Hi [[ session.user.profile.firstName ]]

Video: Bo Knows Security

When it comes to building a security program, focusing only on technology and processes puts organizations in a weak and unbalanced position. People need to be equally factored in—and that’s where culture comes in. Listen as Bo talks about the importance of a strong security culture and walks through four essential components needed to build one.
Recorded Nov 9 2017 8 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bo Kim, Head of Information Security at Imperva
Presentation preview: Video: Bo Knows Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Tech Demo: Key Features for Web Application Firewalls Oct 17 2018 3:00 pm UTC 60 mins
    Shelly Hershkovitz, Product Management at Imperva; Jon Burton, Sales Engineering at Imperva
    Join to better understand key requirements needed in a web application firewall to protect applications and critical data in this changing world of application development and security.

    This webinar includes:

    - A detailed explanation of key features
    - Security technologies needed in DevOps and hybrid models
    - A demo showcasing the use of analytics to quickly reference attack campaigns
  • Tech Demo: Stop Data Breaches by Securing Along the Breach Kill Chain Oct 9 2018 3:00 pm UTC 60 mins
    Shiri Margel - Machine Learning Research Manager and Sara Pan - Sr. Product Marketing Manager
    Attackers will continue to attempt to breach and steal sensitive data from organizations. Our goal is to detect those potential breaches as early as possible, before any actual harm is done. There are some early signs of data breaches. By detecting them, we can stop attackers before they find their way in. Imperva CounterBreach analyzes both user behavior and data access activity to identify suspicious user access. By adopting the concept of breach kill chain and the defense-in-depth security approach, Imperva allows you to detect threats in all stages of a data breach.

    Join this webinar to learn more about:

    - Early signs of a data breach
    - Bad practices that are likely to be exploited by attackers
    - How to improve threat detection along the data breach kill chain
    - Real life examples of breach detection using Imperva CounterBreach
    - How to investigate critical incidents that could lead to a breach
  • Trends and Challenges in Web Application Firewalls Oct 3 2018 8:00 pm UTC 60 mins
    Aaron McKeown, Security Engineering @ Xero; Gil Feliciano, IT Infrastructure @ MMM Holdings; Terry Ray, CTO @ Imperva
    As the web application landscape changes, so do the threats, as well as the tools used for application security and critical data protection. Learn about our analysis of key insights from the new 2018 Gartner Magic Quadrant for Web Application Firewalls to understand the latest WAF technologies, trends, and industry challenges. Hear the experiences of Imperva customers and how they implement web application firewalls to protect their enterprises.

    Join this interactive panel with security and infrastructure experts to learn more about:

    - Our analysis of the detailed results and considerations of the report
    - Trends in application development and security – DevSecOps, Analytics and Hybrid Cloud
    - Effective deployment options to meet enterprise demands
  • Data Breach: How to Identify the Early Signs Recorded: Sep 20 2018 40 mins
    Shiri Margel - Machine Learning Research Manager at Imperva
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • Detect Data Breaches without Alert Fatigue Recorded: Aug 1 2018 3 mins
    Imperva
    Data breaches are difficult to detect because security team is often drowning in alerts.
    Imperva CounterBreach uses machine learning and analytics to identify suspicious data access and prioritize threats.

    By distilling millions of alerts, Imperva allows you to focus on high-risk incidents.
  • Securing the Cryptocurrency Exchange Recorded: Jun 14 2018 59 mins
    Jonathan Gruber – Security Engineer, Imperva and Tal Stern - Enterprise Security Expert, Imperva
    Securing the Cryptocurrency Exchange: Ensuring Protection, Availability, and Performance

    Now, more than ever, cryptocurrency exchanges are facing security threats in the form of volumetric, application layer, DDoS, and account takeover (ATO) attacks. Although the success of cryptocurrency exchanges makes them especially attractive to cybercriminals, attacks of late are taking exchanges by surprise, and they are often not scaled or have not built a secure environment. In this webinar, join Security Engineer Jonathan Gruber and Enterprise Security Expert Tal Stern from Imperva as they explore the latest cryptocurrency exchange vulnerabilities and attacks and explain the best strategies for mitigation.
  • Living in the GDPR World – What Now? Recorded: May 29 2018 55 mins
    Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva
    With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
  • Security in the Age of Hybrid Cloud Recorded: May 22 2018 45 mins
    Ajay Uggirala and Marty Jost — Product Marketing, Imperva
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • The GDPR World Is Upon Us! Recorded: May 22 2018 45 mins
    Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva
    With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.

    About the presenters:

    Shawn Ryan, MBA is a Senior Product Marketing Manager within the data security team at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. In developing and executing marketing strategies and content that support the company’s data security portfolio, and enabling various stakeholders and partners, Shawn keeps a close eye on global privacy and regulatory changes, and ever-evolving customer needs.

    Timothy Yim, CIPP/US/E, CIPT, CIPM, FIP, is Senior Regulatory Counsel at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. He leads Imperva’s global data privacy program and other compliance initiatives. Timothy speaks frequently on data privacy at conferences and events, and is often quoted on current privacy events by the media.
  • Live DDoS Attack: How to Mitigate the Threat and Avoid Downtime Recorded: May 2 2018 61 mins
    Andy Shoemaker, founder of DDoS testing company NimbusDDOS
    Are you relying on manual DDoS mitigation methods? How can waiting minutes to mitigate a DDoS attack impact your business? Watch as Andy Shoemaker, founder of DDoS testing company NimbusDDOS, gives you a look behind the curtains of a live DDoS attack. Then see first-hand how Imperva Incapsula automatically blocks the threat without impacting the user experience.

    In this webinar you will:
    •Learn why automatic mitigation is crucial to keeping your business up and running
    •Understand the power and importance of the Incapsula 10-second DDoS SLA
    •Participate in a live Q&A with DDoS experts
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report Recorded: Apr 25 2018 58 mins
    Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Recorded: Apr 11 2018 59 mins
    Speakers: Ajay Uggirala, Product Marketing, Imperva; Brandon Dunlap, Brightfly (Moderator)
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
  • Protect Your Web Applications from Cryptomining Recorded: Mar 28 2018 44 mins
    Gilad Yehudai – Security Researcher, Imperva and Nadav Avital – Threat Research Team Leader, Imperva
    Protect Your Web Applications from Cryptomining: The New Force Behind Remote Code Execution Attacks

    Remote code execution (RCE) attacks involving cryptomining malware are gaining momentum. They've become attackers' new favorite way to exploit vulnerabilities in web application source code and are prevalent in over 88% of all RCE attacks. In this webinar, join Security Researcher Gilad Yehudai and Threat Research Team Leader Nadav Avital as they analyze malicious cryptomining script, investigate methods these attackers use to make money, and explain how Imperva WAF solutions are equipped to mitigate the threat.
  • Briefings Part 2: Top Three Ways To Tackle API Security Recorded: Mar 22 2018 60 mins
    Speaker: Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap, Moderator
    Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to protect these APIs from attacks. Join Imperva and (ISC)2 for Part 2 of our Security Briefings series on March 8, 2018 at 1:00PM Eastern where we will discuss proven approaches to making API security a priority through understanding how common types of attacks such as distributed denial of service (DDoS) can target APIs, what are the steps to proactively secure development frameworks, and how to enforce identity across enterprise environments.
  • Part 1: March of the Bots: How to Deal with the Onslaught Recorded: Mar 7 2018 60 mins
    Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator)
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.

    Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 2 Recorded: Jan 30 2018 78 mins
    Dr. Branden Williams, with Timothy Yim, Imperva; Barbara Cosgrove, Workday; Sue Habas, ASG; and Naheed Bleecker, TrustArc.
    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Top 5 Cybersecurity Trends for 2018 Recorded: Jan 23 2018 56 mins
    Terry Ray, CTO, Imperva
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2018, including:
    · The impending arrival of massive cloud data breaches
    · The growth of crypto-currency mining attacks
    · Malicious use of AI and AI deception
    · Cyber extortion's increasing focus on business disruption
    · The evolution of insider breaches

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
  • Gartner Report - Web App Firewalls and Protecting Your Critical Data Recorded: Nov 13 2017 58 mins
    Morgan Gerhart - VP Prod. Mktg for Imperva; Rob McCurdy, CIO of Mich. St. Univ.; Darío Herrera, CTO of Sm4rt Security
    The new 2017 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will cover:
    * Detailed results and considerations of the report
    * Effective deployment options to meet enterprise demands
    * Success stories and implementation options you can leverage within your own environment

    Join us to hear Morgan Gerhart, Vice President of Product Marketing at Imperva, discuss the Gartner MQ for WAF with:

    *Rob McCurdy, CIO of Michigan State University
    *Darío Eduardo Herrera Yáñez, CTO of Sm4rt Security Services
  • Video: Bo Knows Security Recorded: Nov 9 2017 8 mins
    Bo Kim, Head of Information Security at Imperva
    When it comes to building a security program, focusing only on technology and processes puts organizations in a weak and unbalanced position. People need to be equally factored in—and that’s where culture comes in. Listen as Bo talks about the importance of a strong security culture and walks through four essential components needed to build one.
  • Talking to Your Developer about Security (Cloud Migration Series Part 3) Recorded: Nov 9 2017 52 mins
    Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap (Moderator)
    More and more enterprises are moving their applications into public and private cloud infrastructure. The cloud is becoming more appealing for enterprises as it facilitates business growth due its agility, resiliency and scalability. The advent of a variety of technologies and processes such as containers, micro-services, and DevOps has made rolling out new applications into the cloud very quick and desirable for development teams. Join Imperva and (ISC)2 for an examination of how enterprises move applications to the cloud without forgetting to put security first.
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Video: Bo Knows Security
  • Live at: Nov 9 2017 7:25 pm
  • Presented by: Bo Kim, Head of Information Security at Imperva
  • From:
Your email has been sent.
or close