Hi [[ session.user.profile.firstName ]]

10 Audit Trail Tips for Better Data Security

Database servers are the primary targets of most data security breaches. Understanding how to effectively monitor databases can prevent data loss and significantly reduce the time to discover the risk.

Attend this webinar and learn how to:
- Detect and block active attacks
- Discover sensitive data, risks, and vulnerabilities
- Automate risk remediation
- Demonstrate consistent and complete compliance
Recorded Jul 22 2015 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Sanders, Principal SE and Team Lead, Imperva
Presentation preview: 10 Audit Trail Tips for Better Data Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing the Cryptocurrency Exchange Jun 14 2018 2:00 pm UTC 60 mins
    Jonathan Gruber – Security Engineer, Imperva
    Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance

    Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges makes them especially attractive to cybercriminals, attacks of late are taking exchanges by surprise, and they are often not scaled or have not built a secure environment. In this webinar, join Security Engineer Jonathan Gruber and his colleagues from Imperva as they explore the latest cryptocurrency exchange vulnerabilities and attacks and explain the best strategies for mitigation.
  • Hybrid Cloud – What it is? How to secure it? May 22 2018 5:00 pm UTC 60 mins
    Ajay Uggirala and Marty Jost — Product Marketing, Imperva
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime May 2 2018 5:00 pm UTC 60 mins
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    •Learn why automatic mitigation is crucial to keeping your business up and running
    •Understand the power and importance of the Incapsula 10-second DDoS SLA
    •Participate in a live Q&A with DDoS experts
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report Apr 25 2018 5:00 pm UTC 60 mins
    Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Recorded: Apr 11 2018 59 mins
    Speakers: Ajay Uggirala, Product Marketing, Imperva; Brandon Dunlap, Brightfly (Moderator)
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
  • Protect Your Web Applications from Cryptomining Recorded: Mar 28 2018 44 mins
    Gilad Yehudai – Security Researcher, Imperva and Nadav Avital – Threat Research Team Leader, Imperva
    Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution Attacks

    Remote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulnerabilities in web application source code and are prevalent in over 88% of all RCE attacks. In this webinar, join Security Researcher Gilad Yehudai and Threat Research Team Leader Nadav Avital as they analyze malicious cryptomining script, investigate methods these attackers use to make money, and explain how Imperva WAF solutions are equipped to mitigate the threat.
  • Briefings Part 2: Top Three Ways To Tackle API Security Recorded: Mar 22 2018 60 mins
    Speaker: Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap, Moderator
    Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to protect these APIs from attacks. Join Imperva and (ISC)2 for Part 2 of our Security Briefings series on March 8, 2018 at 1:00PM Eastern where we will discuss proven approaches to making API security a priority through understanding how common types of attacks such as distributed denial of service (DDoS) can target APIs, what are the steps to proactively secure development frameworks, and how to enforce identity across enterprise environments.
  • Part 1: March of the Bots: How to Deal with the Onslaught Recorded: Mar 7 2018 60 mins
    Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator)
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.

    Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 2 Recorded: Jan 30 2018 78 mins
    Dr. Branden Williams, with Timothy Yim, Imperva; Barbara Cosgrove, Workday; Sue Habas, ASG; and Naheed Bleecker, TrustArc.
    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Top 5 Cybersecurity Trends for 2018 Recorded: Jan 23 2018 56 mins
    Terry Ray, CTO, Imperva
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2018, including:
    · The impending arrival of massive cloud data breaches
    · The growth of crypto-currency mining attacks
    · Malicious use of AI and AI deception
    · Cyber extortion's increasing focus on business disruption
    · The evolution of insider breaches

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
  • Gartner Report - Web App Firewalls and Protecting Your Critical Data Recorded: Nov 13 2017 58 mins
    Morgan Gerhart - VP Prod. Mktg for Imperva; Rob McCurdy, CIO of Mich. St. Univ.; Darío Herrera, CTO of Sm4rt Security
    The new 2017 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will cover:
    * Detailed results and considerations of the report
    * Effective deployment options to meet enterprise demands
    * Success stories and implementation options you can leverage within your own environment

    Join us to hear Morgan Gerhart, Vice President of Product Marketing at Imperva, discuss the Gartner MQ for WAF with:

    *Rob McCurdy, CIO of Michigan State University
    *Darío Eduardo Herrera Yáñez, CTO of Sm4rt Security Services
  • Video: Bo Knows Security Recorded: Nov 9 2017 8 mins
    Bo Kim, Head of Information Security at Imperva
    When it comes to building a security program, focusing only on technology and processes puts organizations in a weak and unbalanced position. People need to be equally factored in—and that’s where culture comes in. Listen as Bo talks about the importance of a strong security culture and walks through four essential components needed to build one.
  • Talking to Your Developer about Security (Cloud Migration Series Part 3) Recorded: Nov 9 2017 52 mins
    Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap (Moderator)
    More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
  • Security Across Cloud Platforms (Cloud Migration Series Part 2) Recorded: Nov 2 2017 60 mins
    Nabeel Saeed, Imperva; Brandon Dunlap (Moderator)
    With the proliferation of cloud deployment options and platforms, management of application security across platforms has become a major problem for security teams. In this webinar, we address challenges posed by cloud proliferation, and how to approach development of a consistent security posture across platforms to better manage risks.
  • Rethinking Security for Hybrid Environments (Cloud Migration Series Part 1) Recorded: Oct 26 2017 58 mins
    Bo Kim, Sr. Dir. of Info. Sec., Imperva; Alok Shukla, Sr. Dir. of Prod. Mgmt., Imperva; Brandon Dunlap (Moderator)
    As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
  • Surviving a CISO Transition in the Age of Breaches Recorded: Sep 26 2017 56 mins
    Shahar Ben-Hador - CISO; Bo Kim - Sr. Dir. Information Security; Paul Steen - Vice President, Global Product Strategy
    How to make sure a CISO's work isn't dumped when they leave.

    A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:

    * Building a transition timeline
    * Evaluating which projects should be completed and which handed off
    * Determining where to draw the line on investments

    About the Speakers:

    Shahar Ben-Hador, CISO, Imperva

    As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.

    Bo Kim, Sr. Dir. Information Security, Imperva

    Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
  • How to Choose Your Next Database Audit Solution Recorded: Aug 22 2017 64 mins
    Terry Ray, Chief Technology Officer at Imperva
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • GDPR and What It Means for Security Teams Recorded: Aug 17 2017 37 mins
    Cheryl Tang, Director Data Security Products, Imperva
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • CISO's Tough Decision: Security On-Prem, Cloud or Both? Recorded: Jun 8 2017 51 mins
    Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist
    Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:

    •How to secure your company’s cloud expansion
    •Which assets should be hosted in the cloud vs. on-prem
    •What pace you should be moving at to reach your end goal
    •How to maximize flexibility and performance for IT operations with cloud security
  • Insights from CyberEdge’s 2017 Cyberthreat Defense Report Recorded: Mar 30 2017 57 mins
    Mark Bouchard, COO, CyberEdge and Ajay Uggirala, Director of Product Marketing, Imperva
    You know the bad guys are up to no good but do you know how your current cyber security defensive posture stacks up against those of your peers. In this live webinar, CyberEdge and Imperva will discuss key insights from the 2017 CyberThreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How does our security spend compare to other organizations?
    •How are my peers thinking differently about cyberthreats and their defenses?
    •Which security technologies should we be investing in next?
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Audit Trail Tips for Better Data Security
  • Live at: Jul 22 2015 4:00 pm
  • Presented by: Mike Sanders, Principal SE and Team Lead, Imperva
  • From:
Your email has been sent.
or close