Hi [[ session.user.profile.firstName ]]

Demystifying Insider Threat

What is “Insider Threat?” The term Insider Threat means different things to different people. We’ll walk you through the three types of Insider Threat as defined by the Carnegie Mellon CERT; Insider Sabotage, Theft of Intellectual Property, and Fraud, and provide real world examples of each.

We'll explain how Insider Threat impacts individuals, both personally and professionally, the economy, business and National Security.

Most important will explore how to defend against Insider Threat with a focus on the best in class solutions Symantec provides to help you win the battle.

By attending this webcast you will learn:

- What is Insider Threat?
- Why we all should care about this threat
- Solutions to defend against Insider Threat
Recorded Mar 10 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kenneth Durbin,Unified Security Practice Manager for Symantec and Tom Blauvelt,Security Architect for Symantec
Presentation preview: Demystifying Insider Threat
  • Channel
  • Channel profile
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Dec 5 2017 6:00 pm UTC 60 mins
    Symantec
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • Your Proxy Just Got Smarter with Web Isolation Nov 30 2017 6:00 pm UTC 30 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Official Launch of Symantec Control Compliance Suite 12.0 Nov 2 2017 5:00 pm UTC 60 mins
    Vishal Gupta, VP Engineering, Symantec and Anand Visvanathan, Principal Product Manager, Symantec
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webcast on Thursday, November 2 to find out what’s new in this release and how it will better help you to:

    • Measure and prove compliance with security regulations, mandates, and best practices
    • Determine risk and prioritize remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • Data Loss Prevention (DLP) 15 - The Information Centric Security Generation Nov 2 2017 3:00 pm UTC 60 mins
    Salah Nassar, Director Product Marketing, Symantec
    Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.

    In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.

    Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.

    Register Today
  • Protecting Critical Infrastructure from Cyber Threats Oct 31 2017 5:00 pm UTC 30 mins
    Kunal Agarwal, GM Internet of Things, Symantec
    The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet.

    Building resilience in critical infrastructure is crucial to our national security.

    Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure.

    It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.

    Register Today
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity Oct 26 2017 5:00 pm UTC 30 mins
    Patrick G. Cohen, VP, Strategic Partnership from NPower Inc.
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers.

    Key influencers like teachers, parents, state and local officials are encouraged to join this webcast to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.

    Register Today
  • How CASB Needs to Evolve to Integrate with Your Security Infrastructure Oct 25 2017 8:00 pm UTC 45 mins
    Eric Andrews, VP Cloud Security, Symantec
    Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)

    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.

    This talk will explore this next frontier of CASB solutions.

    Register Today
  • Addressing The Security Challenges of the Cloud Generation Oct 24 2017 4:00 pm UTC 45 mins
    Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products
    Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.

    Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:

    - How do we effectively govern access to data, apps and systems?

    - How can we combat advanced threats targeting our business through the web, cloud and e-mail?

    - How should we secure information that is moving between our network, endpoints and the cloud?

    Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Recorded: Oct 19 2017 32 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • Today's Predictions for Tomorrow's Connected World Recorded: Oct 18 2017 31 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    In the new world of IoT, smart cities, smart cars and home, our personal devices are more connected than ever before.

    Learn about predicting the future by looking at the past with insights on how to improve the world of IoT that is coming into our homes.

    Register Today
  • How to Use the NIST CSF to Recover from a Healthcare Breach Recorded: Oct 17 2017 60 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Combating Advance Threats Recorded: Oct 11 2017 4 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Protect remote users and Mobile devices from the rapidly evolving threat landscape
  • Ensuring Safe & Compliant SaaS Application Use Recorded: Oct 11 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Managing sanctioned and unsanctioned cloud application use with consistent security and data compliance controls
  • Enabling Simple Move To Cloud Recorded: Oct 11 2017 2 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    How to enforce consistent security and compliance polices when moving to the cloud
  • Cybersecurity in the Workplace is Everyone's Business Recorded: Oct 11 2017 35 mins
    Aaron Cohen, Director Cyber Security Services, Symantec
    Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.

    Register for this webcast to:

    • Hear about the biggest threats and challenges facing organizations

    • Learn about the stages of the attack lifecycle and how to prepare for each stage

    • Understand how to increase your resiliency and train your team

    Register Today
  • The Four Stages of GDPR Readiness Recorded: Oct 10 2017 60 mins
    Patrice Payen, CCS Technical Lead /Sunny Athwal, Corporate Council /Salah Nassar, Director Global Product Marketing, Symantec
    Do you know where all of your sensitive data resides in order to assess whether it meets the requirements of GDPR compliance?

    GDPR penalties begin in May 2018, yet many organizations are still developing plans and may not be ready. Symantec has identified a four stage approach to GDPR readiness.

    Join us to learn how implementing this strategy can help you accelerate data discovery and classification to meet the GDPR deadline.

    Key Takeaways:

    · Is your company required to be GDPR compliant? What questions you should be asking your organization to find out.

    · The four stages of GDPR readiness

    · Best Practices when conducting a data discovery and classification assessment.

    Register Today
  • Simple Steps to Online Safety Recorded: Oct 5 2017 28 mins
    Paige Hanson, Chief of Identity Education, LifeLock (a Symantec Company)
    What are your top cyber security concerns as a consumer? LifeLock's, Chief of Identity Education, Paige Hanson will provide simple steps to protect you, your organization and family as well as understand what to do if you fall victim to cybercrime.

    Register Today
  • Take Control of the Cloud Chaos Recorded: Sep 28 2017 30 mins
    Gerry Grealish, Senior Director, Product Marketing, Symantec
    Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security

    Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.

    In this environment, enterprise security teams are wrestling with questions like:

    - How can I consistently enforce policies governing the use of the web and cloud?
    - How can I effectively protect my users from web-based threats?
    - How can I secure my sensitive data and comply with legal regulations?

    Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.

    Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.

    Register Today
  • Is Your Institution Cyber Ready? Recorded: Sep 26 2017 41 mins
    Tim Gallo, Symantec Cyber Security Engineer and Author
    The goal of higher education is “to create prepared minds”. But recently, universities and colleges are finding that they have to defend themselves from cyber-attacks that put everything at risk— their brand, reputation, and intellectual property.

    The ability to respond quickly and effectively is incredibly important, especially for higher education organizations that need to protect a huge amount of confidential data which ranges from proprietary research projects to personally identifiable information. Adding to the complexity is the fact that many end users are accessing networks with personally owned devices, which are not managed by the IT/security teams.

    How prepared is your team to prevent detect and respond to these cyber threats?

    In this webcast you will hear from Tim Gallo, a sales engineer on the Cyber Security Services team, who works with organizations to strengthen their cyber defense.

    Register for this webcast to:

    • Hear about the threats and challenges facing higher education

    • Learn about the stages of the attack lifecycle and how to prepare for each stage

    • Understand how to increase your resiliency and train your team

    • Discover how to optimize your cyber security operations with expertise and threat intelligence
  • Protect Your Hybrid Cloud Workloads from a Single Console Recorded: Sep 20 2017 57 mins
    Dan Frey, Senior Manager, Product Marketing, Symantec & Deepak Dalvi, Product Manager, Symantec
    The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:

    •How to discover, secure, and monitor all of your hybrid cloud workloads from a single console

    •How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts

    •How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Demystifying Insider Threat
  • Live at: Mar 10 2016 6:00 pm
  • Presented by: Kenneth Durbin,Unified Security Practice Manager for Symantec and Tom Blauvelt,Security Architect for Symantec
  • From:
Your email has been sent.
or close