Hi [[ session.user.profile.firstName ]]

Demystifying the NIST Cybersecurity Framework (CSF): CSF 101

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.

Topics covered will include:

-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
- Its use in both Regulated and Non-Regulated environments
- Common use cases
Recorded Oct 11 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
Presentation preview: Demystifying the NIST Cybersecurity Framework (CSF): CSF 101
  • Channel
  • Channel profile
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Nov 8 2018 4:00 pm UTC 60 mins
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • What’s new? The Broadest and Deepest Cloud Security for SaaS, PaaS & IaaS Nov 1 2018 5:00 pm UTC 60 mins
    Deena Thomchick, Senior Director of Cloud Security, Symantec Linda Park, Senior Manager, IaaS Security & Compliance, Symantec
    Organizations are using more cloud services for more business-critical activities. At the same time organizations face growing privacy regulations, a high rate of data loss (accidental exposures and breaches), and ever-increasing attacks on their cloud assets.

    It is challenging to get the visibility and security you need to protect your Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) clouds as cloud security offerings have been both limited in scope and fragmented across point products.

    Let us show you what’s new and how our solutions will give you the most complete visibility, data security, threat protection and compliance management for your public cloud services with integrated cloud security.

    Learn more about our latest innovations in cloud security for SaaS, PaaS, and IaaS

    •.New Integrated Compliance Management for IaaS – the first Cloud Security Posture Management (CSPM) solution integrated with Cloud Access Security Broker (CASB) and Cloud Workload Protection Platform (CWPP) offering detailed compliance remediation.

    •. Fastest Acting Cloud App Security – the first API-based CASB that can remediate security issues in seconds, with new Fast APIs for Microsoft and Box.

    •. Broadest & Deepest Cloud App Coverage – CASB data security and threat protection for any cloud app, including custom apps.

    •. Best DLP and Threat Protection for IaaS Storage – Gartner Magic Quadrant leading Data Loss Prevention (DLP) and threat protection now integrated with Cloud Workload Protection(CWP) and Gartner Magic Quadrant leading CloudSOC CASB.

    Please Join Us, Register Today
  • A CTO’s Perspective: Network Security for the Cloud Generation Oct 31 2018 3:00 pm UTC 30 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    - A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce
    - The increased complexity of managing full security stack with limited resources
    - The technical challenges of securing cloud applications
    - Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • Cloud Security: Thinking Beyond the Perimeter Oct 25 2018 5:00 pm UTC 60 mins
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Safeguarding the Nation’s Critical Infrastructure Oct 23 2018 5:00 pm UTC 60 mins
    Curtis Barker, Product Portfolio Manager Cloud Security, Symantec
    Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)

    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.

    Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.

    Please Join Us, Register Today
  • Symantec Launches IT Management Suite 8.5 and Ghost Solution Suite 3.3 Oct 23 2018 3:00 pm UTC 60 mins
    Damon Covey, Sr. Director, Product Management, Symantec
    The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are almost here! Please join us for a special webcast on Tuesday, October 23 to learn all about these exciting new solutions.

    We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3 such as the new web console, smart wizards, and much more!

    We will also have a discussion with a panel of early adopters who have already upgraded to IT Management Suite 8.5 so you can learn from their knowledge and experience.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!
  • It’s Everyone’s Job to Ensure Online Safety at Work Oct 18 2018 5:00 pm UTC 60 mins
    AJ Nash, Global Head, Cyber Intelligence Global Security Office, Symantec
    Part 3 of 4: National Cybersecurity Awareness Month (NCSAM)

    As the lines between our work and daily lives become increasingly blurred, it’s more important than ever to be certain that smart cybersecurity is integrated into our lives.

    The focus will be on cybersecurity workforce education, training and awareness with specific focus on understanding adversary objectives and the best practices for thwarting some of the most common adversary actions.

    Please Join Us, Register Today
  • Ask the Experts—Securing Data and Email in Office 365 Oct 17 2018 5:00 pm UTC 60 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: Oct 11 2018 60 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Millions of Rewarding Jobs: Educating For a Career in Cybersecurity Recorded: Oct 10 2018 58 mins
    Charlotte Wylie, Symantec/Christina Noyes,Cyber Security Instructor,AAUW/Scott Gullick,Director Partner Relations,YearUP
    Part 2 of 4: National Cybersecurity Awareness Month (NCSAM)

    Join Symantec nonprofit partners YearUp and AAUW address ways to build the cyber security workforce and how to inspire students to seek highly fulfilling cybersecurity careers.

    Please Join Us, Register Today
  • Protect Your Business Against Today’s Advanced Mobile Cyber Threats Recorded: Oct 9 2018 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.
    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.
    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Make Your Home a Haven for Online Safety Recorded: Oct 3 2018 60 mins
    Paige Hanson, Chief of Identity Education, Symantec; Collin Robinson, National PTA & Larry Magid, CEO, ConnectSafely.org
    Part 1 of 4: National Cybersecurity Awareness Month (NCSAM)

    Kick off National Cybersecurity Awareness Month (NCSAM) with Symantec’s program partners, the National PTA and ConnectSafely to discuss the basic essentials the entire family can deploy to protect their homes against cyber threats.

    Please Join Us, Register Today
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Recorded: Sep 21 2018 43 mins
    Sameer Vasanthapuram, Kevin Stultz and Paul Hortop
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • Part 3 of 3: Secrets of Mature DLP Programs - Getting from "How" to "Wow"! Recorded: Sep 20 2018 49 mins
    Carmine Clementelli, Tim Merriam, Daphne Zhao from Symantec
    In the third and final session of the three-part webcast series:

    Part 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud

    As hybrid cloud infrastructures become the new normal, DLP programs must adapt and expand to ensure that data – where ever it’s located – stays protected. New challenges include uncovering shadow data in unauthorized apps, eliminating multiple islands of DLP overhead, and maintaining performance across on-prem hardware and the cloud.

    Join Symantec on September 20 and Learn how to:

    -Reuse existing DLP policies and workflows for cloud apps

    -Incorporate authentication and encryption with Symantec ICE & VIP

    -Discover sensitive data within cloud apps with Symantec CloudSOC

    Register Today

    About the three-part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure. The need to maintain visibility protection and control over the data is extremely difficult. This is especially true with increasing and more strict compliance laws such as the new California data protection law, GDPR. While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    On-Demand:
    Part 1: First Things First - Understanding "Normal" Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)

    Part 2: Talking it Out - Cross-Functional Communication Key to Mature DLP Programs (View Now: http://bit.ly/0830DLPwebcast)
  • See How Easy It Is To Hack a Mobile Device (Video Demo) Recorded: Sep 18 2018 5 mins
    Symantec
    4 Min Product Demo Video

    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • Learn How the World Continues to Respond to GDPR Recorded: Sep 12 2018 56 mins
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Robert Glaser, Sr. Mgr. Privacy, Deloitte & Touche LLP
    Join us for a webinar on September 12th, as experts from Symantec and Deloitte discuss the impact of the first few months of GDPR. For two years, companies have had the May 25, 2018 GDPR date in the forefront of their planning. However, the scope of this game-changing policy has left over 80% of organizations feeling inadequately prepared.

    In this webinar you will:

    • Discover why protecting data is the best response to GDPR

    •. Learn how the world is embracing GDPR since it's May 25th launch

    •. Hear from industry experts on what to expect in the coming month

    •. Ask questions and learn from your peers on best preparation and adaption practices

    Register Today
  • Part 2 of 3: Secrets of Mature DLP Programs - Getting from "How?" to "Wow !" Recorded: Aug 30 2018 60 mins
    Greg Shadle, Symantec and Josh Carter, Symantec and Matt Reid, ITS
    In the second of the three-part webcast series:

    Part 2: Expanding Your Reach – Doing more with your existing data protection program.

    Infosec teams have been taking on more and more data protection projects. The requests to educate employees on data protection best practices, new technologies that require support, and increasing pressure on data protection has never been greater.

    Learn how leveraging your existing Data Loss Protection (DLP) solution, you can expand coverage using existing DLP policies.

    Key question answered include:

    -How do I maintain visibility and control of my data when it’s shared with partner and contractors?

    -How to get ahead of breaches by getting visibility of where I am most at risk?

    Register Today

    About the 3-Part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure. The need to maintain visibility protection and control over the data is extremely difficult. This is especially true with increasing and more strict compliance laws such as the new California data protection law, GDPR. While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    Upcoming webcasts:
    September 20th: Part 3 of 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud (Register Now: http://bit.ly/0920DLPwebinar)

    On-Demand:
    Part 1 of 3: First Things First - Understanding “Normal” Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)
  • Why Data-Centric Authentication is at the Heart of Zero Trust Recorded: Aug 28 2018 60 mins
    Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
    It’s called a 'data breach' for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a "Zero Trust" model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.

    To implement Zero Trust successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device need to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files, and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.

    In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:

    •What are the components of Zero Trust?
    •How to implement Zero Trust successfully in your organization.
    •What are the important security solutions core to Zero Trust and why data protection and identity are central to this model.
    •What to look for in Zero Trust data-centric authentication vendor.
  • Optimize Cloud-based Analytics to improve SOC team Productivity Recorded: Aug 14 2018 50 mins
    Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence
    Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.

    In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.

    This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.

    Join us to learn how security teams

    -Employ local and global telemetry to continuously improve attack and anomaly detection

    -Find attack patterns with cloud-based analytics before attackers exfiltrate data

    -Quickly convict unknown files with advanced content inspection and sandboxing

    -Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks

    In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
    resource-constrained SOC teams to detect and respond advanced attacks more effectively.

    Register Today
  • Part 1 of 3: Secrets of Mature DLP Programs – Getting from “How?” to “Wow!” Recorded: Aug 9 2018 56 mins
    Salah Nasser, Director Product & GTM Strategy, Symantec and Kyle Black, Director Systems Engineering, Bay Dynamics
    In the first of a three-part webcast series:

    Part 1: First Things First - Understanding “Normal” Through Smart Incident Response and User and Entity Behavior Analytics (UEBA)

    Incident triage dominates daily efforts by Data Loss Prevention (DLP) teams. What’s more is the need to expand DLP policies and channels, i.e. cloud apps and email, are creating more incidents. But more incidents arrive than can be closed - so high risk actions sometimes get missed.

    New user and entity behavior analytics platforms like Symantec Information Centric Analytics (ICA) dramatically reduce false positives, so there’s time to refine processes and educate other organizations.

    Key questions answered include:

    -How to expand existing Data Protection to cover more channels while reducing incident management?

    -What’s abnormal but dangerous activity? and how dangerous is it?

    -How to address more incidents and risky users without changing policies?

    Register Today

    About the 3-Part DLP webcast series:
    The need for data protection continues to increase as organiztions mature, acquire new organizations, adopt cloud applications and infrastructure.

    While each DLP initiative launches with high expectations, many remain immature after years. Root causes can be understood - technology, people, and processes – and addressed so DLP can effectively protect data in the hybrid cloud world.

    This 3-part series features pragmatic insights and lessons learned from mature DLP programs on making their teams effective and getting buy in from their organizations.

    Upcoming webcasts:
    August 30th: Part 2 of 3:Talking It Out – Cross-functional Communication Key to Mature DLP Programs (Register Today http://bit.ly/0830DLPwebcast)

    September 20th: Part 3 of 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud (http://bit.ly/0920DLPwebinar)
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Demystifying the NIST Cybersecurity Framework (CSF): CSF 101
  • Live at: Oct 11 2016 5:00 pm
  • Presented by: Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
  • From:
Your email has been sent.
or close