Hi [[ session.user.profile.firstName ]]

Best Practices for Mitigating Data Breach Risk - Imperva Part 1

Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
Recorded Mar 28 2019 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
Presentation preview: Best Practices for Mitigating Data Breach Risk - Imperva Part 1

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Lessons Learned from Analyzing 100 Data Breaches Oct 27 2021 4:00 pm UTC 54 mins
    Ofir Shaty, Data Security Researcher, Imperva and Bruce Lynch, Content Marketing Manager, Data Security, Imperva
    The best way to prepare for cybersecurity challenges is to learn the lessons of the past, without having to contend with a breach yourself.

    In this session, Imperva Data Security Research Expert Ofir Shaty will discuss his latest data security research and distill these lessons for you, giving you the insights you need to dramatically improve your security posture. Join us to learn the:
    - Root causes of the top 100 breaches and the types of data stolen
    - Step-by-step flow of some of the years most complicated breaches
    - Common mistakes most organizations make that lead to breaches
    - Profiles and tendencies of the four types of cyberattackers coming after your organization
    - Ways you can learn from the recent past to better protect your organization
  • Live DDoS Attack – Mitigation in Action Sep 23 2021 5:00 pm UTC 60 mins
    Alex Bakshtein, Principal Architect, Imperva and James Mal, Director, Global Business Development, Redwolf Security Inc
    Back by popular demand! Join Imperva DDoS Principal Architect, Alex Bakshtein and DDoS attack expert James Mal, of Redwolf Security Inc, to witness a live DDoS attack and to see the Imperva DDoS mitigation solution in action. In this webinar our speakers will explore and track the different challenges that organizations are faced with when under a DDoS attack and in the aftermath.
    In this session:

    Find out how to investigate and understand the components of a DDoS attack so that when – not if – a DDoS attack hits, you’re prepared to answer any questions that come your way.

    You will get to see the Imperva DDoS mitigation solution in action.
  • Lessons Learned from Analyzing 100 Data Breaches (APJ) Recorded: Sep 22 2021 54 mins
    Ofir Shaty, Data Security Researcher, Imperva and Bruce Lynch, Content Marketing Manager, Data Security, Imperva
    The best way to prepare for cybersecurity challenges is to learn the lessons of the past, without having to contend with a breach yourself.

    In this session, Imperva Data Security Research Expert Ofir Shaty will discuss his latest data security research and distill these lessons for you, giving you the insights you need to dramatically improve your security posture. Join us to learn the:
    - Root causes of the top 100 breaches and the types of data stolen
    - Step-by-step flow of some of the years most complicated breaches
    - Common mistakes most organizations make that lead to breaches
    - Profiles and tendencies of the four types of cyberattackers coming after your organization
    - Ways you can learn from the recent past to better protect your organization
  • Lessons Learned from Analyzing 100 Data Breaches: How to Avoid a Breach Recorded: Aug 25 2021 54 mins
    Ofir Shaty, Data Security Researcher, Imperva and Bruce Lynch, Content Marketing Manager, Data Security, Imperva
    The best way to prepare for cybersecurity challenges is to learn the lessons of the past, without having to contend with a breach yourself.

    In this session, Imperva Data Security Research Expert Ofir Shaty will discuss his latest data security research and distill these lessons for you, giving you the insights you need to dramatically improve your security posture. Join us to learn the:
    - Root causes of the top 100 breaches and the types of data stolen
    - Step-by-step flow of some of the years most complicated breaches
    - Common mistakes most organizations make that lead to breaches
    - Profiles and tendencies of the four types of cyberattackers coming after your organization
    - Ways you can learn from the recent past to better protect your organization
  • Insights on the Next Great Attack Vector- API Threats Recorded: Aug 18 2021 57 mins
    Peter Klimek, Director of Technology, Office of the CTO, Imperva and Lebin Cheng, Head of API Security, Imperva
    Your modern applications require API protection. Whether it's expanding your web offerings or enhancing your mobile services, APIs are the building blocks of your digital transformation. Either way, it is essential that all of your API endpoints are protected as soon as they are published. In our upcoming webinar, Peter Klimek, Director of Technology from the Office of CTO, and Lebin Cheng, Head of API Security, will walk through:

    ● Clearing the FUD on API Security
    ● API Security recommended best practices
    ● Edge API Security discovery & classification demo
    ● What’s next from Imperva
  • Insights on the Next Great Attack Vector- API Threats Recorded: Aug 12 2021 54 mins
    Peter Klimek, Director of Technology, Office of the CTO, Imperva and Lebin Cheng, Head of API Security, Imperva
    Your modern applications require API protection. Whether it's expanding your web offerings or enhancing your mobile services, APIs are the building blocks of your digital transformation. Either way, it is essential that all of your API endpoints are protected as soon as they are published. In our upcoming webinar, Peter Klimek, Director of Technology from the Office of CTO, and Lebin Cheng, Head of API Security, will walk through:

    ● Clearing the FUD on API Security
    ● API Security recommended best practices
    ● Edge API Security discovery & classification demo
    ● What’s next from Imperva
  • Insights on the Next Great Attack Vector- API Threats Recorded: Aug 10 2021 43 mins
    Peter Klimek, Director of Technology, Office of the CTO, Imperva and Lebin Cheng, Head of API Security, Imperva
    Your modern applications require API protection. Whether it's expanding your web offerings or enhancing your mobile services, APIs are the building blocks of your digital transformation. Either way, it is essential that all of your API endpoints are protected as soon as they are published. In our upcoming webinar, Peter Klimek, Director of Technology from the Office of CTO, and Lebin Cheng, Head of API Security, will walk through:

    ● Clearing the FUD on API Security
    ● API Security recommended best practices
    ● Edge API Security discovery & classification demo
    ● What’s next from Imperva
  • Insights on the Next Great Attack Vector- API Threats Recorded: Aug 10 2021 43 mins
    Peter Klimek, Director of Technology, Office of the CTO, Imperva and Lebin Cheng, Head of API Security, Imperva
    Your modern applications require API protection. Whether it's expanding your web offerings or enhancing your mobile services, APIs are the building blocks of your digital transformation. Either way, it is essential that all of your API endpoints are protected as soon as they are published. In our upcoming webinar, Peter Klimek, Director of Technology from the Office of CTO, and Lebin Cheng, Head of API Security, will walk through:

    ● Clearing the FUD on API Security
    ● API Security recommended best practices
    ● Edge API Security discovery & classification demo
    ● What’s next from Imperva
  • Simplifying Data Security in Modern Multi and Hybrid Cloud Environments Recorded: Aug 4 2021 63 mins
    Ron Bennatan, SVP and GM of Data Security Bruce Lynch, Content Manager for Data Security
    The cloud has revolutionized IT, offering organizations strategic opportunities to rapidly pursue new market initiatives and adapt their operations in the face of new business challenges. However, concerns about security risks and regulatory compliance are major issues that slow progress towards cloud transformation. Organizations struggle to maintain security posture across their growing database ecosystem as it expands to database as a service (DBaaS), infrastructure as a service (IaaS) and multi- and hybrid-cloud environments.

    Please join Ron Benattan and Bruce Lynch in a discussion about how Imperva helps organizations overcome these barriers to more fully realize the transformational potential of the cloud. In this webinar, you’ll learn:

    -How organizations struggle to maintain security while trying to embrace the benefits of the cloud
    -Limitations of traditional database security techniques within a diverse modern data environment
    -How Imperva’s data-centric security platform provides unified security and compliance management across an organization’s full database landscape
    -Best ways to leverage existing investments in traditional database security technologies as organizations move forward into the cloud
  • A Unified Approach to Modern Data Protection Recorded: Jul 28 2021 61 mins
    Alexei Balaganski, Lead Analyst, KuppingerCole and Ron Bennatan, SVP and General Manager, Data Security, Imperva
    Data is the lifeblood of business and government. Therefore, data breaches can be devastating in terms of disruption, damage to reputation, remediation costs, and data protection fines. But the ongoing high number of breaches shows that what many organizations are doing to protect their data is not working.
    Too many organizations rely exclusively on built-in database security controls to protect data. While essential, these controls are not enough in the face of complex data ecosystems, software vulnerabilities, and other threats. Join security experts Alexei Balaganski, Lead Analyst, KuppingerCole and Ron Bennatan, SVP and General Manager of Imperva’s Data Security business to learn why data-centric security is key. They will help you to:
    • Understand the challenges to protecting sensitive data in the digital era
    • Learn why built-in database security controls alone are not enough
    • Benefit from insights about common data protection mistakes
    • Discover the benefits of a unified approach to protecting sensitive data
    • Get answers to your questions and learn best practices for achieving effective data security
    • Find out how Imperva Sonar can help you protect your sensitive data
  • Protecting Your Digital Investments:Why App Security is More Important Than Ever Recorded: Jul 22 2021 59 mins
    Peter Klimek Director of Technology, Joe Moore Director of Technology, and Edward Roberts Director for Application Security
    As Financial institutions' online footprint grows so does their data. Application security can become an afterthought which leaves opening for attackers. Imperva is the global leader in application security, protecting your edge and all paths to your data. We are the only application security platform to offer WAF, DDOS, BOT, CSP, API, and RASP; with the analytics to help you make sense of all the noise.

    Join Cyber Security Experts Peter Klimek, Joe Moore, and Edward Roberts as they discuss:
    - The rise in targeted DDoS attacks and how to mitigate
    - DevOps and the migration to the cloud
    - The future of security in Financial sector with the rise in Open Banking and APIs
  • How to Migrate to AWS Lambda Without Overlooking Security Recorded: Jul 15 2021 55 mins
    Kunal Anand, CTO, Imperva and Peter Klimek, Director of Technology, Imperva
    In today’s competitive landscape, enterprises look to develop applications at a swift pace, making AWS Lambda a great platform for accelerating production. However, organizations must be able to protect against new attack vectors on serverless functions, all while keeping up with the speed of development.
    In this webinar, we will cover:

    What it means to adopt serverless technology
    Why organizations need to secure their serverless functions
    How to secure your transition to AWS Lambda

    Join Imperva Chief Technical Officer, Kunal Anand, and Director of Technology, Peter Klimek, to discover how to gain comprehensive visibility and automated mitigation over your AWS Lambda functions at no cost to your organization, until the end of 2021.
  • Data Privacy: What you need to know in 2021 Recorded: Jul 14 2021 62 mins
    Terry Ray, SVP and Imperva Fellow, Imperva
    Customers, governments, and enterprises have become more sensitive than ever about Personal Identification Information (PII) - where it resides, who has access to it, and what is done with it. As a result, regulatory bodies at all levels of government are making enterprises that keep customer PII more accountable for securing it and enabling customers to have more control over it.

    In most enterprises, the people responsible for successful regulatory audits do not choose or implement the data privacy technology solutions that make it easy and fast to ensure compliance. There is often lack of communication and technology gaps that if left unaddressed can become very costly. In this webinar, Imperva’s data privacy experts will:
    - Explain the main data privacy challenges facing most organizations in 2021
    - Help you understand common elements of the most important data privacy regulations for specific industries, nations, regions and states
    - Show why good data discovery and classification tools are critical factors in achieving effective data privacy
    - Articulate Imperva’s current, medium-term, and long-term strategic vision for helping enterprises master data privacy
    - Offer a way for you to assess the status of your existing data privacy posture and suggest how to improve it
  • Working too DAM hard on your Guardium installation? Imperva can help (APJ) Recorded: Jul 7 2021 50 mins
    David Valovcin, Senior Director, Global Data Security & Bruce Lynch, Content Marketing Manager, Data Security, Imperva
    Current demands have likely pushed your Guardium Database Activity Monitoring (DAM) program to its limits. As your data volume grows, core functionality like reporting and long term data retention have become increasingly complex and difficult to scale. Join this webinar to learn how to fix these problems and extend the reach of your Guardium investment with a little help from Imperva.

    Prior to joining Imperva, our speaker Dave was part of the original executive team at Guardium and has spent the last 10 years working with Guardium clients as part of IBM Security. He and our other data security experts will share tactics and strategies that can help you:
    - Run super-fast, real-time reports and forensic analysis across all sensors
    - Meet any data retention requirement cost-effectively
    - Turn days of work into minutes and automate manual processes that overload your staff
    - Speed the onboarding of new databases and gain agentless support for cloud
    - Extend monitoring to address data security and privacy use cases

    Imperva solutions for IBM Guardium will help you reduce complexity, close critical monitoring gaps, and significantly improve the security and compliance outcomes delivered by your Guardium solution.
  • Attaque DDoS en direct - La réponse en action Recorded: Jul 6 2021 53 mins
    Nicolas Drémont
    Regardez une attaque DDoS en direct et découvrez comment les arrêter dans ce nouveau webinaire. Des experts en matière d’attaques DDoS d’Imperva expliqueront les enjeux que rencontrent les organisations comme la vôtre pendant et après une attaque.

    Dans ce webinaire, vous découvrirez :

    Comment examiner les composants d’une attaque DDoS
    Ce que vous devez faire pour être préparé à toute question relative à l’attaque
    Un aperçu de la solution d’atténuation des attaques DDoS d’Imperva en action
  • Bad Bots are the Pandemic of the Internet Recorded: Jul 1 2021 60 mins
    Sandy Carielli, Principal Analyst, Forrester and Edward Roberts, Dir. Marketing Strategy for Application Security, Imperva
    More than one quarter of all web requests originate from bad bots that threaten your business by targeting your websites, mobile apps and APIs. They engage in price scraping, credential stuffing, scalping, credit card fraud and other attacks. As internet usage surged during the pandemic, bot operators became more active than ever. Data gathered from Imperva's annual Bad Bot Report, prepared by its Threat Research Labs, explores what bad bots are doing, and why you should be concerned.
     
    Join Imperva and our guest, a Forrester Principal Analyst, to find out more about the bot problem and understand the latest findings from the Bad Bot Report 2021.
     
    Key takeaways will include:
    • How Forrester is seeing the bot problem and the solutions available to you
    • An analysis of the current bot landscape as Imperva sees it, supported by data from our annual Bad Bot Report 2021

    • How bad bot operators have been leveraging the pandemic to make a profit.
    • Recommendations from Imperva on how to enhance your security posture and protect against bad bots with the Advanced Bot Protection solution
  • Canada's Cybersecurity Predictions: Where Do We Go From Here? Recorded: Jun 24 2021 47 mins
    Luke Babarinde Principle Architect, Manny Liwanag Principal Engineer, Bruce Lynch, Product and Content Marketing Manager
    2020 proved to be a year of global disruption on a variety of levels. As a result, IT professionals were forced to quickly reprioritize their approach to cyber and data security. Now, in the middle of 2021, security leaders must continue to adapt to the changing landscapes that are impacting organizations’ data security strategy and posture.
    Please join top Canadian security experts from Imperva, Luke Babarinde and Manny Liwanag, as they provide key trends, insights and examples to consider in 2021-2022:
    · Digital transformation projects implode into data security liabilities
    · Privacy and compliance - preparing for C-11
    · The maturity of 5G and expansion of IoT fuels botnet armies
    · Microservices and serverless computing become a playground for cybercriminals
    · API security and the implications on companies transitioning security models
  • Your Supply Chain is Broken, But Not for Long Recorded: Jun 23 2021 59 mins
    Chris Prevost, Director of Emerging Technology Group, Imperva and William Houcheime, Product Marketing Manager, Imperva
    When an organization adopts third-party or open source code, it can unwittingly accept an extraordinary amount of risk originating upstream in its supply chain. As we saw in 2020, a major supply chain attack caused 18,000 SolarWinds customers, including Fortune 500 companies and multiple US government agencies, to install updates that left them vulnerable to a breach. In this webinar, Chris Prevost, Imperva’s Director of Emerging Technology Group, will walk us through:

    • The nature of a supply chain attack
    • The various ways these breaches can occur
    • How RASP mitigates vulnerabilities in your third-party
    applications and open source libraries
  • Working too DAM hard on your Guardium installation? Imperva can help Recorded: Jun 16 2021 50 mins
    David Valovcin, Senior Director, Global Data Security & Bruce Lynch, Content Marketing Manager, Data Security, Imperva
    Current demands have likely pushed your Guardium Database Activity Monitoring (DAM) program to its limits. As your data volume grows, core functionality like reporting and long term data retention have become increasingly complex and difficult to scale. Join this webinar to learn how to fix these problems and extend the reach of your Guardium investment with a little help from Imperva.

    Prior to joining Imperva, our speaker Dave was part of the original executive team at Guardium and has spent the last 10 years working with Guardium clients as part of IBM Security. He and our other data security experts will share tactics and strategies that can help you:
    - Run super-fast, real-time reports and forensic analysis across all sensors
    - Meet any data retention requirement cost-effectively
    - Turn days of work into minutes and automate manual processes that overload your staff
    - Speed the onboarding of new databases and gain agentless support for cloud
    - Extend monitoring to address data security and privacy use cases

    Imperva solutions for IBM Guardium will help you reduce complexity, close critical monitoring gaps, and significantly improve the security and compliance outcomes delivered by your Guardium solution.
  • Vous protéger contre l’usurpation d’identité et fuites de données Recorded: Jun 11 2021 64 mins
    Eric Guillotin – Sr Sales Engineer, Imperva Nicolas Drémont – Sr Sales Engineer, Imperva
    Des milliers d'entreprises sont attaquées en silence chaque jour par des cybercriminels qui cherchent à compromettre les comptes personnels de vos utilisateurs en utilisant des attaques plus ou moins sophistiquées, ou, plus efficacement, en utilisant tout simplement des identifiants volés.

    Une fois authentifiés, les cybercriminels ont immédiatement accès aux informations sensibles des clients, telles que des informations personnelles, des informations de paiement, des dossiers médicaux ou encore des récompenses de programmes de fidélisation.

    Une autre stratégie consiste à usurper les codes tiers utilisés par vos développeurs afin de détourner les informations saisies par les utilisateurs sur vos applications. Cette pratique est généralement peu visible des équipes de sécurité.
    Dans les deux cas, les conséquences de ces attaques peuvent avoir des impacts significatifs sur votre métier et l’image de votre entreprise : perte de revenu, perte de confiance des utilisateurs, fuite de données sensibles, augmentation des fraudes et des appels au service client, etc.

    Lors d’une présentation d’une heure, nous ferons la démonstration des deux solutions suivantes afin de réduire les risques décrits précédemment :
    - Client Side Protection : Protection des codes tiers utilisés sur vos sites dans le but de réduire les risques de fuites de données sensibles
    - Account Takeover : Protection des espaces personnels contre l’utilisation d’identifiants volés
Imperva Cyber Security Webinars
Imperva is a leading provider of cyber security solutions that protect business-critical data and applications in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Mitigating Data Breach Risk - Imperva Part 1
  • Live at: Mar 28 2019 5:00 pm
  • Presented by: Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close