Hi [[ session.user.profile.firstName ]]

Defend Against Attacks from the Inside

Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk.In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

• Learn why insider threats are tough to detect, even when monitoring technologies are in place
• Understand what differentiates good data access from bad data access
• Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
• Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution

Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.
Recorded Feb 23 2016 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Carrie McDaniel, Product Marketing Manager, Imperva
Presentation preview: Defend Against Attacks from the Inside

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CISO’s tough decision: Security on-prem, cloud or both? Jun 8 2017 5:00 pm UTC 60 mins
    Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist
    Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:

    •How to secure your company’s cloud expansion
    •Which assets should be hosted in the cloud vs. on-prem
    •What pace you should be moving at to reach your end goal
    •How to maximize flexibility and performance for IT operations with cloud security
  • Insights from CyberEdge’s 2017 Cyberthreat Defense Report Recorded: Mar 30 2017 57 mins
    Mark Bouchard, COO, CyberEdge and Ajay Uggirala, Director of Product Marketing, Imperva
    You know the bad guys are up to no good but do you know how your current cyber security defensive posture stacks up against those of your peers. In this live webinar, CyberEdge and Imperva will discuss key insights from the 2017 CyberThreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How does our security spend compare to other organizations?
    •How are my peers thinking differently about cyberthreats and their defenses?
    •Which security technologies should we be investing in next?
  • How Not to Get Fired as a CISO Recorded: Mar 2 2017 55 mins
    Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Top Cyber Security Trends for 2017 Recorded: Jan 19 2017 58 mins
    Amichai Shulman, CTO and Co-Founder, Imperva
    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    · What top 3 cyber security trends will have the largest impact in 2017
    · Why cyber attacks are on the rise and multiplying quickly
    · How to combat the increasing number of breaches
    · What to consider in building a security plan that is right for your organization
  • Technical Deep Dive: How to Detect and Mitigate Ransomware Recorded: Dec 13 2016 36 mins
    Carrie McDaniel, Sr. Product Marketing Manager Elad Erez, File Security Innovation and Development, Imperva
    Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
  • Defend Against the Data Miner for Financial Services Recorded: Nov 9 2016 53 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva, Cheryl Tang, Director of Product Marketing
    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:
    - How behavior analysis and deception technology identify insider threats
    - Why data activity monitoring provides comprehensive coverage
    - Why a proactive approach with visibility can quickly stop data miners
  • Unedited: Tales, Tips and Technologies from a Security Company CISO Recorded: Nov 3 2016 48 mins
    Shahar Ben-Hador, Chief Information Security Officer; Paul Steen, Senior Director, Global Security Strategist
    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
    · Humorous security tales and repercussions of employee behaviors
    · Tips to deal with employees, execs and board members
    · Security technology recommendations that work best across a security stack

    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
  • Imperva Incapsula Secures and Protects Google Cloud Customers Recorded: Oct 12 2016 52 mins
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Speakers:
    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Defend Against the Data Miner Recorded: Sep 29 2016 40 mins
    Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Recorded: Sep 27 2016 51 mins
    Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall Recorded: Sep 7 2016 66 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.
  • How to Accurately Identify Compromised Insiders Recorded: Jul 20 2016 49 mins
    Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva
    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months.

    Attend this webinar to:
    •Learn how to accurately identify insider threats and protect enterprise data
    •Discover a multi-layered approach to identify compromised users
    •Gain insight into the latest developments in deception technology
  • 3 Steps to Faster Discovery of Insider Threats Recorded: Jun 23 2016 59 mins
    Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
    Protecting your data requires an understanding of the threat vectors and taking action to minimize those risks. According to the Verizon 2016 Data Breach Investigation Report, insider and privilege misuse represents one of the most common incident types and typically requires the longest to detect. 
     
    Attend this webinar to:
    · Learn how improving your visibility into insider activity and threats can reduce risk
    · Understand why monitoring both user behavior and data access activity can improve your detection rate and response times
    · Find out how you can expand your security monitoring capabilities without impacting system performance, adding cumbersome processes or hiring specialized personnel
  • Next-Generation Insider Threat Protection Recorded: May 25 2016 44 mins
    John Kindervag and Morgan Gerhart
    Sensitive data is the lifeblood of your organization. With recent high-profile breaches, data security has now become a boardroom issue. Many businesses focus heavily on protecting data from outside threats, only to discover too late that the greatest threat comes from within.

    View the on-demand webinar where guest speaker John Kindervag, VP, Principal Analyst Serving Security and Risk Professionals at Forrester Research, and Morgan Gerhart, VP, Product Marketing, Imperva, will walk through what you need to know to protect your organization and customers from insider threats.

    During this webinar they:

    - Discuss new research on the trends and challenges for detecting insider threats
    - Break down the cause of recent, high-profile data breaches
    - Introduce a new data security strategy that pinpoints insider threats

    View the webinar and learn how to stop insider threats today.
  • More Databases. More Hackers. More Audits. Recorded: Mar 31 2016 60 mins
    Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
    Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

    Attend this webinar to learn how to:
    * Detect and block cyber security events in real-time
    * Protect large and diverse data environments
    * Simplify compliance enforcements and reporting
    * Take control of escalating costs.
  • Protect Your Data and Apps in the Public Cloud Recorded: Mar 30 2016 56 mins
    Lior Lukov, Sr. Product Manager, Imperva and Narayan Makaram, Dr. Product Marketing, Imperva
    Cybercriminals often target business critical apps hosted in the cloud. Infrastructure-as-a-Service providers do not deliver complete protection for organizations against advanced Web application attacks.

    Attend this webinar and learn:
    •What security challenges exist with hosting apps in cloud infrastructures
    •How to protect data and apps hosted in Amazon Web Services and Microsoft Azure
    •How to rapidly deploy secure solutions at scale in both environments
  • Insights from the 2016 Cyberthreat Defense Report Recorded: Feb 25 2016 55 mins
    Mark Bouchard, COO, CyberEdge Group and Deepak Patel, Director of Security Strategy, Imperva
    You know the bad guys are up to no good, but did you know the greatest threat to your organization comes from the inside? In this live webinar, CyberEdge and Imperva will discuss key insights from the new 2016 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do critical gaps exist in your cyberthreat defense posture?
    •How does your security spend compare to other organizations?
    •What can you do to minimize risk against the internal and external threat?
    •Is your business critical data protected from cybercriminals?
  • Defend Against Attacks from the Inside Recorded: Feb 23 2016 42 mins
    Carrie McDaniel, Product Marketing Manager, Imperva
    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk.In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
    • Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution

    Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.
  • Top Cyber Security Trends for 2016 Recorded: Dec 16 2015 55 mins
    Amichai Shulman, CTO and co-founder, Imperva
    “In this world nothing can be said to be certain, except death and taxes.” And, now breaches? With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted.

    What does this mean for 2016? Join Imperva CTO and co-founder, Amichai Shulman, as he reveals the top trends that will impact cyber security practices across the globe.

    Attend this webinar and learn:
    •Why cyber attacks continue to increase in sophistication, magnitude and velocity
    •What trends will have the largest and smallest impact on cyber security in 2016
    •Why cloud-based apps and the Internet of Things have transformed cyber security
    •How you can protect your organization from attacks from the inside
  • Database Surveillance and Protection: 3 Ways to Stop Hackers Recorded: Dec 2 2015 47 mins
    Cheryl O’Neill, Dir. Product Marketing, Imperva and David O’Leary, Dir. Security Solutions, Forsythe
    Data thieves are opportunistic, looking for unprotected databases in the forgotten digital corners of your company. They are content to steal any data that lies within easy reach.

    Large companies are especially vulnerable. With hundreds or even thousands of databases spread throughout business units and across multiple geographies, it is only a matter of time until your unprotected data is accessed and stolen.

    Fortunately, it doesn’t have to be complicated, tedious or expensive to protect all of your sensitive data with a database monitoring solution. The right database monitoring solution can also provide visibility into data usage and simplify compliance audits.

    Join us for this webinar to learn:
    •Benefits of database monitoring over native audit tools
    •Factors to consider before investing in database audit and protection
    •3 specific ways to leverage database monitoring for improved security
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defend Against Attacks from the Inside
  • Live at: Feb 23 2016 6:00 pm
  • Presented by: Carrie McDaniel, Product Marketing Manager, Imperva
  • From:
Your email has been sent.
or close