Hi [[ session.user.profile.firstName ]]

More Databases. More Hackers. More Audits.

Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

Attend this webinar to learn how to:
* Detect and block cyber security events in real-time
* Protect large and diverse data environments
* Simplify compliance enforcements and reporting
* Take control of escalating costs.
Recorded Mar 31 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
Presentation preview: More Databases. More Hackers. More Audits.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Imperva Technical Deep Dive: How to Detect and Mitigate Ransomware Dec 13 2016 6:00 pm UTC 60 mins
    Carrie McDaniel, Sr. Product Marketing Manager Elad Erez, File Security Innovation and Development, Imperva
    Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
  • Defend Against the Data Miner for Financial Services Recorded: Nov 9 2016 53 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva, Cheryl Tang, Director of Product Marketing
    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:
    - How behavior analysis and deception technology identify insider threats
    - Why data activity monitoring provides comprehensive coverage
    - Why a proactive approach with visibility can quickly stop data miners
  • Unedited: Tales, Tips and Technologies from a Security Company CISO Recorded: Nov 3 2016 48 mins
    Shahar Ben-Hador, Chief Information Security Officer; Paul Steen, Senior Director, Global Security Strategist
    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
    · Humorous security tales and repercussions of employee behaviors
    · Tips to deal with employees, execs and board members
    · Security technology recommendations that work best across a security stack

    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
  • Imperva Incapsula Secures and Protects Google Cloud Customers Recorded: Oct 12 2016 52 mins
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Speakers:
    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Defend Against the Data Miner Recorded: Sep 29 2016 40 mins
    Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Recorded: Sep 27 2016 51 mins
    Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall Recorded: Sep 7 2016 66 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.
  • How to Accurately Identify Compromised Insiders Recorded: Jul 20 2016 49 mins
    Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva
    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months.

    Attend this webinar to:
    •Learn how to accurately identify insider threats and protect enterprise data
    •Discover a multi-layered approach to identify compromised users
    •Gain insight into the latest developments in deception technology
  • 3 Steps to Faster Discovery of Insider Threats Recorded: Jun 23 2016 59 mins
    Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
    Protecting your data requires an understanding of the threat vectors and taking action to minimize those risks. According to the Verizon 2016 Data Breach Investigation Report, insider and privilege misuse represents one of the most common incident types and typically requires the longest to detect. 
     
    Attend this webinar to:
    · Learn how improving your visibility into insider activity and threats can reduce risk
    · Understand why monitoring both user behavior and data access activity can improve your detection rate and response times
    · Find out how you can expand your security monitoring capabilities without impacting system performance, adding cumbersome processes or hiring specialized personnel
  • More Databases. More Hackers. More Audits. Recorded: Mar 31 2016 60 mins
    Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
    Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

    Attend this webinar to learn how to:
    * Detect and block cyber security events in real-time
    * Protect large and diverse data environments
    * Simplify compliance enforcements and reporting
    * Take control of escalating costs.
  • Defend Against Attacks from the Inside Recorded: Feb 23 2016 42 mins
    Carrie McDaniel, Product Marketing Manager, Imperva
    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk.In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
    • Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution

    Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.
  • Database Surveillance and Protection: 3 Ways to Stop Hackers Recorded: Dec 2 2015 47 mins
    Cheryl O’Neill, Dir. Product Marketing, Imperva and David O’Leary, Dir. Security Solutions, Forsythe
    Data thieves are opportunistic, looking for unprotected databases in the forgotten digital corners of your company. They are content to steal any data that lies within easy reach.

    Large companies are especially vulnerable. With hundreds or even thousands of databases spread throughout business units and across multiple geographies, it is only a matter of time until your unprotected data is accessed and stolen.

    Fortunately, it doesn’t have to be complicated, tedious or expensive to protect all of your sensitive data with a database monitoring solution. The right database monitoring solution can also provide visibility into data usage and simplify compliance audits.

    Join us for this webinar to learn:
    •Benefits of database monitoring over native audit tools
    •Factors to consider before investing in database audit and protection
    •3 specific ways to leverage database monitoring for improved security
  • The State of Application Security: Hackers On Steroids Recorded: Nov 18 2015 47 mins
    Itsik Mantin, Director of Security Research, Imperva
    Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.

    This webinar will detail key insights from the Imperva Application Defense Center annual Web Application Attack Report. Attend this webinar for an in-depth view of the threat landscape for the year. We will:
    - Discuss hacking trends and shifts
    - Provide breach analysis by geography, industry and attack type
    - Detail next steps for improved security controls and risk management processes
  • Securing Office 365 through Cloud Access Security Brokers Recorded: Aug 25 2015 38 mins
    Norv Leong, Senior Director, Product Marketing, Imperva Skyfence
    Microsoft Office 365 is quickly establishing itself as the go-to productivity suite used in organizations today. However, even Microsoft maintains that Office 365 security is a shared responsibility between itself and the customer. Office 365 provides some capabilities natively, but at the end of the day, Microsoft does not take responsibility for managing mobile access, enforcing access policies, and meeting compliance requirements. Join us for an informative webinar where you’ll learn how to define, develop, and execute an Office 365 security plan while meeting all of your compliance obligations.
  • Sophisticated Incident Response Requires Sophisticated Activity Monitoring Recorded: Jul 29 2015 41 mins
    Mike Sanders, Principal SE and Team Lead, Imperva and Bryan Orme, Principal, GuidePoint Security
    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:
    · Discover sensitive data, risk, and vulnerabilities
    · Detect and block active attacks
    · Investigate incidents and automate remediation
    · Demonstrate consistent policy application across all sensitive data
  • 10 Audit Trail Tips for Better Data Security Recorded: Jul 22 2015 39 mins
    Mike Sanders, Principal SE and Team Lead, Imperva
    Database servers are the primary targets of most data security breaches. Understanding how to effectively monitor databases can prevent data loss and significantly reduce the time to discover the risk.

    Attend this webinar and learn how to:
    - Detect and block active attacks
    - Discover sensitive data, risks, and vulnerabilities
    - Automate risk remediation
    - Demonstrate consistent and complete compliance
  • Extend enterprise application-level security to your AWS environment Recorded: Jun 25 2015 55 mins
    Chris Grove, Director of Solution Architecture, Imperva; Matt Yanchyshyn, Sr, Mgr of Solutions Architecture, AWS
    It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves.

    This webinar will:
    · Discuss inherent AWS security capabilities

    · Review attack types that target the applications and why traditional security approaches can’t stop them

    · Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud
  • An Inside Look at a Sophisticated, Multi-vector DDoS Attack Recorded: Jun 24 2015 45 mins
    Orion Cassetto, Director Product Marketing, Imperva Incapsula
    This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.
  • Infosecurity Europe 2015: Amichai Shulman, Imperva Recorded: Jun 12 2015 2 mins
    Amichai Shulman, Chief Technology Officer, Imperva
    Infosecurity Europe 2015: Amichai Shulman, Imperva
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: More Databases. More Hackers. More Audits.
  • Live at: Mar 31 2016 5:00 pm
  • Presented by: Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director
  • From:
Your email has been sent.
or close