Hi [[ session.user.profile.firstName ]]

Why Cyber Monday attacks cost up to $3.4M per hour in losses

The holiday season is approaching and for cyber criminals, this period is typically a feeding frenzy to hunt and exploit vulnerable businesses and employees. The statistics are staggering:

– 64% of organizations report an increase in cyber-crime on cyber Monday*
– 30 million malicious tweets are sent daily*
– Phishing links skyrocket by around 336% during Thanksgiving**
– Organizations get hit with losses of about $500k per hour when compromised***

The overall cost to an organization, including damages to reputation and brand, can be as high as $3.4M per hour. And yet, only 70% of companies take extra precautions in anticipation of these higher risks.*** How confident are you that your employees will not be used as a Trojan horse to compromise more sensitive company information?

Join Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc., for a compelling webcast that will address:

– 5 key ways cyber criminals will target your employees and infiltrate your organization
– Key insights into holiday activity from Zscaler’s Security-as-Service platform
– Tell-tale signs that you have been compromised
– Guidelines and best practices to stay safe this holiday period

*Inc. - How Hackers Will Attack on Cyber Monday
**Huffington Post Tech - Five Ways You'll Be Hacked on Cyber Monday
***Computer Business Review - Cyber Monday attacks could cost organizations up to $3.4m per hour
Recorded Nov 19 2015 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
Presentation preview: Why Cyber Monday attacks cost up to $3.4M per hour in losses

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Office 365 is all the rage - but is your network ready? Recorded: Jul 27 2016 62 mins
    Manoj Apte, Senior Vice President of Product Management, Zscaler, Inc.
    Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:

    1. Increased network bandwidth usage
    2. Slow traffic & poor user experience
    3. Increased security headaches
    4. Mobile security
    5. Visibility & compliance
    6. Limitations of traditional on-premise security appliances

    Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:

    Key considerations to be aware of before you deploy Office 365
    Why security appliances cannot address these challenges effectively
    Best practices for addressing these issues using a cloud based security solution
  • Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways Recorded: Jul 14 2016 55 mins
    Atri Chatterjee
    According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. This webcast provides deep insights into Gartner's findings that are relevant for CISO's and CIO's.
  • The Next Generation CISO Recorded: Dec 16 2015 58 mins
    Michael Sutton, CISO, Zscaler, Inc.
    Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.

    According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
    1. What are the new and emerging trends?
    2. What is the plan and how to progress against it?
    3. What is the comparison against peers?
    4. What is the gap from the ideal and the consequences?

    Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*

    Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:

    · The emerging trends in cyber-security CISO’s need to be aware of
    · As a CISO, how best to address the 4 key questions
    · The latest methods cyber-criminals use to infiltrate organizations
    · Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment

    *Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
  • Why Cyber Monday attacks cost up to $3.4M per hour in losses Recorded: Nov 19 2015 36 mins
    Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
    The holiday season is approaching and for cyber criminals, this period is typically a feeding frenzy to hunt and exploit vulnerable businesses and employees. The statistics are staggering:

    – 64% of organizations report an increase in cyber-crime on cyber Monday*
    – 30 million malicious tweets are sent daily*
    – Phishing links skyrocket by around 336% during Thanksgiving**
    – Organizations get hit with losses of about $500k per hour when compromised***

    The overall cost to an organization, including damages to reputation and brand, can be as high as $3.4M per hour. And yet, only 70% of companies take extra precautions in anticipation of these higher risks.*** How confident are you that your employees will not be used as a Trojan horse to compromise more sensitive company information?

    Join Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc., for a compelling webcast that will address:

    – 5 key ways cyber criminals will target your employees and infiltrate your organization
    – Key insights into holiday activity from Zscaler’s Security-as-Service platform
    – Tell-tale signs that you have been compromised
    – Guidelines and best practices to stay safe this holiday period

    *Inc. - How Hackers Will Attack on Cyber Monday
    **Huffington Post Tech - Five Ways You'll Be Hacked on Cyber Monday
    ***Computer Business Review - Cyber Monday attacks could cost organizations up to $3.4m per hour
  • Cyber Security is now a Boardroom Agenda Recorded: Oct 20 2015 45 mins
    Kevin Peterson, Director of Security & Network Transformation, Zscaler & Mark Stafford, Senior Cyber Consultant, BT Security
    Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:

    - Brand damage due to customer loss
    - Loss of competitive advantage due to corporate espionage
    - High cost of responding to a breach

    How prepared is your organization to handle a security breach and discuss this in the boardroom?

    This webcast will address cyber security priorities being discussed at the boardroom level, including:

    - Managing security risk in today’s digital world
    - Securely leveraging key technologies such as cloud, mobile and analytics
    - Addressing security gaps across the ecosystem of customers and suppliers
    - Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities

    *NYSE/Veracode 2015 Survey: Cybersecurity in the Boardroom
    **Forrester Inc., Report: Security Leaders, Earn Your Seat At The Table
  • The Internet of Things (IoT): Critical risks for all enterprises Recorded: Aug 26 2015 60 mins
    Patrick Foxhoven, VP & CTO of Emerging Technologies at Zscaler and Frank Gillett, VP Principal Analyst at Forrester Research
    A recent report by Forrester Research identified security as being the "top concern" for enterprise technology and business decision-makers for IoT*. While the Internet of Things offers great potential for businesses to create new services and improve operational efficiencies, it offers a greater potential for security breaches.

    Join us for a compelling webcast that will walk you through the latest security insights for combating IoT risks.

    We will also discuss:
    - Key trends driving IoT
    - Vulnerabilities within your organization that you need to be aware of
    - The latest strategies and techniques cyber-criminals are using today
    - What your organization can do to address these security risks
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Lessons Learned From the Biggest Security Breaches Recorded: Jul 28 2015 58 mins
    Michael Sutton, VP of Security Research at Zscaler,John Kindervag, VP and Principal Analyst at Forrester Research
    The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • Stopping Zero-day Threats Recorded: Jul 23 2015 56 mins
    Dan Maier, Senior Director of Product Marketing, Zscaler Inc.
    If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • Do you know where your next cyber security threat is likely to come from? Recorded: Jun 18 2015 60 mins
    Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
    The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness".

    Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks:

    - Naive and disgruntled end-users
    - The disappearance of the corporate perimeter
    - Mobile devices becoming ideal entry points
    - Lack of layered defenses
  • Cloud-Based Cyber Threat Protection Recorded: May 28 2015 5 mins
    Jay Chaudhry, CEO and founder, Zscaler, Inc.
    Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. Zscaler is currently the only one that protects against cyber threats with a totally cloud-based solution.
  • Zscaler Customer Case Study: United Airlines Recorded: Feb 10 2015 10 mins
    Michael Kennaugh, VP of IT Business Management at United Airlines
    "With Zscaler, we have found a product that is that powerful" -United Airlines

    Learn why United Airlines relies on Zscaler to address some of their toughest security challenges.
  • Even The Big Guys Get Hacked Recorded: Feb 9 2015 39 mins
    Michael Sutton, VP of Security Research at Zscaler
    Visibility & Control Are The Keys To Combating Data Breaches

    If Target Corporation, Neiman Marcus, Google and Yahoo can fall victim to security breaches – no organization is immune to being hacked. And the stakes are high – often involving:

    - Consumer privacy issues
    - Company reputation
    - Financial loss
    - Intellectual property theft

    Today's cyber attacks are sophisticated, often combining social engineering and zero-day exploits for infection. The key to combating advanced persistent threats is having "real-time visibility" and "intelligent insight" into your corporate infrastructure. This also includes the ability to track employee traffic across your corporate infrastructure in real time and derive meaningful data for fast corrective action.

    This webinar will discuss the latest challenges, trends and critical requirements to combat advanced cyber threats. A specific focus will be on how timely visibility drives Detection, Remediation and Protection.
  • Real Clouds, Fake Clouds And Appliances Recorded: Jan 13 2015 51 mins
    Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler Inc.
    The Facts, Myths & FUD's for Enterprise Security

    Many incumbent security vendors offer old, appliance-based technology and fake clouds – all touting to deliver the true benefits of an authentic cloud based enterprise security solution. Facts have been distorted, myths created, and the truth "clouded" in fantasy.

    The reality is:

    - Appliance-based security was relevant a decade ago, when 90% of employees were centrally located and most applications and resources ran in the corporate datacenter.

    - "Fake" security clouds are an attempt to jump on the "cloud" bandwagon - in reality it's still old technology pretending to address a paradigm shift.

    This webinar will bust the myths, expose the facts and fiction, comparing authentic 100% cloud security solution, with "fake" security clouds and hardware appliances. This webinar will focus on 5 key pain-points to drive home the clear differentiators including:

    1. Security
    2. Cloud design
    3. Visibility and Reporting
    4. Total Cost of Ownership
    5. User Experience
  • Zscaler vs FireEye - Insights from the experts at Miercom Labs Recorded: Dec 16 2014 39 mins
    Robert Smithers, CEO of Miercom and Alan Shimel, Managing Partner of The CISO Group
    Learn what Miercom experts discovered in head to head shootouts of leading APT protection solutions.

    Advanced Persistent Threats (APTs) are sophisticated, stealthy, and extremely difficult to stop - so a number of different approaches to combat them have emerged. That's why Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of all leading network-based breach detection and protection solutions - including FireEye, Checkpoint, Cisco, Fortinet, and Zscaler.

    This webcast discusses the detailed results of head to head testing between Zscaler and FireEye, including:

    - A review of the current APT protection landscape
    - Insights and learnings from Miercom's testing
    - Best practices for combating APTs
Revolutionizing Internet Security through the magic of cloud computing
Zscaler ensures that more than 13 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.

Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Cyber Monday attacks cost up to $3.4M per hour in losses
  • Live at: Nov 19 2015 5:00 pm
  • Presented by: Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
  • From:
Your email has been sent.
or close