Hi [[ session.user.profile.firstName ]]

The Professionalization of Hackers

We are no strangers to breaches and compromises but why has it gotten worse? What is happening in the adversary landscape that has changed the attack model from opportunity of convenience to campaign driven assault plans? We’ll highlight the professionalism of hackers and how they are operating as a business to take advantage of organizations of all sizes. The facts presented are from the findings that can be found in Symantec’s 2016 Internet Security Threat Report.
Recorded Sep 8 2016 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
Presentation preview: The Professionalization of Hackers
  • Channel
  • Channel profile
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation May 1 2018 5:00 pm UTC 60 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Apr 12 2018 5:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Symantec Software Asset Management and the Newly Improved Software Portal Mar 22 2018 5:00 pm UTC 60 mins
    Damon Covey, Senior Director, Product Management, Symantec
    Join us for this webinar on March 22, where we will discuss the Symantec approach to software asset management. During this webinar, we will review and demonstrate some of the new capabilities available in Symantec IT Management Suite including the recently updated end user self-service software portal.

    The software portal enables on-demand software delivery and includes these new features:

    Browser agnostic
    Intelligent delivery of applications based on user role and operating system

    Don't miss this great opportunity to learn the latest and greatest information on Symantec IT Management Suite.
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Recorded: Mar 20 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • How to Tackle Data Protection Risk in time for GDPR Compliance Recorded: Mar 15 2018 62 mins
    Sunil Choudrie: Information Protection Strategist, Deena Thomchick: Sr. Dir. Product Mgmt, Steven Grossman: VP Bay Dynamics
    Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents

    The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.

    The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.

    Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.

    During this session, you will learn:

    -Why good risk management and data-centric protection go hand in hand

    -How leading technology helps you discover, monitor and protect personal data, wherever it is

    -Using data analytics to detect, quantify, and prioritize insider threats and outsider risks

    -How to free up your security team by removing unnecessary alerts and distractions

    Please join us, register today
  • Your Hidden Adversary: Understanding and Responding to Fileless Attacks Recorded: Mar 8 2018 55 mins
    Scott Hardie, Prinicipal Solutions Engineer, ATP, Symantec & David Berman, Sr. Mgr, Product Marketing, ATP, Symantec
    Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk.

    This webinar covers the fileless methods targeted attack groups and cybercriminals use and how the capabilities of Symantec Endpoint Detection and Response expose fileless threats that ‘hide in plain sight’ and quickly remediate their impacts – before the worst effects of a breach occur.

    Join us to learn how you can:

    - Detect Fileless attacks with machine learning, behavioral analysis and precise heuristics

    - Gain visibility into suspicious PowerShell activity and shutdown malicious scripts

    - Leverage built-in Malware Analysis file detonation and conviction

    - Streamline deployment of Endpoint Protection and EDR while lowering total cost of ownership

    In addition, we’ll show you Symantec’s EDR solution, ATP: Endpoint, in action, with a demo that showcases powerful investigative tools and one-click remediation of impacted endpoints.

    Register Today
  • Securing Today’s Enterprise The Proof is in the Proxy Recorded: Feb 27 2018 31 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey Recorded: Feb 22 2018 49 mins
    Robert Arandjelovic and Sunil Choudrie, Symantec
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
  • Are you ready for the new MFA requirements for PCI Compliance? Recorded: Feb 21 2018 24 mins
    Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse Recorded: Feb 15 2018 54 mins
    Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec
    It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.

    Register for this webcast for insights on the top 5 threats from the report to consider as well as:

    •The hidden signs of looming data breaches and where to look for them

    •What kind of risky employee activity could expose your most sensitive data

    •Whether file sharing, email and social or a combination change your exploitation risks

    Register Today
  • Performance Enables Better Cloud & Security Adoption Recorded: Feb 13 2018 60 mins
    Kevin Hohenbrink, Principle Product Manager and Mike Chen, Director, Product Marketing
    Today’s network users demand speed, flexibility and a safe operating environment. Symantec is an industry leader with the right technologies to help you achieve these goals.

    This webcast will look at how Symantec PacketShaper improves your security posture and unlocks new capabilities by providing 360-degree network traffic visibility. With complementary products like MACH5, you can realize even bigger gains by optimizing video and rich media content, and other contents on your WAN & Internet links.

    Join us to discover how you can:

    •Boost user experience to improve cloud and security adoption
    •Identify risky apps, encrypted traffic, and security gaps with PacketShaper’s visibility and reporting
    •Learn the unique capabilities and benefits of Symantec’s Performance Optimization products

    Register for the discussion today.
  • Making Sense of Federal IT Modernization Recorded: Feb 8 2018 42 mins
    Ken Durbin, Sr. Strategist Gov't Affairs & Cybersecurity, Symantec & Bill Wright, Director of Government Affairs, Symantec
    Modernizing Federal IT Systems has been discussed for years with little systemic progress, but 2017 changed that when several major initiatives that could lead to significant progress in modernizing efforts were produced.

    In 2017, an Executive Order on Cybersecurity was signed, which led to the creation of the American Technology Council that ultimately produced a comprehensive report on Federal IT Modernization.

    At the same time, Congress passed the Modernizing Government Technology (MGT) Act in order to help fund the modernization efforts.

    Join Symantec for this informative webinar to understand:

    -- The key take-a-ways of the IT Modernization Report
    -- What it could mean to me
    -- Timelines for Implementation
    -- The role of the MGT Act

    Register Today
  • Protect Your Business Against Today’s Advanced Mobile Security Threats Recorded: Feb 1 2018 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.

    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.

    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Best Practices for Data Privacy Day 2018 Recorded: Jan 30 2018 61 mins
    Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec
    Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.

    Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:

    •Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.

    •Define security measures to protect individuals’ personal information from unauthorized access and use.

    •Explore the fundamentals of what personal data means under GDPR

    •Communicate your data use practices to your customers’ and explain how you manage their personal information.

    Register Today
  • Putting the Power of Proxy to Work Recorded: Jan 25 2018 33 mins
    Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.

    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • Secrets Revealed: Effective Protection Against Ransomware Recorded: Jan 18 2018 62 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • GDPR Compliance: Maintaining Security in the Cloud Recorded: Jan 11 2018 62 mins
    Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Frost & Sullivan Names Skycure (Now SEP Mobile) Company of the Year Recorded: Dec 21 2017 3 mins
    Jared Carleton, Principal Consultant Digital Transformation Practice, Frost & Sullivan
    Learn why Skycure (now part of Symantec) has been selected by Frost & Sullivan as their Global Company of the Year for Mobile Enterprise Security.
  • How RNDC Mitigated Malicious Activity on 5000 Mobile Devices Recorded: Dec 19 2017 5 mins
    John Dickson, Director of IT Infrastructure and Cybersecurity, RNDC
    Interested to see how one of the largest companies you have probably never heard of, mitigated malicious activity on 5,000 devices simply by installing Symantec Endpoint Protection Mobile (formerly Skycure)?

    View this video to learn why RNDC, the 2nd largest distributor of premium wine and spirits in the US, chose SEP Mobile to:

    - Secure any mobile device on any network anywhere in the world

    - Protect mobile workforce against known and unknown threats

    - Deploy mobile threat defense quickly and easily on thousands of devices

    View Now
  • How Aetna Mitigated 400 Malware Infections on Mobile Devices Recorded: Dec 19 2017 4 mins
    Brian Heemsoth, Director of Mobile Security, Aetna
    If you are looking for ways to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities, then you may relate to the challenges that Aetna was facing with their mobile workforce.

    Watch this short video to see how Aetna is now protecting itself against a wide variety of mobile threats.

    Learn how Symantec Endpoint Protection Mobile (formerly Skycure) helped Aetna to:

    - Assess 28 million networks and automatically protect devices from 250 risky networks that were found

    - Assess 3.4 million applications and mitigate 400 of them with high-risk malware

    - Receive enthusiastic feedback from end users

    View Now
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Professionalization of Hackers
  • Live at: Sep 8 2016 5:00 pm
  • Presented by: Bob Shaker, Incident Response Product Management, Cyber Security Services, Symantec
  • From:
Your email has been sent.
or close