Hi [[ session.user.profile.firstName ]]

[Breakfast Talk: Ep.2] Post Lockdown: New Cybersecurity Norms & Cloud Technology

The way we work will never be the same. The COVID-19 global pandemic has forced millions of people to work from home. However, the explosion in the number of remote workers is putting unbelievable pressure on companies’ virtual private network (VPN) infrastructure capacity, slowing user experience to a crawl and impacting productivity at an already difficult time.

So what are the new cybersecurity norms for easing remote workers back into workplace by leveraging cloud technology?

In Episode 2 of our Breakfast Talk Series, learn:

• How has Covid-19 has changed the way organizations work in Indonesia.
• How technology addresses current business/ security challenges.
• What a post-lockdown future will look like for a secure and productive workforce.
• Preparations required for easing remote workers from the current ‘new normal’ back into the workplace.

Cybersecurity veterans Tony Hartono, ICT Practitioner & Sutedjo Tjahjadi, Managing Director, Datacomm Cloud Business - PT Datacomm Diangraha join James Locus, Menlo Security’s senior product manager, and Dennis Tan, Menlo Security’s regional director, in a breakfast talk hosted by Alvina Koh.
Recorded Sep 30 2020 79 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Hartono, ICT Practitioner & Sutedjo Tjahjadi, Managing Director, Datacomm Cloud Business - PT Datacomm Diangraha
Presentation preview: [Breakfast Talk: Ep.2] Post Lockdown: New Cybersecurity Norms & Cloud Technology

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [APAC] The Good, the Bad, and the Ugly: How Security Will Change in 2021 Dec 15 2020 2:00 am UTC 60 mins
    Kowsik Guruswamy, CTO, Jack Miller, Head Glbl Prof Services, frmr CISO, Vinay Pidathala, Dir Security Research-Menlo Security
    Join Our Discussion on the Top 4 Security Trends and How They Will Continue in 2021

    In 2020, Menlo Threat Labs noticed that attackers shifted from using their own infrastructure to using legitimate infrastructure. They’re leveraging techniques that abuse legitimate design functionality in websites and the technologies that build them, so current security products and SOC analysts find it harder to identify these threats.

    Join Menlo’s CTO Kowsik Guruswamy, Head of Global Professional Services and former CISO Jack Miller, and Director of Security Research Vinay Pidathala as they discuss and debate through real-world examples of these attacks. Find out what to watch for in 2021 so you can set the right priorities for your company.

    We Will Cover:

    - Phishing—What key campaigns and change in tactics we anticipate
    - Malicious File Behavior—How legitimate files, like Word, will continue to bypass traditional detect-and-respond solutions
    - Business Email Compromise (BEC)—What changes in BEC attacks to expect from this growing attack vector
    - CnC—How these communication channels are changing
  • Prevent Phishing: How to Block Attacks With Read-Only Mode Dec 9 2020 3:00 pm UTC 31 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    A recent study by CyberEdge found that, 62 percent of organizations have been affected by ransomware, and 90 percent of breaches were caused by phishing and ransomware.

    While today's current email solutions still largely operate on detect-and-respond technology, every data loss incident highlights their inability to provide adequate protection.

    So why continue to accept the same old failed security approaches?

    Isolation transforms email security by enabling a read-only mode that protects users from link-based email threats. This method provides 100 percent protection against phishing attacks when correctly configured, with no impact to the end-user.

    In This Webinar, Attendees Will Learn:

    - How to secure your enterprise even when users click on unsafe links or download ransomware.
    - Why email gateway solutions need isolation to protect against zero-day threats.
    - Which isolation techniques can prevent phishing attacks.
    - How to deploy isolation in 10 minutes, without impacting users.
  • [SANS] Securing the Future of Work: How to Combat Phishing and Malware Dec 8 2020 2:00 am UTC 61 mins
    Kowsik Guruswamy, CTO – Menlo Security, Serge Borso, SANS Instructor – SANS Institute
    Remote work has changed the game as far as cybersecurity professionals are concerned.

    Traditional corporate VPN architectures rely on a hub-and-spoke model, which isn’t built for the size and geographic diversity of the new remote business paradigm.

    This anywhere workforce needs everywhere protection. How can you securely support a growing workforce of both in-office and remote workers without bottlenecking your VPN?

    Cloud-delivered security on an Isolation Core™ is the answer, because it grants complete protection against phishing as well as email- and web-based malware. It allows IT teams to provide a smooth, native browsing experience without compromising the security of their SaaS platforms.

    Key insights from this webinar will include:

    1.Why standard VPN architectures are failing to stop targeted threats.
    2.How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    3.Specific use case examples that demonstrate why a cloud-based security layer is critical.
    4.How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • [IDG Webinar] 5 Considerations for Successful Cloud Security Dec 3 2020 3:00 pm UTC 32 mins
    Mehul Patel, Director, Product Marketing - Menlo Security & Tom Schmidt, Digital Content Director - IDG
    With bad actors exploiting outdated security stacks, it’s time to rethink your current security strategy. Legacy security services can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. So what can you do?

    In this IDG and Menlo Security webinar, attendees will learn about the five key considerations for successful cloud security that they should recognize in securing their organization’s transition to the cloud.

    We will you through:

    - Why granular access to enterprise apps enables digital transformation.
    - How to enable Zero Trust Internet access to protect against all Internet threats.
    - How to safeguard against data leakage and SaaS governance.
    - How to ensure complete visibility to SSL traffic and protect against SSL threats.
  • [Video] Experts Share How the COVID-19 Pandemic Affected Cybersecurity Recorded: Nov 24 2020 3 mins
    Upendra Mardikar, CSO - Snap Finance and David Eckstein, CFO - Menlo Security
    Upendra Mardikar (CSO of Snap Finance) and David Eckstein (CFO of Menlo Security) discuss how COVID-19 has affected their businesses and how they work with their cybersecurity team to protect workers.


    To learn more and to view the full webinar "Solving FinTech’s Top 4 Security Anxieties", click here:

    https://www.brighttalk.com/webcast/13317/447117?utm_source=Menlo+Security&utm_medium=brighttalk&utm_campaign=447117
  • [SANS Panel Webinar] Navigating the Challenges of Network Security Recorded: Nov 19 2020 56 mins
    Dave Shackleford, SANS Institute, Stuart Pickard, Menlo Security, Chris Bilodeau, Cisco Umbrella, Christopher Hass, Automox
    Navigating the Challenges of Network Security Beyond the data Center

    Your users and data have left the building, and network security is no longer confined to the data center. As data and workloads shift to the cloud, cybersecurity professionals are contending with an entirely new set of security challenges.

    We’ll talk about how changing work styles have led to new security problems, where the cloud security landscape is heading, and the steps you can take to keep your organization safe and secure.
  • [Zero Trust Internet] How to Stop Phishing & Web-Based Attacks Recorded: Nov 18 2020 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too. What can be done?

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.

    You Will Learn:

    - Examples of sophisticated attacks
    - Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    - Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • [Demo] Discover Direct-to-Internet Connections to O365 and GSuite Recorded: Nov 12 2020 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • How to Prevent Phishing Attacks Recorded: Nov 10 2020 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital workforce, the risk of employees falling for a phishing attack increases.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • [Demo] Cloud DLP: Global Visibility and Control for Every User and Device Recorded: Nov 5 2020 9 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Menlo Security’s Cloud Data Loss Prevention (DLP) is powered by an Isolation Core™ to reliably identify and stop data exfiltration. The Cloud DLP suite offers a solution that organizations of any size can use to prevent data leaks and save money. Protect your PII (personally identifiable information), customer, patient, and other sensitive data that should not be publicly available.
  • [APAC] Solving FinTech’s Top 4 Security Anxieties Recorded: Nov 5 2020 45 mins
    Upendra Mardikar, CSO - Snap Finance and David Eckstein, CFO - Menlo Security
    In the past year, 70 percent of financial services institutions (FSIs) have been victimized by ransomware, while direct attacks on bank employees have increased by 38 percent during the pandemic lockdown. With 30 percent of employees projected to remain permanently remote after 2021, the need to secure your global workforce has never been greater.

    Join Upendra Mardikar, Chief Security Officer of Snap Finance and David Eckstein, Chief Financial Officer of Menlo Security, as we discuss the top four pain points that decision-makers should think about now and in 2021 to protect their company and employees from potentially devastating financial losses.

    Learnings and topics covered:
    ● Discussion of C-Suite anxieties in confronting the realities of cybercrime
    ● The most frequently stated cybersecurity pain points stated by FSIs
    ● The influence of budgets on purchasing decisions
    ● The importance of connectivity for smaller FSIs
    ● How Menlo’s cloud proxy is uniquely positioned to address these pain points

    Sources:
    - Cyberthreat Defense Report: https://cyber-edge.com/cdr/
    - FSI Briefs "Financial crime in times of Covid-19 – AML and cyber resilience measures": https://www.bis.org/fsi/fsibriefs7.pdf
    - Deloitte "Reshaping the cybersecurity landscape": https://www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity-maturity-financial-institutions-cyber-risk.html
  • [FinTech Talk] Solving FinTech’s Top 4 Security Anxieties Recorded: Nov 4 2020 45 mins
    Upendra Mardikar, CSO - Snap Finance and David Eckstein, CFO - Menlo Security
    In the past year, 70 percent of financial services institutions (FSIs) have been victimized by ransomware, while direct attacks on bank employees have increased by 38 percent during the pandemic lockdown. With 30 percent of employees projected to remain permanently remote after 2021, the need to secure your global workforce has never been greater.

    Join Upendra Mardikar, Chief Security Officer of Snap Finance and David Eckstein, Chief Financial Officer of Menlo Security, as we discuss the top four pain points that decision-makers should think about now and in 2021 to protect their company and employees from potentially devastating financial losses.

    Learnings and topics covered:

    ● Discussion of C-Suite anxieties in confronting the realities of cybercrime
    ● The most frequently stated cybersecurity pain points stated by FSIs
    ● How Menlo’s cloud proxy is uniquely positioned to address these pain points
  • [Frost & Sullivan Insights] Why Shift Security to the Cloud Recorded: Nov 3 2020 62 mins
    Kenny Yeo, Head of Cybersecurity Practice - APAC Frost & Sullivan, Mehul Patel, Sr. Dir PMM - Menlo Security
    How Can You Gain Advantage with a Cloud First Approach?

    In this webinar, industry experts will discuss the evolution of web-based threats and their impact on security architectures that are causing organizations to start ‘Shifting Security to the Cloud’.

    Hear from Head of Cybersecurity Practice at Frost & Sullivan, Kenny Yeo, present the rising trends around ‘Shifting Security to the Cloud’ with analysis of considerations for adopting a cloud-first approach. Panelists from Menlo Security and Frost & Sullivan will also discuss and answer questions around cloud security deployment

    Discover:

    - What are the factors impacting cloud adoption?
    - Why is web security moving to the cloud?
    - How can cloud security deployments benefit your organization?
  • [Demo] See How Our Global Cloud Proxy Provides Secure Web Access Recorded: Oct 29 2020 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Discover how Menlo Security’s Global Cloud Proxy provides fast, secure web access to applications such as Office 365, and how it enables IT departments to scale security services for large organizations while reducing operational costs.

    To learn more about the Global Cloud Proxy and view our other product demonstrations, click here: bit.ly/2LJ9Wwk
  • Security without Compromise. A new approach to eliminate malware. Recorded: Oct 28 2020 26 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    With 50% of all attacks being malware based — and 99% of those being driven by email and web attack vectors — legacy technologies reliant on signatures and known threats aren’t cutting it against today’s relentless and pervasive threats. The security architecture requirements need to change. So how can you achieve 100% malware protection?

    By 2022, Gartner estimates isolation can reduce attacks that compromise end-user systems by 70%*. Because of its efficacy, isolation is becoming a critical capability for secure web gateways as enterprises adopt SaaS services and move to the cloud. In this webinar, we’ll show you why isolation has become so important to modern security. Mehul Patel, Menlo Security’s isolation expert, will explore an effective way to eliminate the threat of malware — both known and unknown — from all Internet and web traffic, including email, web, apps and documents.

    Discover:

    - The three trends impacting your security architecture and how you can offset the risk
    - How your organisation can eliminate the risk of malware, viruses and ransomware
    - Why Menlo Security stands behind its security with a $1M malware protection warranty

    * Source: Gartner Innovation Insight for Remote Browser Isolation, 8 March 2018
  • [Expert Insights] How to Leverage CyberEdge’s 2020 Cyberthreat Defense Report Recorded: Oct 27 2020 56 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & Steve Piper, Founder and CEO - CyberEdge
    Due to unprecedented times, IT teams need answers and guidance to protect against evolving threats, while supporting overstressed employees and systems.

    In this webinar, experts—CyberEdge’s Founder and CEO, Steve Piper, and Menlo Security's Sr. PMM, James Locus—will share how to use the 2020 CyberEdge’s Cyberthreat Defense Report (CDR) findings to benchmark your company's security posture and best practices against peers in your industry or region.

    With the global pandemic's impact on businesses, security professionals need an up-to-date understanding of modern challenges to continue supporting business continuity. CyberEdge’s CDR has become a hallmark document for assessing organizations’ security posture, gauging the perceptions of IT security professionals, and ascertaining current and planned investments in IT security infrastructure.

    Now in its seventh year, the 2020 CDR report surveyed 1,200 IT security professionals representing 17 countries and 19 industries about industry-specific trends, beliefs, and attitudes.

    Join this webinar to hear key insights from this year's report which will help you to:

    - Understand how your organization stacks up against others in your industry and globally.
    - Discover the types of cyberthreats and security obstacles that concern IT teams the most.
    - Explore the security technologies, like cloud-delivered security, that others have in place and the investments that are planned.
    - And much more!
  • [Demo] See How Secure Internet with an Isolation Core™ Protects From Web Threats Recorded: Oct 22 2020 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Preventing Phishing Attacks in the Digital Workforce Recorded: Oct 21 2020 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Poor cybersecurity habits and simple mistakes made by employees place organisations at greater risk of credential theft and infiltration. Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital and remote workforce—especially during the Covid-19 pandemic—the risk of employees falling for a phishing attack increases.

    Cybercriminals are becoming more adept at fooling employees with timely topics, sometimes when people are at their most vulnerable. A particularly important goal of attackers is to gather employee credentials, which are then used to capture and control company data for malicious financial gain.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • [IDG Webinar] Avoiding the Top 3 Security Challenges of Digital Transformation Recorded: Oct 20 2020 29 mins
    Mehul Patel - Menlo Security, Inc. & Barbara R. Call - IDG
    According to Gartner, “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools that were once on-prem are moving to the cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by 1 in 5 corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are moving to the cloud!

    Join us for a provocative discussion of the following questions to help you cut through the noise and understand how you can succeed in your cloud transformation:

    •Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    •How can you reduce MPLS backhaul costs and increase Internet bandwidth for users?
    •How can you maintain visibility and control over users’ traffic and protect against data exfiltration?

    Save your seat today to learn how you can leverage the benefits of cloud technologies — including efficiency, agility, and scalability — while avoiding the pitfalls.

    Speakers:

    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    Barbara R. Call, Sr. Director, Content Operations & Strategy, Strategic Marketing Services - IDG
  • [Frost & Sullivan] Shifting Security to the Cloud Recorded: Oct 14 2020 62 mins
    Kenny Yeo, Head of Cybersecurity Practice - APAC Frost & Sullivan, Mehul Patel, Sr. Dir PMM - Menlo Security
    Gain Advantage with a Cloud First Approach

    In this webinar, industry experts will discuss the evolution of web-based threats and their impact on security architectures that are causing organisations to start ‘Shifting Security to the Cloud’. Hear from Head of Cybersecurity Practice at Frost & Sullivan, Kenny Yeo, present the rising trends around ‘Shifting Security to the Cloud’ with analysis of considerations for adopting a cloud-first approach. Then join panelists from Menlo Security and Frost & Sullivan as they discuss and answer questions around cloud security deployment

    Topics You Will Learn About:

    - What are the factors impacting cloud adoption?
    - Why is web security moving to the cloud?
    - How can cloud security deployments benefit your organisation?
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Breakfast Talk: Ep.2] Post Lockdown: New Cybersecurity Norms & Cloud Technology
  • Live at: Sep 30 2020 2:50 am
  • Presented by: Tony Hartono, ICT Practitioner & Sutedjo Tjahjadi, Managing Director, Datacomm Cloud Business - PT Datacomm Diangraha
  • From:
Your email has been sent.
or close