Hi [[ session.user.profile.firstName ]]

Multi-layered online attacks: IT security strategies to protect your company

The latest hacking strategies include attacking targets from multiple fronts using DDoS attempts, malware and other techniques at the same time. Automation, including widespread use of compromised systems, hired botnets and IoT (Internet of Things) devices, is on the rise.

Join us to learn more about multi-layered attacks and how intelligence and automation are making them significantly more powerful. You will also learn tips to help your organization mitigate the risks.

Key Learnings:
· How bots are simplifying automation creating an even bigger volumetric attack force.
· How DDoS attacks are often a smoke screen to other malware attacks happening.
· Strategies for protecting your organization against multi-layer attacks.
Recorded Oct 5 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Mazzucco, TierPoint- Chief Security Officer; Deepak Patel, Imperva - Director, Security Strategy
Presentation preview: Multi-layered online attacks: IT security strategies to protect your company

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Cybersecurity Trends for 2019 Dec 19 2018 6:00 pm UTC 60 mins
    Terry Ray, CTO, Imperva and Kim Lambert, Sr. Product Marketing Manager, Imperva
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overriding trends that we see taking center stage in 2019. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2019, including:

    -Increasing focus on compliance due to expanding data breaches
    -The business benefits of moving to the cloud
    -Using AI and machine learning to bridge staffing and skills gaps

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime Recorded: Nov 15 2018 59 mins
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    • Learn why automatic mitigation is crucial to keeping your business up and running
    • Understand the power and importance of the Incapsula 10-second DDoS SLA
    • Participate in a live Q&A with DDoS experts
  • Security Analytics: How to Identify True Risks to Your Data Recorded: Nov 8 2018 38 mins
    Sara Pan, Product Marketing, Imperva, and Shelly Hershkovitz, Product Management, Imperva
    The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies.

    Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.

    Join this webinar to learn how security analytics can help:

    • Pinpoint real threats to your apps and data
    • Prioritize the most critical incidents
    • Interpret risk in plain language
    • Provide actionable insights to contain a potential breach
  • Tech Demo: Key Features for Web Application Firewalls Recorded: Oct 17 2018 62 mins
    Shelly Hershkovitz, Product Management at Imperva; Jon Burton, Sales Engineering at Imperva
    Join to better understand key requirements needed in a web application firewall to protect applications and critical data in this changing world of application development and security.

    This webinar includes:

    - A detailed explanation of key features
    - Security technologies needed in DevOps and hybrid models
    - A demo showcasing the use of analytics to quickly reference attack campaigns
  • Tech Demo: Stop Data Breaches by Securing Along the Breach Kill Chain Recorded: Oct 9 2018 47 mins
    Shiri Margel - Machine Learning Research Manager and Sara Pan - Sr. Product Marketing Manager
    Attackers will continue to attempt to breach and steal sensitive data from organizations. Our goal is to detect those potential breaches as early as possible, before any actual harm is done. There are some early signs of data breaches. By detecting them, we can stop attackers before they find their way in. Imperva CounterBreach analyzes both user behavior and data access activity to identify suspicious user access. By adopting the concept of breach kill chain and the defense-in-depth security approach, Imperva allows you to detect threats in all stages of a data breach.

    Join this webinar to learn more about:

    - Early signs of a data breach
    - Bad practices that are likely to be exploited by attackers
    - How to improve threat detection along the data breach kill chain
    - Real life examples of breach detection using Imperva CounterBreach
    - How to investigate critical incidents that could lead to a breach
  • Trends and Challenges in Web Application Firewalls Recorded: Oct 3 2018 54 mins
    Aaron McKeown, Security Engineering @ Xero; Gil Feliciano, IT Infrastructure @ MMM Holdings; Terry Ray, CTO @ Imperva
    As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewalls to understand the latest WAF technologies, trends, and industry challenges. Hear the experiences of Imperva customers and how they implement web application firewalls to protect their enterprises.

    Join this interactive panel with security and infrastructure experts to learn more about:

    - Our analysis of the detailed results and considerations of the report
    - Trends in application development and security – DevSecOps, Analytics and Hybrid Cloud
    - Effective deployment options to meet enterprise demands
  • Data Breach: How to Identify the Early Signs Recorded: Sep 20 2018 40 mins
    Shiri Margel - Machine Learning Research Manager at Imperva
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • Detect Data Breaches without Alert Fatigue Recorded: Aug 1 2018 3 mins
    Imperva
    Data breaches are difficult to detect because security team is often drowning in alerts.
    Imperva CounterBreach uses machine learning and analytics to identify suspicious data access and prioritize threats.

    By distilling millions of alerts, Imperva allows you to focus on high-risk incidents.
  • Infrastructure DDoS Protection Analytics Demo Recorded: Aug 1 2018 5 mins
    Jonathan Gruber
    In this video, Senior Security Engineer Jonathan Gruber demos Imperva’s enhanced infrastructure DDoS protection analytics. The new dashboard shows details such as top traffic patterns by source, destination IP, port or packet size for a protected network.

    This new addition to our data analytics boosts the value of Imperva Infrastructure DDoS Protection by providing:

    •Better visibility – Understand the what, where, who, and how of an attack and gain visibility into clean traffic flow
    •Actionable intelligence for incident response - Indication of false positives / false negatives
    •And more
  • Video: Database Compliance and Security Overview Recorded: Jul 9 2018 3 mins
    Imperva
    This video provides an overview of Imperva solutions for database compliance and security. Imperva Data Activity Monitoring (DAM) and Database Firewall solutions help organizations meet data compliance requirements for SOX, GDPR, HIPAA, PCI and many more, and protect enterprise data from both internal and external threats.
  • DevOps Security Challenges and Solutions Recorded: Jun 24 2018 42 mins
    Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer
    What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks, pros and cons of RASP, and the benefits of cloud WAF. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment with Cloudentity to provide state of the art protections against application attacks.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI Recorded: Jun 21 2018 43 mins
    Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • Securing the Cryptocurrency Exchange Recorded: Jun 14 2018 59 mins
    Jonathan Gruber – Security Engineer, Imperva and Tal Stern - Enterprise Security Expert, Imperva
    Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance

    Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges makes them especially attractive to cybercriminals, attacks of late are taking exchanges by surprise, and they are often not scaled or have not built a secure environment. In this webinar, join Security Engineer Jonathan Gruber and Enterprise Security Expert Tal Stern from Imperva as they explore the latest cryptocurrency exchange vulnerabilities and attacks and explain the best strategies for mitigation.
  • Living in the GDPR World – What Now? Recorded: May 29 2018 55 mins
    Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva
    With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
  • Security in the Age of Hybrid Cloud Recorded: May 22 2018 45 mins
    Ajay Uggirala and Marty Jost — Product Marketing, Imperva
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • The GDPR World Is Upon Us! Recorded: May 22 2018 45 mins
    Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva
    With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.

    About the presenters:

    Shawn Ryan, MBA is a Senior Product Marketing Manager within the data security team at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. In developing and executing marketing strategies and content that support the company’s data security portfolio, and enabling various stakeholders and partners, Shawn keeps a close eye on global privacy and regulatory changes, and ever-evolving customer needs.

    Timothy Yim, CIPP/US/E, CIPT, CIPM, FIP, is Senior Regulatory Counsel at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. He leads Imperva’s global data privacy program and other compliance initiatives. Timothy speaks frequently on data privacy at conferences and events, and is often quoted on current privacy events by the media.
  • Video: Imperva Attack Analytics Overview Recorded: May 14 2018 3 mins
    Imperva
    Imperva Attack Analytics correlates and distills thousands of security events into a few distinct readable narratives. Attack Analytics employs artificial intelligence and machine learning to make the investigation of application security events easy, enabling ITorganizations to mitigate and respond to real security threats quickly and decisively.
  • Combating insider threats and alert fatigue Recorded: May 9 2018 44 mins
    Ziv Grinberg, Product Management and Sachi Sawamura, Product Marketing
    Join us for a short discussion and demo, as we provide an overview of how our CounterBreach behavioral analytics uses machine learning and context rich algorithms to identify the proverbial needle in the alert haystack.
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report Recorded: Apr 25 2018 58 mins
    Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Recorded: Apr 11 2018 59 mins
    Speakers: Ajay Uggirala, Product Marketing, Imperva; Brandon Dunlap, Brightfly (Moderator)
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Multi-layered online attacks: IT security strategies to protect your company
  • Live at: Oct 5 2016 6:00 pm
  • Presented by: Paul Mazzucco, TierPoint- Chief Security Officer; Deepak Patel, Imperva - Director, Security Strategy
  • From:
Your email has been sent.
or close