for this impactful session as we walk through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
Security. Compliance. Cloud.
Alert Logic's channel is aimed at empowering IT Managers, CIOs, security analysts and business owners with the knowledge to make the right investment in IT security. Our channel will feature webcasts on compliance, cloud security and security-as-a-service.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices in Responding to the Next Vulnerability
  • Live at: Feb 3 2015 6:00 pm
  • Presented by: Stephen Coty - Alert Logic Chief Security Evangelist
  • From:
Your email has been sent.
or close