Hi [[ session.user.profile.firstName ]]

Trust in the Time of Covid-19

Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as love In The Time of Cholera tells us.

The same can also be said of operating a business in a perpetual environment of low Trust. Covid-19 continues to extract a toll on both a personal and professional level, with Trust being a top casualty. Remote work, coupled with an even greater proliferation of unmanaged devices, compounded by ruthless pandemic-based phishing attacks and ransomware have made worse an already challenging state of affairs in cybersecurity.

What can be learned from our battles against Cholera and COVID-19? What worked and what didn’t? What truths did we previously hold as sacrosanct, merit rethinking? How can we leverage the current crisis in a way to advance Trust in our professional lives? Tune in to this session to learn how some organizations are rethinking their approach to making the internet safe for work in a post-pandemic world.
Recorded May 4 2021 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Edwards, VP of Product at Menlo Security
Presentation preview: Trust in the Time of Covid-19

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • VMware OCTO and Menlo Security: Why You Need Secure Access Service Edge (SASE)? Jun 1 2021 3:00 pm UTC 85 mins
    G. Venkatachalam, VP, APJ CTO VMWare | S. Pitts, Digital Workspace Chief Technologist VMWare
    With Anywhere Workspace becoming the new industry standard, Network and Edge Security are modernising. End to End security architecture is the need of the hour to transform the legacy and traditionally bolted security architecture. VMware Cloud Native Secure Access Service Edge is industries’ most comprehensive and leading architecture to deliver security in an intrinsic or sequenced manner to branch edges, mobile users, campuses, and IoT devices. Menlo Security brings to you 100% malware elimination capability integrating with the VMware Secure Access Service Edge.

    Join us to learn and share:

    Why Secure Access Service Edge is needed for your organisation?
    What are the modern design principals that organisations are adopting to transform security and operations?
    What are the use cases, solution and services using which you can lead your organisations transformation?
  • Trust in the Time of Covid-19 May 25 2021 3:00 pm UTC 20 mins
    Nick Edwards, VP of Product at Menlo Security
    Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as love In The Time of Cholera tells us.

    The same can also be said of operating a business in a perpetual environment of low Trust. Covid-19 continues to extract a toll on both a personal and professional level, with Trust being a top casualty. Remote work, coupled with an even greater proliferation of unmanaged devices, compounded by ruthless pandemic-based phishing attacks and ransomware have made worse an already challenging state of affairs in cybersecurity.

    What can be learned from our battles against Cholera and COVID-19? What worked and what didn’t? What truths did we previously hold as sacrosanct, merit rethinking? How can we leverage the current crisis in a way to advance Trust in our professional lives? Tune in to this session to learn how some organizations are rethinking their approach to making the internet safe for work in a post-pandemic world.
  • VMware OCTO and Menlo Security: Why You Need Secure Access Service Edge (SASE)? Recorded: May 5 2021 85 mins
    G. Venkatachalam, VP, APJ CTO VMWare | S. Pitts, Digital Workspace Chief Technologist VMWare
    With Anywhere Workspace becoming the new industry standard, Network and Edge Security are modernising. End to End security architecture is the need of the hour to transform the legacy and traditionally bolted security architecture. VMware Cloud Native Secure Access Service Edge is industries’ most comprehensive and leading architecture to deliver security in an intrinsic or sequenced manner to branch edges, mobile users, campuses, and IoT devices. Menlo Security brings to you 100% malware elimination capability integrating with the VMware Secure Access Service Edge.

    Join us to learn and share:

    Why Secure Access Service Edge is needed for your organisation?
    What are the modern design principals that organisations are adopting to transform security and operations?
    What are the use cases, solution and services using which you can lead your organisations transformation?
  • Rethinking Network Architecture with Security at the Core Recorded: May 5 2021 26 mins
    Nick Edwards, VP of Product Management, Menlo Security | Mitch Ashley, CEO, Accelerated Strategies Group
    Since the inception of the Internet, there’s been bad actors trying to take advantage of whatever they can get their hands on. Security professionals for organizations designed web proxies as the solution to protect users from behind a firewall.

    Today, web proxies aren’t up to the monumental threats that organizations face on the daily with a majority distributed workforce.

    Join this interview with Nick Edwards from Menlo Security and Mitch Ashley of Accelerated Strategies Group from TechStrongTV to hear about new security approaches that can enable knowledge workers to work seamlessly while staying 100% protected from Internet threats.
  • [APAC Webinar] Building Resilience for Government & Defence Organisations in2021 Recorded: Apr 20 2021 72 mins
    Lt. General Philip Jones CB CBE DL; Paul Chichester; John Spicer; Ian McGowan; Kowsik Guruswamy.
    Despite the sophistication of the cyber-attacks on US Government institutions at the end of 2020, nobody is ready to wave a white flag. These state-sponsored attacks highlight the limitations of maintaining the cyber status quo and the need to take a fundamentally different approach to the red flags of cyber risk.

    Join expert speakers including:
    Lt. General Philip Jones CB CBE DL; Paul Chichester, Director of Operations, NCSC; John Spicer, CTO & Co-Founder, Nteligen; Ian McGowan, MD & Founder, Barrier Networks, and Kowsik Guruswamy, CTO, Menlo Security – as they share their relevant experience of building and maintaining resilience for critical infrastructure and partner and supplier eco-systems.

    At this session you will learn:
    + How adopting new approaches to cyber resilience delivers rapid return
    + How to recognise and prioritise red flags of cyber risk
    + How to reduce risk to critical infrastructure from partners and supplier ecosystems
    + How cyber best practice is being achieved within global Government and Defence
  • [APAC Webinar] Securing the Future of Work Recorded: Apr 20 2021 62 mins
    Kowsik Guruswamy, Serge Borso
    Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

    Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

    Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
    + Why standard VPN architectures are failing to stop targeted threats.
    + How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    + Specific use case examples that demonstrate why a cloud-based security layer is critical.
    + How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • CTO Insights: Overcoming VPN Challenges to Secure Remote Workers Recorded: Apr 15 2021 21 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth when nearly all of their workforce is becoming remote overnight.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives.

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis

    You’ll also hear about some special, limited-time programs that Menlo Security has initiated to help customers stay secure and agile as they make the transition to supporting a global remote workforce.*
  • [APAC Webinar] Preparing your Cloud Security Strategy for the Challenges of 2021 Recorded: Apr 9 2021 54 mins
    Boon Peng Lau, Sue Nguyen
    The world as we knew it transformed forever last year, online and offline. Cyber space changed significantly with attackers shifting from using their owned infrastructure to using legitimate infrastructure. Menlo Security’s Experts anticipate that cybercriminals will increasingly leverage more techniques that abuse legitimate design functionality in websites and the technologies that build them. Hence current security products and SOC analysts will find it harder to identify new threats in 2021.

    Join Menlo’s Director of Sales Engineering, Boon Peng Lau, at this webinar and learn ways to full proof your Cloud Security Strategy to outsmart this year’s threats and protect your people, whenever and wherever they work.

    You will learn how to prevent growing new threats like:

    • Phishing - via HTML smuggling, popular websites, and legitimate emails
    • Ransomware – data and system Ransom
    • Mobile Protection - from BEC and multi-vector attacks
    • Data Loss Prevention
  • Solving Your Trust Issues with SASE Recorded: Apr 8 2021 25 mins
    Jack Miller, Head of Global Pro Services | Menlo Security
    Zero Trust Security is an urgent priority for organizations with a vested interest in data security. But CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner. YES – 100%. Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.
  • (APAC) Five Cloud Security Considerations for CISOs Recorded: Apr 7 2021 32 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation.
    2. How to enable Zero Trust Internet access to protect against all Internet threats.
    3. How to safeguard against data leakage and SaaS governance.
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats.
    5. How browser interactions enable continuous threat monitoring
  • How to Eliminate the Arising Threats in the Post-Pandemic Cloud Environment Recorded: Apr 6 2021 35 mins
    Nick Edwards, VP of Product Management | Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Workforces and business operations completely decentralized as work from home policies become the permanent work reality even post-pandemic for many organizations. 

    Hackers are continuing to exploit these outdated security stacks. As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome these threats and security risks.

    Join Menlo Security’s Nick Edwards as he discusses how organizations can build a more unified approach across systems and multiple endpoints to combat this threat landscape.

    Understand and learn:

    ● How to enable Zero Trust Internet access to protect against all Internet threats
    ● How to safeguard against data leakage and SaaS governance
    ● How to ensure complete visibility to SSL traffic and protect against SSL threats
    ● Gain an understanding of the threat landscape both from an attacker and defender perspective
  • Five Cloud Security Considerations for CISOs Recorded: Mar 31 2021 32 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation
    2. How to enable Zero Trust Internet access to protect against all Internet threats
    3. How to safeguard against data leakage and SaaS governance
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats
    5. How browser interactions enable continuous threat monitoring
  • How to Stay One Step Ahead of Phishing Attacks Recorded: Mar 23 2021 55 mins
    Greg Maudsley | Menlo Security
    How are you staying ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In this webinar you will learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • How to Eliminate the Arising Threats in the Post-Pandemic Cloud Environment Recorded: Mar 16 2021 36 mins
    Nick Edwards, VP of Product Management | Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital
    transformation, remote working, and cloud migration. Workforces and business
    operations completely decentralized as work from home policies become the permanent
    work reality even post-pandemic for many organizations. 
    Hackers are continuing to exploit these outdated security stacks. As modern enterprises
    implement their cloud transformation, CISOs need to understand how to overcome
    these threats and security risks.
    Join Menlo Security’s Nick Edwards as he discusses how organizations can build a
    more unified approach across systems and multiple endpoints to combat this threat
    landscape.
    Understand and learn:
    ● How to enable Zero Trust Internet access to protect against all Internet threats
    ● How to safeguard against data leakage and SaaS governance
    ● How to ensure complete visibility to SSL traffic and protect against SSL threats
    ● Gain an understanding of the threat landscape both from an attacker and
    defender perspective
  • Security Challenges and Opportunities of Remote Work Recorded: Mar 10 2021 60 mins
    Kowsik Guruswamy CTO - Menlo Security, Justin Crawford, VP of Engineering and Technology - Eckoh
    The COVID-19 pandemic forced many organizations to shift to a remote workforce almost overnight, most of which were not prepared for the sudden change. In their efforts to ensure their employees could remain productive, a number of organizations relaxed their security policies and unwittingly exposed their networks to compromise. As the pandemic continues, security challenges remain, but organizations also now have opportunities to find and fix vulnerabilities and improve their overall security posture, even as their employees eventually migrate back to the office.

    This panel will discuss some of the issues and opportunities that organizations face in the new normal of remote/hybrid work, including:
    - How the pandemic impacted security as a whole, including some of the biggest threats organizations face
    - Lessons learned in shifting to a remote workforce quickly
    - What challenges continue and how organizations can address them effectively
  • Secure Internet: First and Only Security Cloud Built on an Isolation Core™ Recorded: Mar 2 2021 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Adopting Zero Trust Internet to Stop Phishing & Web-Based Attacks Recorded: Feb 25 2021 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too, and moving quickly to exploit crises such as the Australian Bushfires and the global COVID-19 outbreak for financial gain. The increasing success of COVID-19–related attacks is shown in Menlo Security’s data. From February 25 to March 25, 2020, our data shows a 32X increase in the number of successful daily attacks, and these phishing strategies continue to work. According to the 2020 CyberEdge report, 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.
    In this Session You Will Learn:

    Examples of sophisticated attacks
    Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Recorded: Feb 11 2021 57 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • From Security Appliances to Cloud Security Recorded: Feb 4 2021 60 mins
    Kowsik Guruswamy, CTO - Menlo Security & Michael Suby, VP, Security Products Group - IDC
    In this fireside chat, IDC’s VP, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy, discuss the challenges, opportunities, and how to allocate security budgets when migrating to cloud-delivered security.

    With the new norm of working from home, security teams are struggling to use on-premises security to protect remote workers. Today’s security architecture does not have the capacity to handle the surge of remote workers businesses are facing today. Enterprises are turning to cloud-based secure web gateways (SWGs) to secure these challenges.

    So what are the challenges your organization might face when migrating to a cloud-based SWG, and how can you avoid them?

    Join this on-demand fireside chat and enjoy an informative discussion from industry experts—IDC’s Research VP, Security Products Group, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy—on what they are seeing from customers dealing with migrating to a cloud-delivered security architecture

    Learn:

    - Key customer challenges when dealing with remote workers and global office environments
    - How customers are assigning security budgets in the new landscape
    - Why you can’t just move your existing security architecture to the cloud
  • Cloud DLP: Global Visibility and Control for Every User and Device Recorded: Feb 2 2021 9 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Menlo Security’s Cloud Data Loss Prevention (DLP) is powered by an Isolation Core™ to reliably identify and stop data exfiltration. The Cloud DLP suite offers a solution that organizations of any size can use to prevent data leaks and save money. Protect your PII (personally identifiable information), customer, patient, and other sensitive data that should not be publicly available.
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Trust in the Time of Covid-19
  • Live at: May 4 2021 7:50 pm
  • Presented by: Nick Edwards, VP of Product at Menlo Security
  • From:
Your email has been sent.
or close