Hi [[ session.user.profile.firstName ]]

Top 5 Reasons Data Breaches Keep Occurring

James Hanlon, Security Strategist at Symantec breaks down the Top 5 reasons that cyber attacks and data breaches continue to happen, and more importantly, gives his suggestions for how you can reduce the risks to your organisation.

*Statistics used in this video have been taken from Symantec’s 2015 Internet Security Threat Report Vol.20
Recorded Nov 25 2015 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Hanlon, CTO Security Strategist, Symantec
Presentation preview: Top 5 Reasons Data Breaches Keep Occurring
  • Channel
  • Channel profile
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Dec 5 2017 6:00 pm UTC 60 mins
    Symantec
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • Your Proxy Just Got Smarter with Web Isolation Nov 30 2017 6:00 pm UTC 30 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Protecting Critical Infrastructure from Cyber Threats Oct 31 2017 5:00 pm UTC 30 mins
    Kunal Agarwal, GM Internet of Things, Symantec
    The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet.

    Building resilience in critical infrastructure is crucial to our national security.

    Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure.

    It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.

    Register Today
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity Oct 26 2017 5:00 pm UTC 30 mins
    Patrick G. Cohen, VP, Strategic Partnership from NPower Inc.
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers.

    Key influencers like teachers, parents, state and local officials are encouraged to join this webcast to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.

    Register Today
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Oct 19 2017 5:00 pm UTC 30 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • Today's Predictions for Tomorrow's Connected World Oct 18 2017 5:00 pm UTC 30 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before.

    Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.

    Register Today
  • How to Use the NIST CSF to Recover from a Healthcare Breach Oct 17 2017 5:00 pm UTC 60 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Cybersecurity in the Workplace is Everyone's Business Oct 11 2017 5:00 pm UTC 30 mins
    Aaron Cohen, Director Cyber Security Services, Symantec
    Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.

    Register for this webcast to:

    • Hear about the biggest threats and challenges facing organizations

    • Learn about the stages of the attack lifecycle and how to prepare for each stage

    • Understand how to increase your resiliency and train your team

    Register Today
  • The Four Stages of GDPR Readiness Oct 10 2017 5:00 pm UTC 60 mins
    Patrice Payen, CCS Technical Lead and Salah Nassar, Director of Global Product Marketing, Symantec
    Do you know where all of your sensitive data resides in order to assess whether it meets the requirements of GDPR compliance?

    GDPR penalties begin in May 2018, yet many organizations are still developing plans and may not be ready. Symantec has identified a four stage approach to GDPR readiness.

    Join us to learn how implementing this strategy can help you accelerate data discovery and classification to meet the GDPR deadline.

    Key Takeaways:

    · Is your company required to be GDPR compliant? What questions you should be asking your organization to find out.

    · The four stages of GDPR readiness

    · Best Practices when conducting a data discovery and classification assessment.

    Register Today
  • Simple Steps to Online Safety Oct 5 2017 5:00 pm UTC 30 mins
    Paige Hanson, Chief of Identity Education, LifeLock (a Symantec Company)
    What are your top cyber security concerns as a consumer? LifeLock's, Chief of Identity Education, Paige Hanson will provide simple steps to protect you, your organization and family as well as understand what to do if you fall victim to cybercrime.

    Register Today
  • Take Control of the Cloud Chaos Sep 28 2017 5:00 pm UTC 30 mins
    Gerry Grealish, Senior Director, Product Marketing, Symantec
    Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security

    Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.

    In this environment, enterprise security teams are wrestling with questions like:

    - How can I consistently enforce policies governing the use of the web and cloud?
    - How can I effectively protect my users from web-based threats?
    - How can I secure my sensitive data and comply with legal regulations?

    Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.

    Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.

    Register Today
  • Is Your Institution Cyber Ready? Sep 26 2017 6:00 pm UTC 60 mins
    Tim Gallo, Symantec Cyber Security Engineer and Author
    The goal of higher education is “to create prepared minds”. But recently, universities and colleges are finding that they have to defend themselves from cyber-attacks that put everything at risk— their brand, reputation, and intellectual property.

    The ability to respond quickly and effectively is incredibly important, especially for higher education organizations that need to protect a huge amount of confidential data which ranges from proprietary research projects to personally identifiable information. Adding to the complexity is the fact that many end users are accessing networks with personally owned devices, which are not managed by the IT/security teams.

    How prepared is your team to prevent detect and respond to these cyber threats?

    In this webcast you will hear from Tim Gallo, a sales engineer on the Cyber Security Services team, who works with organizations to strengthen their cyber defense.

    Register for this webcast to:

    • Hear about the threats and challenges facing higher education

    • Learn about the stages of the attack lifecycle and how to prepare for each stage

    • Understand how to increase your resiliency and train your team

    • Discover how to optimize your cyber security operations with expertise and threat intelligence
  • Protect Your Hybrid Cloud Workloads from a Single Console Recorded: Sep 20 2017 57 mins
    Dan Frey, Senior Manager, Product Marketing, Symantec & Deepak Dalvi, Product Manager, Symantec
    The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:

    •How to discover, secure, and monitor all of your hybrid cloud workloads from a single console

    •How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts

    •How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
  • Prevent Malware Attacks by Adding the Power of Web Isolation Recorded: Sep 19 2017 31 mins
    Gerry Grealish, Senior Director – Product Marketing, Cloud Security, Symantec
    Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.

    This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.

    Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.

    Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.

    Register Today
  • Prevent Malware Attacks by Adding the Power of Web Isolation Recorded: Sep 14 2017 31 mins
    Gerry Grealish, Senior Director – Product Marketing Cloud Security, Symantec
    Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.

    This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.

    Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.

    Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.

    Register Today
  • Responding to Healthcare Data Breaches with the NIST Cybersecurity Framework Recorded: Sep 12 2017 55 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Part 5 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    A cybersecurity event is occurring in you hospital. What do you do? Will you be prepared and can you quickly and efficiently take action or simply stand by and watch it unfold? The ability to respond to a cyberattack in a timely fashion is incredibly important, especially for healthcare organizations that house loads of personally identifiable information that is critical to their care delivery mission.



    In this webinar, taking place September 12 at 1pm eastern, we will explore the RESPOND function of the NIST CSF and what tools and processes healthcare organizations need in order to minimize impact during a cyber incident. 



    Webinar attendees will learn:

    •The different aspects of the RESPOND function of the NIST CSF, along with which activities security experts believe to be the most important.

    •A detailed look at all the categories of the RESPOND function and how they work in harmony with other parts of the NIST CSF.

    •The most important controls and solutions available to have in place when an incident does occur.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 6-7 https://resource.elq.symantec.com/LP=4235
  • Smart Governance: Defining Your IT Strategy Recorded: Aug 31 2017 55 mins
    Route Fifty | Underwritten by: Symantec
    Now more than ever, IT leaders are dealing with changing policies, new and varying risks, increasing demands and restricted budgets, but they must continue to operate their information technology services responsibly and with transparency. Strong IT governance is an integral component for state governments across the country in tackling today’s challenges while also innovating for the future.

    During this digital viewcast, we’ll speak with state technology officials about how to build and execute a strategic IT governance framework that allows for agility, provides secure and efficient services, modernizes processes and technologies, optimizes resources and ultimately ensures mission success.


    Click "Attend" to confirm your registration.
  • Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security Recorded: Aug 31 2017 48 mins
    Alan Hall, Content & Malware Analysis, Symantec & Yvonne Dresser, Messaging Gateway, Symantec
    Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and remediation to the email channel.


    Join Symantec product team members from Messaging Gateway and Content & Malware Analysis to get an overview of Messaging Gateway and learn how this combined solution addresses today’s latest email borne threats through:
    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with our product experts and get your questions answered!
  • Comprehensive Protection and Visibility into Advanced Email Attacks Recorded: Aug 30 2017 49 mins
    Nirav Shah, Manager, Product & GTM Strategy, Symantec & Naveen Palavalli, Director, Product & GTM Strategy, Symantec
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Recorded: Aug 22 2017 34 mins
    Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 5 Reasons Data Breaches Keep Occurring
  • Live at: Nov 25 2015 11:20 am
  • Presented by: James Hanlon, CTO Security Strategist, Symantec
  • From:
Your email has been sent.
or close