Hi [[ session.user.profile.firstName ]]

The Professionalization of Hackers

We are no strangers to breaches and compromises but why has it gotten worse? What is happening in the adversary landscape that has changed the attack model from opportunity of convenience to campaign driven assault plans? We’ll highlight the professionalism of hackers and how they are operating as a business to take advantage of organizations of all sizes. The facts presented are from the findings that can be found in Symantec’s 2016 Internet Security Threat Report.
Recorded Sep 8 2016 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
Presentation preview: The Professionalization of Hackers
  • Channel
  • Channel profile
  • Securing Today’s Enterprise The Proof is in the Proxy Feb 27 2018 6:00 pm UTC 30 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • Top 5 Risks of Employee Cloud App Use and Abuse Feb 15 2018 6:00 pm UTC 60 mins
    Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec
    Cloud app adoption and use is exploding as forward thinking organizations quickly realize the
    productivity, collaboration, and cost benefits of migrating to the cloud.

    With accelerating cloud adoption comes increased risk from hackers, malicious insiders, and risky employees, leaving IT and security pros scrambling to secure their increasingly vulnerable cloud accounts and confidential data.

    This webcast will explore the 5 top real-world threats to cloud apps and data based on:

    - An analysis of over 22K cloud apps
    - 465M cloud documents
    - 2.3B emails from the latest Shadow Data Report.

    The webcast will provide actionable insights into cloud application adoption, usage, and threats to help organizations unlock the full business potential of cloud apps while staying secure and compliant.

    Register Today
  • Performance Enables Better Cloud & Security Adoption Feb 13 2018 6:00 pm UTC 60 mins
    Kevin Hohenbrink, Principle Product Manager and Mike Chen, Director, Product Marketing
    Today’s network users demand speed, flexibility and a safe operating environment. Symantec is an industry leader with the right technologies to help you achieve these goals.

    This webcast will look at how Symantec PacketShaper improves your security posture and unlocks new capabilities by providing 360-degree network traffic visibility. With complementary products like MACH5, you can realize even bigger gains by optimizing video and rich media content, and other contents on your WAN & Internet links.

    Join us to discover how you can:

    •Boost user experience to improve cloud and security adoption
    •Identify risky apps, encrypted traffic, and security gaps with PacketShaper’s visibility and reporting
    •Learn the unique capabilities and benefits of Symantec’s Performance Optimization products

    Register for the discussion today.
  • Making Sense of Federal IT Modernization Feb 8 2018 6:00 pm UTC 60 mins
    Ken Durbin, Sr. Strategist Gov't Affairs & Cybersecurity, Symantec & Bill Wright, Director of Government Affairs, Symantec
    Modernizing Federal IT Systems has been discussed for years with little systemic progress, but 2017 changed that when several major initiatives that could lead to significant progress in modernizing efforts were produced.

    In December 2017, an Executive Order on Cybersecurity was signed, which led to the creation of the American Technology Council that ultimately produced a comprehensive report on Federal IT Modernization.

    At the same time, Congress passed the Modernizing Government Technology (MGT) Act in order to help fund the modernization efforts.

    Join Symantec for this informative webinar to understand:

    -- The key take-a-ways of the IT Modernization Report
    -- What it could mean to me
    -- Timelines for Implementation
    -- The role of the MGT Act

    Register Today
  • Protect Your Business Against Today’s Advanced Mobile Security Threats Feb 1 2018 6:00 pm UTC 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.

    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.

    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Best Practices for Data Privacy Day 2018 Jan 30 2018 6:00 pm UTC 60 mins
    Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec
    Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.

    Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:

    •Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.

    •Define security measures to protect individuals’ personal information from unauthorized access and use.

    •Explore the fundamentals of what personal data means under GDPR

    •Communicate your data use practices to your customers’ and explain how you manage their personal information.

    Register Today
  • Putting the Power of Proxy to Work Jan 25 2018 6:00 pm UTC 30 mins
    Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.

    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • Secrets Revealed: Effective Protection Against Ransomware Recorded: Jan 18 2018 62 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • GDPR Compliance: Maintaining Security in the Cloud Recorded: Jan 11 2018 62 mins
    Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Frost & Sullivan Names Skycure (Now SEP Mobile) Company of the Year Recorded: Dec 21 2017 3 mins
    Jared Carleton, Principal Consultant Digital Transformation Practice, Frost & Sullivan
    Learn why Skycure (now part of Symantec) has been selected by Frost & Sullivan as their Global Company of the Year for Mobile Enterprise Security.
  • How RNDC Mitigated Malicious Activity on 5000 Mobile Devices Recorded: Dec 19 2017 5 mins
    John Dickson, Director of IT Infrastructure and Cybersecurity, RNDC
    Interested to see how one of the largest companies you have probably never heard of, mitigated malicious activity on 5,000 devices simply by installing Symantec Endpoint Protection Mobile (formerly Skycure)?

    View this video to learn why RNDC, the 2nd largest distributor of premium wine and spirits in the US, chose SEP Mobile to:

    - Secure any mobile device on any network anywhere in the world

    - Protect mobile workforce against known and unknown threats

    - Deploy mobile threat defense quickly and easily on thousands of devices

    View Now
  • How Aetna Mitigated 400 Malware Infections on Mobile Devices Recorded: Dec 19 2017 4 mins
    Brian Heemsoth, Director of Mobile Security, Aetna
    If you are looking for ways to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities, then you may relate to the challenges that Aetna was facing with their mobile workforce.

    Watch this short video to see how Aetna is now protecting itself against a wide variety of mobile threats.

    Learn how Symantec Endpoint Protection Mobile (formerly Skycure) helped Aetna to:

    - Assess 28 million networks and automatically protect devices from 250 risky networks that were found

    - Assess 3.4 million applications and mitigate 400 of them with high-risk malware

    - Receive enthusiastic feedback from end users

    View Now
  • Tools for Evaluating a Mobile Threat Defense Solution Recorded: Dec 18 2017 44 mins
    Mic McCully, Senior Solutions Consultant, Symantec
    Are you evaluating Mobile Threat Defense solutions?

    This webinar will give you tools and information to make your evaluation process easier and ensure your success.

    View this webinar to learn about:

    - RFP best practices and success criteria

    - What to look for during a trial

    - Questions to ask during a reference call

    View Today
  • CISO Panel: Managing and Mitigating Mobile Device Risk Recorded: Dec 18 2017 57 mins
    David Fairman CISO, Royal Bank of Canada, Ed Amoroso CEO, TAG Cyber and Yair Amit VP, Modern OS Security, Symantec
    The widespread use of smartphones and tablets has changed the risk model for many organizations that now enable workers to access corporate information on the go.

    View this dynamic webinar to learn how you can manage your mobile security risk by drawing on the expertise of the security industry leaders pictured above.

    Topics of discussion include:

    What are the biggest challenges that enterprises face today when it comes to mobile devices?

    What are some of the current approaches enterprises are taking to secure mobile devices? What are the pros and cons?

    How do you measure and report on mobile security risk?

    What is CISO's role when it comes to risk management and how it has evolved?

    View Today
  • SANS Research: A Holistic Approach to Securing Mobile Data and Devices Recorded: Dec 18 2017 63 mins
    Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, Symantec
    The ubiquitous use of mobile devices has radically changed the landscape of data protection, and the abundance of applications only complicates the situation.

    How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.

    View this on-demand webinar to learn:

    - What role security tools such as analytics can play in managing mobile devices

    - How mobile devices and data are currently protected and how effective those protections are

    - Common attack vectors and possible mitigation strategies

    - Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility

    View Today
  • Three Secrets to Becoming a Mobile Security Super Hero Recorded: Dec 18 2017 66 mins
    John Dickson, Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC)
    How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

    Learn how to become the mobile security superhero at your company by following these 3 steps:

    - Prove to your management that mobile security threats are real by showing real examples

    - Review the SANS Institute checklist to help choose the right mobile threat defense solution

    - Provide monthly reports to management to increase visibility and prove that the organization is secure

    View this recorded webinar to hear from a real mobile security superhero, John Dickson, who details his own hero journey as Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC), the second largest beverage alcohol distributer in the U.S.
  • How Healthcare CISOs Can Secure Mobile Devices that Access Sensitive Information Recorded: Dec 18 2017 60 mins
    Jim Routh,CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec
    SEP Mobile research found that around 18 million Android devices have at least one medical app and a high-risk malware on it. The study also found that 1.96% of all devices in any organization are at a high risk of getting compromised.

    How do you create a mobile environment that is HIPAA compliant, secure, resilient and enables employees for increased productivity as compared to constraining them?

    View this on-demand webinar with Jim Routh, CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec, to learn:

    - About the state of mobile security in Healthcare organizations
    - How to improve incident response and resilience of mHealth IT operations
    - How to leverage risk-based mobility to predict, detect and protect against threats
  • Strategy and Tactics for Securing Mobile Devices in Financial Organizations Recorded: Dec 18 2017 56 mins
    Brian Heemsoth, Director of Software & Mobile Security, Aetna
    Protecting financial data has gotten drastically more difficult in the age of mobility, with always-on, always-connected computers in our pockets. A whole new approach is required to effectively defend against mobile malware attacks, network attacks and attacks against OS vulnerabilities.

    View this webinar with Brian Heemsoth, Director of Software & Mobile Security at Aetna, to learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.

    Key Learning Objectives:

    - How Aetna addressed 23.97 high risk vulnerabilities per device, mitigated 701 malware infections and 460 instances of high risk networks

    - How to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities

    - How to make your workforce more agile and productive with mobile devices, while protecting corporate data from theft

    View Today
  • Defense Against a Ransomware Attack: Latest Research and Best Practices Recorded: Dec 12 2017 61 mins
    Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • CASB 2.0 How CASB Needs to Evolve to Integrate with Your Security Infrastructure Recorded: Dec 11 2017 42 mins
    Deena Thomchick,Senior Director, Outbound Product Management for Cloud Security, Symantec
    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, advanced malware protection, and web and endpoint security.

    This webinar will explore this next frontier of CASB Solutions.

    View Now
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Professionalization of Hackers
  • Live at: Sep 8 2016 5:00 pm
  • Presented by: Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
  • From:
Your email has been sent.
or close