Hi [[ session.user.profile.firstName ]]

Impact of #Covid19 on the Infosec Industry

With COVID-19 spreading across the globe at an alarming rate, an array of sectors and verticals have been impacted. The information security sector is no exception.

As a part of “social distancing,” organizations are attempting to successfully shift to an unprecedented scale of remote working. This shift opens enterprises to security, operational, and incident management risks.

With that, we have seen a spike of cybercriminals launching unprecedented levels of coronavirus-related phishing and malware attacks.

Infosecurity Magazine will be joined by a panel of security experts, including Menlo Security’s CTO, Kowsik Guruswamy. This webinar will:

- Discuss the various impacts that COVID-19 is having on the information security industry.
- Assess the greatest risks currently threatening the security of data.
- Reflect on what the sector must do to address the challenges being faced.
Recorded May 20 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, CTO-Menlo Security, Lisa Forte, Partner-Red Goat Cyber Security, Raef Meeuwisse, CISM
Presentation preview: Impact of #Covid19 on the Infosec Industry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Demo] See How Our Global Cloud Proxy Provides Secure Web Access Oct 29 2020 2:00 am UTC 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Discover how Menlo Security’s Global Cloud Proxy provides fast, secure web access to applications such as Office 365, and how it enables IT departments to scale security services for large organizations while reducing operational costs.

    To learn more about the Global Cloud Proxy and view our other product demonstrations, click here: bit.ly/2LJ9Wwk
  • Security without Compromise. A new approach to eliminate malware. Oct 28 2020 2:00 am UTC 26 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    With 50% of all attacks being malware based — and 99% of those being driven by email and web attack vectors — legacy technologies reliant on signatures and known threats aren’t cutting it against today’s relentless and pervasive threats. The security architecture requirements need to change. So how can you achieve 100% malware protection?

    By 2022, Gartner estimates isolation can reduce attacks that compromise end-user systems by 70%*. Because of its efficacy, isolation is becoming a critical capability for secure web gateways as enterprises adopt SaaS services and move to the cloud. In this webinar, we’ll show you why isolation has become so important to modern security. Mehul Patel, Menlo Security’s isolation expert, will explore an effective way to eliminate the threat of malware — both known and unknown — from all Internet and web traffic, including email, web, apps and documents.

    Discover:

    - The three trends impacting your security architecture and how you can offset the risk
    - How your organisation can eliminate the risk of malware, viruses and ransomware
    - Why Menlo Security stands behind its security with a $1M malware protection warranty

    * Source: Gartner Innovation Insight for Remote Browser Isolation, 8 March 2018
  • [Expert Insights] How to Leverage CyberEdge’s 2020 Cyberthreat Defense Report Oct 27 2020 2:00 pm UTC 56 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & Steve Piper, Founder and CEO - CyberEdge
    Due to unprecedented times, IT teams need answers and guidance to protect against evolving threats, while supporting overstressed employees and systems.

    In this webinar, experts—CyberEdge’s Founder and CEO, Steve Piper, and Menlo Security's Sr. PMM, James Locus—will share how to use the 2020 CyberEdge’s Cyberthreat Defense Report (CDR) findings to benchmark your company's security posture and best practices against peers in your industry or region.

    With the global pandemic's impact on businesses, security professionals need an up-to-date understanding of modern challenges to continue supporting business continuity. CyberEdge’s CDR has become a hallmark document for assessing organizations’ security posture, gauging the perceptions of IT security professionals, and ascertaining current and planned investments in IT security infrastructure.

    Now in its seventh year, the 2020 CDR report surveyed 1,200 IT security professionals representing 17 countries and 19 industries about industry-specific trends, beliefs, and attitudes.

    Join this webinar to hear key insights from this year's report which will help you to:

    - Understand how your organization stacks up against others in your industry and globally.
    - Discover the types of cyberthreats and security obstacles that concern IT teams the most.
    - Explore the security technologies, like cloud-delivered security, that others have in place and the investments that are planned.
    - And much more!
  • Prevent Phishing: How to Block Attacks With Read-Only Mode Oct 22 2020 2:00 pm UTC 60 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    While today's current email solutions still largely operate on detect-and-respond technology, every data loss incident highlights their inability to provide adequate protection. With that, why continue to accept the same old failed security approaches?

    Isolation transforms email security by enabling a read-only mode that protects users from link-based email threats. This method provides 100 percent protection against phishing attacks when correctly configured, with no impact to the end-user.

    In This Webinar, You Will Learn:

    - How to secure your enterprise even when users click on unsafe links or download ransomware.
    - Why email gateway solutions need isolation to protect against zero-day threats.
    - Which isolation techniques can prevent phishing attacks.
    - How to deploy isolation in 10 minutes, without impacting users.

    Save your seat today!
  • [Demo] See How Secure Internet with an Isolation Core™ Protects From Web Threats Oct 22 2020 2:00 am UTC 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Preventing Phishing Attacks in the Digital Workforce Oct 21 2020 2:00 am UTC 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Poor cybersecurity habits and simple mistakes made by employees place organisations at greater risk of credential theft and infiltration. Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital and remote workforce—especially during the Covid-19 pandemic—the risk of employees falling for a phishing attack increases.

    Cybercriminals are becoming more adept at fooling employees with timely topics, sometimes when people are at their most vulnerable. A particularly important goal of attackers is to gather employee credentials, which are then used to capture and control company data for malicious financial gain.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • [IDG Webinar] Avoiding the Top 3 Security Challenges of Digital Transformation Oct 20 2020 2:00 pm UTC 29 mins
    Mehul Patel - Menlo Security, Inc. & Barbara R. Call - IDG
    According to Gartner, “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools that were once on-prem are moving to the cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by 1 in 5 corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are moving to the cloud!

    Join us for a provocative discussion of the following questions to help you cut through the noise and understand how you can succeed in your cloud transformation:

    •Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    •How can you reduce MPLS backhaul costs and increase Internet bandwidth for users?
    •How can you maintain visibility and control over users’ traffic and protect against data exfiltration?

    Save your seat today to learn how you can leverage the benefits of cloud technologies — including efficiency, agility, and scalability — while avoiding the pitfalls.

    Speakers:

    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    Barbara R. Call, Sr. Director, Content Operations & Strategy, Strategic Marketing Services - IDG
  • [Demo] Discover Direct-to-Internet Connections to O365 and GSuite Oct 15 2020 2:00 pm UTC 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • [Frost & Sullivan] Shifting Security to the Cloud Oct 14 2020 2:00 am UTC 62 mins
    Kenny Yeo, Head of Cybersecurity Practice - APAC Frost & Sullivan, Mehul Patel, Sr. Dir PMM - Menlo Security
    Gain Advantage with a Cloud First Approach

    In this webinar, industry experts will discuss the evolution of web-based threats and their impact on security architectures that are causing organisations to start ‘Shifting Security to the Cloud’. Hear from Head of Cybersecurity Practice at Frost & Sullivan, Kenny Yeo, present the rising trends around ‘Shifting Security to the Cloud’ with analysis of considerations for adopting a cloud-first approach. Then join panelists from Menlo Security and Frost & Sullivan as they discuss and answer questions around cloud security deployment

    Topics You Will Learn About:

    - What are the factors impacting cloud adoption?
    - Why is web security moving to the cloud?
    - How can cloud security deployments benefit your organisation?
  • [Combat Phishing] How to Turn Your Phishing Links Into Read Only Oct 13 2020 2:00 pm UTC 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Zero Trust Internet - Moving Beyond "Almost Safe" Oct 6 2020 2:00 pm UTC 16 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    According to CyberEdge's "2020 Cyberthreat Defense Report", 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative security approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    Register for this webinar to discover:

    - Why enterprise spending on cybersecurity continues to go up, yet they keep getting infected again and again and again.
    - Why digital transformation is accelerating the adoption of cloud based apps and services, rendering legacy security architectures obsolete.
    - How we need to invert our thinking from being app/data centric to a cloud-based, user centric approach.
    - Can we move beyond good vs. bad and "almost safe" to Zero Trust?
  • Five Cloud Security Considerations for CISOs Recorded: Sep 22 2020 33 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation.
    2. How to enable Zero Trust Internet access to protect against all Internet threats.
    3. How to safeguard against data leakage and SaaS governance.
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats.
    5. How browser interactions enable continuous threat monitoring
  • Life on the Front Lines - Staying Sane in the SOC Recorded: Sep 16 2020 57 mins
    Diana Kelley, SecurityCurve | Vinay Pidathala, Menlo Security | Delyan Nestorov, Rapid7 | Charity Wright, Recorded Future
    Join this episode of The (Security) Balancing Act for an insider's view of life on the front lines of cybersecurity.

    This panel will look into what it's like to work in and manage a Security Operations Center (SOC), as well as share best practices for keeping your team of front-line defenders sane, empowered and happy, and your organization secure.

    The topics up for discussion during this episode include:
    - What kind of people are best suited for work in a SOC?
    - What kind of training / certifications / skills are needed to be successful?
    - How to handle alert fatigue and analyst overload?
    - Is automation (ML & AI) the answer?
    - What do you do when IOCs aren't enough?
    - Hunters vs. responders, what's the difference?
    - How the pandemic is impacting security operations?
    - Building a healthy team culture and managing self-care in the age of breaches
    - What's needed to make life easier for these front-line cyber defenders

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • [SANS Webinar] Securing the Future of Work: How to Combat Phishing and Malware Recorded: Sep 15 2020 61 mins
    Kowsik Guruswamy, CTO – Menlo Security, Serge Borso, SANS Instructor – SANS Institute
    Remote work has changed the game as far as cybersecurity professionals are concerned.

    Traditional corporate VPN architectures rely on a hub-and-spoke model, which isn’t built for the size and geographic diversity of the new remote business paradigm.

    This anywhere workforce needs everywhere protection. How can you securely support a growing workforce of both in-office and remote workers without bottlenecking your VPN?

    Cloud-delivered security on an Isolation Core™ is the answer, because it grants complete protection against phishing as well as email- and web-based malware. It allows IT teams to provide a smooth, native browsing experience without compromising the security of their SaaS platforms.

    Key insights from this webinar will include:

    1. Why standard VPN architectures are failing to stop targeted threats.
    2. How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    3. Specific use case examples that demonstrate why a cloud-based security layer is critical.
    4. How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • Why Read-Only Mode Is Key to Preventing Phishing Attacks Recorded: Sep 15 2020 32 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    A recent study by CyberEdge found that, 62 percent of organizations have been affected by ransomware, and 90 percent of breaches were caused by phishing and ransomware.

    While today's current email solutions still largely operate on detect-and-respond technology, every data loss incident highlights their inability to provide adequate protection.

    So why continue to accept the same old failed security approaches?

    Isolation transforms email security by enabling a read-only mode that protects users from link-based email threats. This method provides 100 percent protection against phishing attacks when correctly configured, with no impact to the end-user.

    In This Webinar, Attendees Will Learn:

    - How to secure your enterprise even when users click on unsafe links or download ransomware.
    - Why email gateway solutions need isolation to protect against zero-day threats.
    - Which isolation techniques can prevent phishing attacks.
    - How to deploy isolation in 10 minutes, without impacting users.
  • Zero Trust: What Is It and Why You Should Have Zero Trust in the Web Recorded: Sep 9 2020 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Cloud DLP: Global Visibility and Control for Every User and Device Recorded: Sep 3 2020 9 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Menlo Security’s Cloud Data Loss Prevention (DLP) is powered by an Isolation Core™ to reliably identify and stop data exfiltration. The Cloud DLP suite offers a solution that organizations of any size can use to prevent data leaks and save money. Protect your PII (personally identifiable information), customer, patient, and other sensitive data that should not be publicly available.
  • [SANS Webinar] How You Can Achieve Complete Malware and Phishing Protection Recorded: Sep 3 2020 61 mins
    Kowsik Guruswamy, CTO – Menlo Security, Serge Borso, SANS Instructor – SANS Institute
    Traditional corporate VPN architectures rely on a hub-and-spoke model, which isn’t built for the size and geographic diversity of the new remote business paradigm.

    This anywhere workforce needs everywhere protection. How can you securely support a growing workforce of both in-office and remote workers without bottlenecking your VPN?

    Cloud-delivered security on an Isolation Core™ is the answer, because it grants complete protection against phishing as well as email- and web-based malware. It allows IT teams to provide a smooth, native browsing experience without compromising the security of their SaaS platforms.

    Key insights from this webinar will include:

    1. Why standard VPN architectures are failing to stop targeted threats.
    2. How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    3. Specific use case examples that demonstrate why a cloud-based security layer is critical.
    4. How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • How to Leverage the Cloud for Split Tunneling & Improve Access Speeds Recorded: Sep 1 2020 46 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Remote workers need access to internal data and applications through a VPN, and they also need access to the Internet. Today’s security architecture requires that all traffic be sent back to HQ over a VPN, which does not have the capacity to handle the surge of an anywhere workforce.

    The obvious solution is to send web traffic directly to the Internet, but this approach exposes employees to common cyberthreats, such as drive-by exploits, malware, phishing, etc. A VPN split tunnel using a global cloud proxy is the better approach. It provides remote users with the same security as if they were working in the office and reduces VPN bandwidth by more than 70 percent.

    In this webinar, you will learn:

    - The importance of VPN split tunneling for remote workers
    - How a global cloud proxy relieves this problem
    - How an Isolation Core™ achieves 100 percent security without impacting the user experience
  • Menlo Security Global Cloud Proxy in Action Recorded: Aug 26 2020 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Discover how Menlo Security’s Global Cloud Proxy provides fast, secure web access to applications such as Office 365, and how it enables IT departments to scale security services for large organizations while reducing operational costs.

    To learn more about the Global Cloud Proxy and view our other product demonstrations, click here: bit.ly/2LJ9Wwk
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Impact of #Covid19 on the Infosec Industry
  • Live at: May 20 2020 2:00 pm
  • Presented by: Kowsik Guruswamy, CTO-Menlo Security, Lisa Forte, Partner-Red Goat Cyber Security, Raef Meeuwisse, CISM
  • From:
Your email has been sent.
or close