Hi [[ session.user.profile.firstName ]]

Top Cyber Security Trends for 2017

CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

· What top 3 cyber security trends will have the largest impact in 2017
· Why cyber attacks are on the rise and multiplying quickly
· How to combat the increasing number of breaches
· What to consider in building a security plan that is right for your organization
Recorded Jan 19 2017 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amichai Shulman, CTO and Co-Founder, Imperva
Presentation preview: Top Cyber Security Trends for 2017

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Gartner Report - Web App Firewalls and Protecting Your Critical Data Recorded: Nov 13 2017 58 mins
    Morgan Gerhart - VP Prod. Mktg for Imperva; Rob McCurdy, CIO of Mich. St. Univ.; Darío Herrera, CTO of Sm4rt Security
    The new 2017 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will cover:
    * Detailed results and considerations of the report
    * Effective deployment options to meet enterprise demands
    * Success stories and implementation options you can leverage within your own environment

    Join us to hear Morgan Gerhart, Vice President of Product Marketing at Imperva, discuss the Gartner MQ for WAF with:

    *Rob McCurdy, CIO of Michigan State University
    *Darío Eduardo Herrera Yáñez, CTO of Sm4rt Security Services
  • Video: Bo Knows Security Recorded: Nov 9 2017 8 mins
    Bo Kim, Head of Information Security at Imperva
    When it comes to building a security program, focusing only on technology and processes puts organizations in a weak and unbalanced position. People need to be equally factored in—and that’s where culture comes in. Listen as Bo talks about the importance of a strong security culture and walks through four essential components needed to build one.
  • Talking to Your Developer about Security (Cloud Migration Series Part 3) Recorded: Nov 9 2017 52 mins
    Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap (Moderator)
    More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
  • Security Across Cloud Platforms (Cloud Migration Series Part 2) Recorded: Nov 2 2017 60 mins
    Nabeel Saeed, Imperva; Brandon Dunlap (Moderator)
    With the proliferation of cloud deployment options and platforms, management of application security across platforms has become a major problem for security teams. In this webinar, we address challenges posed by cloud proliferation, and how to approach development of a consistent security posture across platforms to better manage risks.
  • Rethinking Security for Hybrid Environments (Cloud Migration Series Part 1) Recorded: Oct 26 2017 58 mins
    Bo Kim, Sr. Dir. of Info. Sec., Imperva; Alok Shukla, Sr. Dir. of Prod. Mgmt., Imperva; Brandon Dunlap (Moderator)
    As more workloads are moved to cloud infrastructure, unique security challenges arise. Join Imperva and (ISC)2 for this webinar where we'll discuss some of the tradeoffs for on-prem and cloud app security, strategies for approaching security in hybrid environments, and the importance of flexible deployment models.
  • Surviving a CISO Transition in the Age of Breaches Recorded: Sep 26 2017 56 mins
    Shahar Ben-Hador - CISO; Bo Kim - Sr. Dir. Information Security; Paul Steen - Vice President, Global Product Strategy
    How to make sure a CISO's work isn't dumped when they leave.

    A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:

    * Building a transition timeline
    * Evaluating which projects should be completed and which handed off
    * Determining where to draw the line on investments

    About the Speakers:

    Shahar Ben-Hador, CISO, Imperva

    As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.

    Bo Kim, Sr. Dir. Information Security, Imperva

    Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
  • How to Choose Your Next Database Audit Solution Recorded: Aug 22 2017 64 mins
    Terry Ray, Chief Technology Officer at Imperva
    Data is the lifeblood of today's business. As the volume of generated data continues to grow, so does the number of data breaches. It's more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

    What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.

    About the Presenter:

    Terry Ray is the Chief Technology Officer for Imperva, Inc., the leading provider of data security solutions. Terry works directly with Imperva’s largest customers to educate on industry best practices, challenges and regulations. He also, operates as an executive sponsor to strategic customers who benefit from a bridge between both company’s executive teams. During his 12 years at Imperva, he has deployed hundreds of data security solutions to meet the requirements of customers and regulators from every industry. Terry is a frequent speaker for RSA, ISSA, OWASP, ISACA, Gartner, IANS and other professional security and audit organizations in the Americas and abroad.
  • GDPR and What It Means for Security Teams Recorded: Aug 17 2017 37 mins
    Cheryl Tang, Director Data Security Products, Imperva
    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

    Join us to learn:

    - What is GDPR
    - Deep dive into relevant data security articles of the GDPR
    - Review how different technology can address some of the GDPR data security requirements
  • CISO's Tough Decision: Security On-Prem, Cloud or Both? Recorded: Jun 8 2017 51 mins
    Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist
    Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Nabeel Saeed, Cloud Security Evangelist for a lively interactive session that will discuss:

    •How to secure your company’s cloud expansion
    •Which assets should be hosted in the cloud vs. on-prem
    •What pace you should be moving at to reach your end goal
    •How to maximize flexibility and performance for IT operations with cloud security
  • Insights from CyberEdge’s 2017 Cyberthreat Defense Report Recorded: Mar 30 2017 57 mins
    Mark Bouchard, COO, CyberEdge and Ajay Uggirala, Director of Product Marketing, Imperva
    You know the bad guys are up to no good but do you know how your current cyber security defensive posture stacks up against those of your peers. In this live webinar, CyberEdge and Imperva will discuss key insights from the 2017 CyberThreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How does our security spend compare to other organizations?
    •How are my peers thinking differently about cyberthreats and their defenses?
    •Which security technologies should we be investing in next?
  • How Not to Get Fired as a CISO Recorded: Mar 2 2017 55 mins
    Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Top Cyber Security Trends for 2017 Recorded: Jan 19 2017 58 mins
    Amichai Shulman, CTO and Co-Founder, Imperva
    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    · What top 3 cyber security trends will have the largest impact in 2017
    · Why cyber attacks are on the rise and multiplying quickly
    · How to combat the increasing number of breaches
    · What to consider in building a security plan that is right for your organization
  • Technical Deep Dive: How to Detect and Mitigate Ransomware Recorded: Dec 13 2016 36 mins
    Carrie McDaniel, Sr. Product Marketing Manager Elad Erez, File Security Innovation and Development, Imperva
    Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.
  • Defend Against the Data Miner for Financial Services Recorded: Nov 9 2016 53 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva, Cheryl Tang, Director of Product Marketing
    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:
    - How behavior analysis and deception technology identify insider threats
    - Why data activity monitoring provides comprehensive coverage
    - Why a proactive approach with visibility can quickly stop data miners
  • Unedited: Tales, Tips and Technologies from a Security Company CISO Recorded: Nov 3 2016 48 mins
    Shahar Ben-Hador, Chief Information Security Officer; Paul Steen, Senior Director, Global Security Strategist
    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:
    · Humorous security tales and repercussions of employee behaviors
    · Tips to deal with employees, execs and board members
    · Security technology recommendations that work best across a security stack

    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.
  • Imperva Incapsula Secures and Protects Google Cloud Customers Recorded: Oct 12 2016 52 mins
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google; Vineet Bhan, Dir. of Business Development, Imperva Incapsula
    Almost 50% of DDoS attacks last 6-24 hours. The cost of an average attack is around $500,000, with many costing even more. Some can last for weeks, leaving websites and apps unavailable to customers. With statistics like these, you can’t afford to take chances with your security.
    More companies are migrating to the cloud for its benefits. While cloud security is better, protecting your website is still your responsibility. If you use the cloud, a new collaboration between Google Cloud Platform (GCP) and Incapsula offers improved visibility and security for your websites.
    Find out how you can benefit from this collaboration when you register for a free webinar that explains how GCP and Incapsula will keep your websites safe.

    GCP takes on the burden of managing infrastructure, provisioning servers, and configuring networks, so you can focus on your business. A future-proof infrastructure, powerful data and analytics and a no-ops platform allow you to grow your business.

    Incapsula provides managed and consistent security policies across multiple locations for cloud environments. Its resilient global cloud network offers protection for web, DNS, network devices, and application servers.

    The webinar covers:
    • GCP capabilities
    • How Incapsula complements GCP with website security, DDoS mitigation and global Load balancing
    • Three commonly used Incapsula deployment models for GCP customers

    Speakers:
    Vineet Bhan, Director of Business Development, Incapsula
    Andy Chang, Sr. Product Manager, Cloud Security & Risk, Google

    And for attending this webinar, new GCP and Incapsula customers will get a $500 credit each toward the services.
    Register today and find out how to protect your website assets against a DDoS attack.
  • Defend Against the Data Miner Recorded: Sep 29 2016 40 mins
    Paul Steen, Global Security Strategist, Imperva; Cheryl O'Neill, Product Marketing Director, Data Security
    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    · Learn how to accurately identify and track insider threats.
    · Understand how data activity monitoring can detect and stop suspicious behavior
    ·  Reduce security alert noise and provide actionable context for security incidents
  • More Healthcare Cyber Threats; More HIPAA Enforcement: No Place to Hide Recorded: Sep 27 2016 51 mins
    Craig Shumard, former CISO, CIGNA; John Shepard,Connecticut Children Hospital; Jeff Trudeau, Sutter Health
    Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:
    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing.

    The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
  • Gartner MQ for Web App Firewall Recorded: Sep 7 2016 66 mins
    Terry Ray, Imperva Chief Product Strategist at Imperva
    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will discuss:

    - Detailed results and considerations of the report
    - Effective deployment options to meet enterprise demands
    - Success stories and implementation options you can leverage within your own environment
    - Sign up for this webinar today to hear Terry Ray, Imperva Chief Product - - - Strategist at Imperva, discuss the Gartner MQ for WAF.
  • How to Accurately Identify Compromised Insiders Recorded: Jul 20 2016 49 mins
    Sagi Dulce, Team Lead, Insider Threat Research, Imperva & Carrie McDaniel, Sr. Product Marketing Mgr, Imperva
    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months.

    Attend this webinar to:
    •Learn how to accurately identify insider threats and protect enterprise data
    •Discover a multi-layered approach to identify compromised users
    •Gain insight into the latest developments in deception technology
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top Cyber Security Trends for 2017
  • Live at: Jan 19 2017 6:00 pm
  • Presented by: Amichai Shulman, CTO and Co-Founder, Imperva
  • From:
Your email has been sent.
or close