How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe
Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.
Join our webcast on December 8, 2015, and you will learn how Symantec's Advanced Threat Protection solution is the first solution that can:
- Uncover a full range of threats - from persistent threats to zero-day
attacks-across your endpoints, network, and email
- Prioritize what matters most by correlating local intelligence with everything Symantec sees through its massive global telemetry
- Remediate threats quickly from a single console, all without deploying new endpoint agents
-Leverage existing agents, which means there is no need to deploy agents on top of Symantec Endpoint Protection or Symantec Email Security.cloud
Looking forward to seeing you at the upcoming webinar December 8th
RecordedDec 8 201532 mins
Your place is confirmed, we'll send you email reminders
Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.
This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.
Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.
During this webinar, we will also cover:
•Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture
•Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations
•Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach
Get advice on evaluating cloud security products from our guest speaker, Andras Cser, primary author of Forrester's first Wave Report on Cloud Security. He will discuss the risks associated with adopting cloud applications and services and how cloud security gateways (CSG), also known as CASBs, can help protect your organization with integrated data protection and activity monitoring.
This webcast will include insights from the recently released report, The Forrester Wave™: Cloud Security Gateways Q4 2016, which evaluated 8 of the most significant CSG vendors against 23 different criteria.
Frank Torrence, Channel Technical Enablement Manager, Symantec
With the rise of cloud adoptions and ease of access to business and learning applications, higher education institutions are finding it increasingly difficult to maintain data integrity, authentication, and security for its students and faculty.
Join Symantec’s Frank Torrence, to discuss industry best practices for higher education to leverage Cloud Access Security Broker (CASB) and Data Loss Prevention(DLP) capabilities to provide auditing, reporting, and security for applications data wherever it resides.
In this webcast you will learn how to:
- Ensure secure cloud application and data access for students, teachers and faculty
- Secure your network from the cloud to the ”ground”
- Maintaining data integrity and security without sacrificing access
- Provide an environment that allows freedom and ease of use for all connected users.
Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
The Digital Privacy Act (DPA) from Canada is here…are you ready? The Government of Canada passed the Digital Privacy Act (DPA), which amends and updates the existing federal privacy legislation. As a business in Canada what does this mean to you and are you ready?
Aside from the obvious ramifications of a breach such as lost data and revenue, one of the many new requirements of the DPA requires all Canadian organizations to “keep and maintain a record of every breach of security safeguards involving personal information under its control.”
Attend this Webcast to learn how to use the National Institute of Standards and Technology (NIST) with Cybersecurity Framework (CSF) as a tool to help determine if you’re ready for this new, important legislation.
Key Learning Objectives:
-Basic overview of NIST Cybersecuity Framework (CSF)
-Review what the Canadian Digital Privacy Act (DPA) requirements are to your organization
-Understand how to utilize the CSF to prepare for the Digital Privacy Act
Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.
Join us to discover:
•How machine learning addresses unknown threats
•Why Symantec Endpoint Protection 14 machine learning is unique
•Where it fits in a layered solution
In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.
Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.
ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.
Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
Kevin Haley, Director of Product Management for Symantec Security Technology and Response
Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.
Key Learning Objectives:
- A look at the current state of ransomware
- Simple and inexpensive steps that can advance state and local government security posture
- Better understanding of the cyber security landscape
- Best practices to take in cyber defense
Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.
Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.
Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.
- A basic understanding of the Cybersecurity Framework.
-The purpose and scope of the recently released NIST Small Business Information Security Publication.
-A review of the alignment of Symantec solutions to the Cybersecurity Framework.
Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation
2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.
As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.
Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks
Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.
Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:
- How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.
Once again it's been a bad year for computer security. But while we are focused on the increased threats of IoT devices as the year comes to an end, a lot of other significant security events and malware threats appeared all through the year. And they all have significance for next year.
This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
While attacks by nation-states and on-line extortion are grabbing the headlines the biggest threat to small and medium businesses remains banking trojans. These threats are flooding user’s mailboxes, trying to get a foothold on computers to empty out the victims banks accounts.
Small and medium sized businesses are a favorite target and can have devastating effects for a business that finds its bank account cleaned out.
James Griffin, Product Manager, Cyber Security Services, Symantec
Phishing continues to be one of the most prevalent and effective threats to organizations. Combating hackers that are determined to compromise your users requires a unique blend of tools, strategy and training.
Join our webinar to learn about:
•How to train your users to recognize these attacks more effectively and reduce your organization’s risk
•Using Phishing Readiness to simulate attacks such as Point and Click, Attachments and Data exposure at a level which would impact the employees directly
•See how to measure the effectiveness of your Phishing Readiness campaigns and show the changes in user behavior
Register now to ensure you have the right techniques, tools and procedures in place to deliver an effective Security Awareness Program.
Adrian Sanabria, Senior Security Analyst at 451 Research & Kevin Haley, Director Security Response at Symantec
In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?
Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.
Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.
Key Learning Objectives:
•What is the state of the industry for Endpoint Protection technology
•Why machine learning is not enough
•Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
Integrated cyber defense stops tomorrow’s advanced threats as well as today’s
Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
Sunil Choudrie, Global Solutions Manager, Deena Thomchick, Sr. Director Cloud Security & Linda Park, Sr. Product Manager
The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.
So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.
We will explain how Symantec technology addresses this approach and how you will benefit from:
•Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
•Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
•Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
Dennis York, Lead Incident Response Investigator, Symantec and Darian Lewis, Senior Principal Security Analyst, Symantec
Did you know that just opening a compromised web page could allow dangerous code to install on a PC or smartphone? You don’t have to click “accept” for a download or software update to install malware on your machines and trigger an infection and the consequences can be enormous.
Why you need to build 24 X 7 threat monitoring into your environment
Ransomware is an extremely profitable type of attack. It only takes one network-connected device to expand a malware infection and hold an entire organization hostage for profit. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
- Learn from our cyber security experts about what can happen in a ransomware attack, based on real-life events.
-Understand how the malware entered the IT infrastructure of two different companies, and find out how long it stayed and the impact to these businesses.
-Will show you how attacks are identified and remediated, as well as some best practices for handling ransomware attacks, should one occur in your company.
Improve your line of defense against ransomware and minimize the loss of key data, money and intellectual property from your organization.
Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.
Topics covered will include:
-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
-Its use in both Regulated and Non-Regulated
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
How to Use An Advanced Threat Protection Solution To Keep Your Organization SafePiero DePaoli, Sr. Director, Product Marketing, Symantec | Morgan Wright, Media Analyst, Center for Digital Government[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]31 mins