Hi [[ session.user.profile.firstName ]]

[Video Interview] Jason Steer: The State of Cyber Security & Today's Threatscape

BrightTALK caught up with Menlo Security's Jason Steer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

Topics up for discussion:

- The Russian hack of the US election

- AI & Machine learning in Cyber Security

- The Yahoo breach and steps to take to avoid it happening to other companies

- The leading prevention technologies currently and how to adopt them

- Cyber warfare in today's political spectrum
Recorded Mar 9 2017 7 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Steer, Solutions Architect - EMEA, Menlo Security & Josh Downs, Community Manager, BrightTALK
Presentation preview: [Video Interview] Jason Steer: The State of Cyber Security & Today's Threatscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A New Approach to Secure Web Gateways Sep 1 2021 3:00 am UTC 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Examining threat trends: Why organizations are looking to the cloud for security Jul 27 2021 3:00 am UTC 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • Solving Your Trust Issues with SASE Jul 21 2021 7:00 pm UTC 25 mins
    Jack Miller, Head of Global Pro Services | Menlo Security
    Zero Trust Security is an urgent priority for organizations with a vested interest in data security. But CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner. YES – 100%. Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.
  • [APAC Webinar] Securing the Future of Work Jul 21 2021 4:30 am UTC 62 mins
    Kowsik Guruswamy, Serge Borso
    Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

    Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

    Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
    + Why standard VPN architectures are failing to stop targeted threats.
    + How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    + Specific use case examples that demonstrate why a cloud-based security layer is critical.
    + How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • Your Data Has Moved to the Cloud. Has Your Security Stack? Jul 14 2021 7:00 pm UTC 61 mins
    Jack Miller, Head of Professional Services, Menlo Security and Mitch Ashley, Analytist at Accelerated Strategies Group
    To protect productivity and enable modern businesses, today’s mobile workforce needs fast, secure, and reliable Internet access. Much of the currently deployed security technology is not equipped to secure today’s volume of Internet traffic, SaaS applications, or offer the security capabilities needed to overcome the challenges presented by today’s expanded attack surface. So, how should security teams secure work and keep up with the demands of the business and workforce?

    During this discussion, Jack Miller, Head of Global Professional Services at Menlo Security and a former CISO, will answer that question and dive deep into how organizations are moving away from legacy security solutions to overcome the challenges that remote work presents today.

    Speakers:
    Jack Miller, Head of Professional Services, Menlo Security
    Mitch Ashley, Analytist at Accelerated Strategies Group
  • A New Approach to Secure Web Gateways Jul 14 2021 11:00 am UTC 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Examining threat trends: Why organizations are looking to the cloud for security Jul 7 2021 11:00 am UTC 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • People are the new perimeter - secure the perimeter! Jul 1 2021 3:00 am UTC 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • People are the new perimeter - secure the perimeter! Jun 30 2021 11:00 am UTC 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • A new approach to SWG: breaking up with your onpremise web proxy is a no brainer Jun 23 2021 7:00 pm UTC 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Defining the synergy between Zero Trust and SASE. Recorded: Jun 17 2021 27 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Defining the synergy between Zero Trust and SASE. Recorded: Jun 17 2021 27 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Examining threat trends: Why organizations are looking to the cloud for security Recorded: Jun 16 2021 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • Examining threat trends: Why organizations are looking to the cloud for security Recorded: Jun 15 2021 58 mins
    Steve Piper, CEO, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in it's eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.
    Gain key insights to security concerns, projects and priorities of security leaders globally to help define your internal strategy and investment plan
  • People are the new perimeter - secure the perimeter! Recorded: Jun 9 2021 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • [APAC Webinar] Preparing your Cloud Security Strategy for the Challenges of 2021 Recorded: Jun 9 2021 54 mins
    Boon Peng Lau, Sue Nguyen
    The world as we knew it transformed forever last year, online and offline. Cyber space changed significantly with attackers shifting from using their owned infrastructure to using legitimate infrastructure. Menlo Security’s Experts anticipate that cybercriminals will increasingly leverage more techniques that abuse legitimate design functionality in websites and the technologies that build them. Hence current security products and SOC analysts will find it harder to identify new threats in 2021.

    Join Menlo’s Director of Sales Engineering, Boon Peng Lau, at this webinar and learn ways to full proof your Cloud Security Strategy to outsmart this year’s threats and protect your people, whenever and wherever they work.

    You will learn how to prevent growing new threats like:

    • Phishing - via HTML smuggling, popular websites, and legitimate emails
    • Ransomware – data and system Ransom
    • Mobile Protection - from BEC and multi-vector attacks
    • Data Loss Prevention
  • VMware OCTO and Menlo Security: Why You Need Secure Access Service Edge (SASE)? Recorded: Jun 1 2021 85 mins
    G. Venkatachalam, VP, APJ CTO VMWare | S. Pitts, Digital Workspace Chief Technologist VMWare
    With Anywhere Workspace becoming the new industry standard, Network and Edge Security are modernising. End to End security architecture is the need of the hour to transform the legacy and traditionally bolted security architecture. VMware Cloud Native Secure Access Service Edge is industries’ most comprehensive and leading architecture to deliver security in an intrinsic or sequenced manner to branch edges, mobile users, campuses, and IoT devices. Menlo Security brings to you 100% malware elimination capability integrating with the VMware Secure Access Service Edge.

    Join us to learn and share:

    Why Secure Access Service Edge is needed for your organisation?
    What are the modern design principals that organisations are adopting to transform security and operations?
    What are the use cases, solution and services using which you can lead your organisations transformation?
  • Managing Unknown-Unknown Threats to Critical Infrastructure Assets Recorded: May 28 2021 55 mins
    Ashwin Pal, Abu Odigie, Sue Nguyen
    Safeguarding Australia's critical infrastructure assets from cyber-attacks is a high priority. To manage increasing cyber threats to our national and economic interests, the Australian Federal Government has proposed a Critical Infrastructure Security Legislation Amendment Bill 2020 to mandate a broad cross-section of the Australian economy, encompassing 11 different industry classifications as of this writing. Effective risk management is the bill's foundation that seeks to enforce comprehensive risk governance and mitigation measures.

    On this webcast, Ashwin Pal, Cybersecurity Director at Unisys APAC and Menlo Security will provide updates on the proposed legislation and its requirements on your organisation now. You will also learn how some of the world's most sophisticated Critical Infrastructure organisations effectively manage risks to comply with cybersecurity legislation and eliminate known, unknown, and unknown-unknown threats.

    The webinar agenda includes:
    • An operational introduction to the Critical Infrastructure Bill.
    • What CISOs and CROs must do now to be compliance-ready.
    • Managing cyber risks to Critical Infrastructure Assets
    • Preventing Zero-Day threats and mitigate Unknown-Unknowns threats with a Zero-trust approach powered by Isolation
    • How the US Department of Defense prevents Zero-Day threats and mitigate Unknown-Unknowns threats with a Zero-trust approach powered by Isolation.
  • Trust in the Time of Covid-19 Recorded: May 25 2021 20 mins
    Nick Edwards, VP of Product at Menlo Security
    Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as love In The Time of Cholera tells us.

    The same can also be said of operating a business in a perpetual environment of low Trust. Covid-19 continues to extract a toll on both a personal and professional level, with Trust being a top casualty. Remote work, coupled with an even greater proliferation of unmanaged devices, compounded by ruthless pandemic-based phishing attacks and ransomware have made worse an already challenging state of affairs in cybersecurity.

    What can be learned from our battles against Cholera and COVID-19? What worked and what didn’t? What truths did we previously hold as sacrosanct, merit rethinking? How can we leverage the current crisis in a way to advance Trust in our professional lives? Tune in to this session to learn how some organizations are rethinking their approach to making the internet safe for work in a post-pandemic world.
  • Rethinking Network Architecture with Security at the Core Recorded: May 5 2021 26 mins
    Nick Edwards, VP of Product Management, Menlo Security | Mitch Ashley, CEO, Accelerated Strategies Group
    Since the inception of the Internet, there’s been bad actors trying to take advantage of whatever they can get their hands on. Security professionals for organizations designed web proxies as the solution to protect users from behind a firewall.

    Today, web proxies aren’t up to the monumental threats that organizations face on the daily with a majority distributed workforce.

    Join this interview with Nick Edwards from Menlo Security and Mitch Ashley of Accelerated Strategies Group from TechStrongTV to hear about new security approaches that can enable knowledge workers to work seamlessly while staying 100% protected from Internet threats.
Securing work where it happens. In the cloud.
Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Video Interview] Jason Steer: The State of Cyber Security & Today's Threatscape
  • Live at: Mar 9 2017 11:15 am
  • Presented by: Jason Steer, Solutions Architect - EMEA, Menlo Security & Josh Downs, Community Manager, BrightTALK
  • From:
Your email has been sent.
or close