Hi [[ session.user.profile.firstName ]]

The Professionalization of Hackers

We are no strangers to breaches and compromises but why has it gotten worse? What is happening in the adversary landscape that has changed the attack model from opportunity of convenience to campaign driven assault plans? We’ll highlight the professionalism of hackers and how they are operating as a business to take advantage of organizations of all sizes. The facts presented are from the findings that can be found in Symantec’s 2016 Internet Security Threat Report.
Recorded Sep 8 2016 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
Presentation preview: The Professionalization of Hackers
  • Channel
  • Channel profile
  • Choose what Gartner calls far better protection and much less complexity Jul 27 2017 5:00 pm UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, and respond, all through a single agent

    Did you know McAfee is no longer a Gartner Magic Quadrant leader? And how many agents/modules/servers do they require you to install? Help ensure you get the level of endpoint protection your organization needs.

    Symantec provides the most complete endpoint security anywhere—from threat prevention to detection and response. In this webcast, you’ll learn how you can:

    •Drastically improve your security posture with next-gen technologies.
    •Remediate any attack artifact across all Symantec protected endpoints from one place.
    •Lower your IT burden and reduce complexity through a single agent.
    •Facilitate a painless migration and get your IT staff up and running.

    Stop advanced threats, both known and unknown, with a single lightweight agent.

    Register today for this Informative webinar.
  • Year in Review: Financial Sector Threat Activity Jun 28 2017 6:00 pm UTC 60 mins
    Candid Wuest, Threat Researcher, Symantec & Vikram Thakur, Researcher Security Response, Symantec
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Jun 22 2017 5:00 pm UTC 60 mins
    Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Google Docs and the Future of Phishing Scams Jun 8 2017 8:00 pm UTC 60 mins
    Vikram Thakur, Technical Director Security Response and Ulf Mattsson (Atlantic BT)
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    - David Morris, Pioneer in Cybersecurity

    - Limor Kessem, Global Executive Security Advisor at IBM
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
  • Using the NIST Cybersecurity Framework to Identify Protected Health Information Jun 1 2017 5:00 pm UTC 60 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Vishal Gupta, VP, Engineering/Product Management, Symantec
    Part 2 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    Of the 16 critical infrastructure sectors, healthcare is the only one yet to adopt a formal cybersecurity framework. That may be about to change.

    Join Symantec on June 1 for the second webinar in our series around how healthcare organizations can adopt the NIST Cybersecurity Framework (CSF).

    In this webinar – Using the NIST CSF to Identify Protected Health Information (PHI) – we will look at the Identify function, knowing that you cannot protect what you don’t know you have.

    Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.

    This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

    During this webinar we will:

    -Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization’s assets

    -Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST
  • A Step-By-Step Approach For Endpoint Detection & Response Recorded: May 18 2017 31 mins
    Scott Hardie, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Recorded: May 16 2017 61 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch Recorded: May 16 2017 60 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Symantec IT Management Suite 8.1 and Ghost Solution Suite 3.2 are here!

    We will discuss and demo some of the cool new features such as streamlined processes for updating Windows 10 and Office 365, peer-to-peer content distribution, Mac profile management, and much more!

    We will also have a panel of ITMS 8.1 early adopter customers who have already upgraded to IT Management Suite to share their experiences so you can learn all the do's and don'ts of a successful upgrade.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.1 and Ghost Solution Suite 3.2!

    Please join us for a special webcast on Tuesday, May 16 to learn how these new solutions will make your life easier.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case Recorded: Apr 27 2017 51 mins
    Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • Easy Ways to Improve Your Security Posture Recorded: Apr 20 2017 28 mins
    Kirk Gibbons, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • The Power of the Proxy Recorded: Apr 10 2017 17 mins
    Timothy Chiu is a Senior Director of Product Marketing for Symantec
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • Zero-Day Attacks and What To Do About It? Recorded: Mar 23 2017 32 mins
    Chris Candaffio, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management Recorded: Mar 14 2017 59 mins
    David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance
    Healthcare organizations continue to make headlines as the target of cyberattacks, ransomware threats and the source of large data breaches. Yet according to the latest “Healthcare IT Security and Risk Management Study” conducted by HIMSS Analytics, while investments are being made and more focus is being placed around cyber security, it is still viewed as IT problem, rather than as a business risk management issue.

    Join us for the “Operationalizing Cybersecurity in Healthcare” webinar as we reveal findings from the study and what healthcare leaders can do to address these gaps and shift their organization from a tactical and reactive mindset to a robust and sustainable risk-management program.

    During this webinar, we will also discuss:

    • How IT, Security, Business, and Clinical leaders are approaching cybersecurity readiness and the role it has as part of their risk management strategy

    • What’s driving the decisions on where cybersecurity investments are being made

    • Critical steps to achieving a comprehensive cybersecurity strategy

    Register Today
  • Risk Insight – An Actionable Approach For Your Security Posture Recorded: Mar 3 2017 23 mins
    Marcelo Oliveira, Sr. Director of Product Management, Symantec
    Determining the effectiveness of your security posture is fraught with challenges. You have products in place, but how do you make sense of all the data. And how do you balance the day-to-day operations with the need to proactively improve your security posture?

    Learn how Risk Insight can help you gain the insight you need:

    · Communicate to executive leadership a 360 degree view of your security posture compared to your industry peers

    · Investigate using granular data analysis to identify your most vulnerable endpoints, riskiest users, and more

    · Utilize automated reports from data already available in your environment

    In addition we’ll show you Risk Insight in action, with a demo that showcases the power of the analytics and the simplicity of the interface.

    Watch On-Demand Any Time
  • Unlock Public Cloud Benefits While Maintaining Security Recorded: Mar 2 2017 34 mins
    Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • Doing More With Symantec Control Compliance Suite Recorded: Feb 28 2017 39 mins
    Anand Visvanathan, Principal Product Manager, Symantec
    **Due to a Brighttalk/Amazon Technical Issue, this webinar was recorded on webex for those that couldn't make the session on 2/28 you can view on-demand**

    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    View Now
  • Symantec Cloud Workload Protection Product Demo Video Recorded: Feb 24 2017 2 mins
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Block The Risk Of Ransomware Recorded: Feb 23 2017 31 mins
    Jonathan Korba, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • Demystifying the NIST Cybersecurity Framework for Healthcare Recorded: Feb 9 2017 51 mins
    Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

    This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

    Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

    During this webinar, we will also cover:

    •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

    •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

    •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Professionalization of Hackers
  • Live at: Sep 8 2016 5:00 pm
  • Presented by: Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
  • From:
Your email has been sent.
or close