Hi [[ session.user.profile.firstName ]]

Demystifying the NIST Cybersecurity Framework (CSF): CSF 101

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) was originally focused on the Critical Infrastructure Sectors but is quickly being adopted by organizations of all types and sectors. Should you consider adopting the CSF? This webinar will provide you with a solid understanding of the CSF to help you decide if it’s right for you. We’ve invited Adam Sedgewick, Senior Information Technology Policy Advisor, National Institute of Standards and Technology, to join us on this informative webinar.

Topics covered will include:

-A brief history of the CSF and its development
-The goals and outcomes it was designed to address
-The three main components of the CSF: Core, Profile & Tiers
- Its use in both Regulated and Non-Regulated environments
- Common use cases
Recorded Oct 11 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
Presentation preview: Demystifying the NIST Cybersecurity Framework (CSF): CSF 101
  • Channel
  • Channel profile
  • Zero Trust - The Complete Picture Nov 19 2020 4:00 pm UTC 60 mins
    Vadim Lander, Identity Security CTO & Distinguished Engineer
    The concept of “Zero Trust” or “Trust but Verify” has been around for quite a while. But now, because of the expanding perimeter, API-driven architecture, IoT, and microservices, there is no way to accomplish this if it means manual intervention. But what does a Zero Trust architecture look like? What will happen if you use Zero Trust?

    Join Vadim Lander, Symantec Identity Security CTO & Distinguished Engineer at Broadcom, where he will describe what a comprehensive Zero Trust environment needs to include to achieve your identity security goals without unnecessary disruption to your users, your developers, or your business processes.
  • Don’t Let Attackers Exploit Your Blind Spots to Evade Detection! Nov 17 2020 6:00 pm UTC 45 mins
    Gavin Fulton, Director, Endpoint Security Product Management, Symantec, A Division of Broadcom
    Organizations around the globe are strengthening their Endpoint Protection Platforms and Endpoint Detection and Response to combat today’s ever expanding threats. Yet, many continue to be exploited by attackers’ use of the very tools and applications that they trust and utilize in their day-to-day business operation.

    In this webinar, we will discuss the new feature updates Symantec is launching to provide more visibility into these activities and to protect your users and assets going forward.

    In this session, November 17, 10 am PT, you will learn more about how these enhancements can help you to:
    • Capture additional script information at runtime
    • Block scripts, documents, and other non-executables
    • Improve correlation and process lineage information
  • Web Security Service: The Past Present and Future of Network Security Nov 10 2020 6:00 pm UTC 60 mins
    Alex Campbell, Product Manager, and Tim Murphy, Product Evangelist, from the Symantec Enterprise Division of Broadcom
    It goes without saying that the past year has produced some memories that none of us are likely to forget. But perhaps lost within the noise are significant advancements to the Symantec cloud-delivered Secure Web Gateway solution, Web Security Service (WSS). A year ago Symantec became part of the Broadcom family and now seems like a good time to pause and reflect on recent WSS achievements along with a glimpse of what’s ahead.

    Join Alex Campbell, Product Manager for Symantec Web Security Service and Tim Murphy, Product Evangelist for Symantec SASE Solutions as they cover:

    • Web Security Service innovation and recent enhancements
    • WSS response to supporting a COVID-19 remote workforce
    • New WSS network backbone
    • A future built on a SASE foundation
    • Coming attractions
    • Answers to your questions

    We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
  • Targeted Ransomware: Today’s Most Dangerous Threat to Organizations Nov 6 2020 3:00 am UTC 45 mins
    Dick O'Brien, Principal Research Editor Jon DiMaggio, Senior Cyber Intelligence Analyst from Symantec, A Division of Broadcom
    Ransomware is the number one threat to enterprise environments. Today's attackers spend days or sometimes weeks in a target environment before executing a ransomware attack. When a human is performing a ransomware attack and is live on a victim's network, it requires a very different response.

    No organization regardless of industry or geography is immune.

    Join Dick O'Brien, principal research editor, and Jon DiMaggio, senior cyber intelligence analyst, to learn about Symantec’s research into the “on network” human-driven actions of several of the world’s most prolific ransomware attack groups.

    You’ll learn about:
    - The evolution of ransomware attacks
    - New tricks that targeted ransomware attackers are using to extort victims
    - Profiles of the world’s most insidious attack groups
    - How your organization can best protect itself from these threats
  • Targeted Ransomware: Today’s Most Dangerous Threat to Organizations Nov 5 2020 4:00 pm UTC 45 mins
    Dick O'Brien, Principal Research Editor Jon DiMaggio, Senior Cyber Intelligence Analyst from Symantec, A Division of Broadcom
    Ransomware is the number one threat to enterprise environments. Today's attackers spend days or sometimes weeks in a target environment before executing a ransomware attack. When a human is performing a ransomware attack and is live on a victim's network, it requires a very different response.

    No organization regardless of industry or geography is immune.

    Join Dick O'Brien, principal research editor, and Jon DiMaggio, senior cyber intelligence analyst, to learn about Symantec’s research into the “on network” human-driven actions of several of the world’s most prolific ransomware attack groups.

    You’ll learn about:
    - The evolution of ransomware attacks
    - New tricks that targeted ransomware attackers are using to extort victims
    - Profiles of the world’s most insidious attack groups
    - How your organization can best protect itself from these threats
  • Protecting Against Complex Email Attacks, Symantec Network Security Oct 28 2020 3:00 pm UTC 60 mins
    Saritha Chadalavada, Lead Product Manager and Sunil Choudrie, Product Marketing Manager, from Symantec, A Divison of Broadcom
    Email is a leading threat vector being used to deliver malware, advanced threats and fraudulent content. Organizations are at high risk of financial loss as emails targeting their staff are used to defraud them. Join Saritha Chadalavada (Lead Product Manager, Email Security) and Sunil Choudrie (Product Marketing Manager) from the Symantec enterprise division of Broadcom, as they cover:
    • The shift from malicious email to email with malicious intent
    • Why many layers of protection are needed to defeat today’s complex attacks
    • A simple to deploy technology that stops ransomware and phishing attacks
    • The latest enhancements in Symantec Email Threat Analytics

    Register today to see how the shifting trends in Email Security impact your organization.
  • 件名: シマンテック新エンドポイントセキュリティソリューションのウェビナーのご案内 Recorded: Oct 15 2020 61 mins
    林 聡 プリンシパルソリューションスペシャリスト Satoshi Hayashi, Symantec Enterprise Division, Broadcom
    この多難な時代、企業は在宅での作業に伴う複雑さの増大など、拡大する攻撃対象に対応するためのシームレスなエンドポイントソリューションを必要としています。
    このウェビナーでは、シマンテックの新しいクラウド管理機能を利用して、攻撃対象の縮小、攻撃と侵害の防止、検出と対応など、攻撃チェーン全体の脅威を効果的に制御する方法をご紹介します。
    10月15日(木)午前 11 時(日本時間)より、シマンテックエンタープライズ事業部の林 聡よりシマンテックの新エンドポイントセキュリティソリューションについて、ご説明申し上げます。Symantec Endpoint Security Complete(SESC)と Symantec Endpoint Security Enterprise(SESE)からなる新ソリューションをご活用いただくことで、リモートワークを含めた様々な働き方改革と生産性向上をセキュリティを心配することなく実現できます。
    このセッションでは、以下の内容をご紹介します。
    •企業が実施しなければならない最低限のセキュリティ対策とは何か?
    •働き方改革において直面する課題とエンドポイントに求められる要件
    •エンドポイントに必要なものすべてがパッケージされたSESのご紹介
    •標的型攻撃に対して、SESはどのくらい有効なのか?
    •質疑応答
  • Symantec Security Analytics: Full Network Visibility for Swift Incident Response Recorded: Oct 14 2020 61 mins
    Bryan Cardoza, Product Management and Alan Hall, Product Marketing, Symantec Enterprise Division of Broadcom
    Learn about the new developments in Symantec Security Analytics that deliver comprehensive Network Traffic Analysis and Forensics for swift incident response:

    • Conduct effective threat hunting
    • Identify the root cause of an attack
    • Understand the full context and find out what happened before, during and after an attack
    • Gain visibility in your data center, remote offices and cloud workloads
    • Respond with laser focus and precision response

    Join Bryan Cardoza and Alan Hall from the Symantec Enterprise Division of Broadcom to see what’s new and what it means for your organization and Incident Response teams.
  • Security Analytics Video Recorded: Oct 12 2020 3 mins
    Security Analytics Video
    Security Analytics Video
  • New Symantec Secure Web Gateway = Greater Flexibility and Stronger Security Recorded: Sep 23 2020 60 mins
    Paul Kao, Product Management, Symantec Enterprise Division, Alan Hall, Product Marketing, Symantec Enterprise Division
    Join Symantec’s Network Security Team to find out what’s new with Symantec’s industry-leading Secure Web Gateway solution and what it means for security teams. Better protection, greater performance, simplified licensing, new features, and more!

    We’ll uncover the new hardware and licensing options and how it will help you strengthen your security posture, on-premises, in the cloud or any hybrid combination. Secure your network, users, and data with the most advanced threat protection available.
  • Threat Risk Levels: Taking Your Intelligence Services to the Next Level Recorded: Sep 16 2020 59 mins
    Matt Willden, Product Mgr., Symantec Intelligence Services, Chris Larsen, Architect - WebPulse Symantec Threat Research Lab
    Enterprise network security teams need to implement granular and effective controls over their web traffic, even when a category assignment is not available from their web filters. The key is to customize and deploy threat risk control policies based on specific business needs and risk tolerance levels. Doing this helps eliminate high-risk web traffic, while allowing access to sanctioned websites and applications with acceptable risk levels.

    Join Matt Willden, Product Manager for Intelligence Services from Symantec Enterprise Division of Broadcom and Chris Larsen, Architect from the Symantec WebPulse Threat Research Lab as they provide insight into:

    - How Threat Risk Levels work and differ from URL categories
    - Why they go deeper than web filtering and categorization
    - Strategies using threat risk levels with web isolation technology
    - Examples of their success in real-world application
    - Answers to your questions

    We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Sep 10 2020 59 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. During this webinar, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Aug 26 2020 60 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. On August 26, 10 am PT, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Extending Your Symantec Identity Solutions with Our Security Services Platform Recorded: Aug 20 2020 56 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    As you transition to Digital IAM, take stock of how you are using your Symantec Identity Security solutions today and how to extend them into the future. Broadcom has developed a security services platform that will do just that – allow you to implement IAM business services used to secure, manage, and provision access underpinned by a unified, cloud-native architecture of policy, risk, session, and analytics with a common data model.

    Join Vadim Lander to learn how these services seamlessly integrate with your existing solutions so that you can transition to Digital IAM while driving automation and security benefits.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Recorded: Aug 13 2020 47 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Privileged Identity Management: Building a Zero Trust Organization Recorded: Aug 6 2020 17 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In the Forrester Report, “A Practical Guide to Zero Trust Implementation”, Forrester recommends that companies implement privileged identity management as part of their Zero Trust projects. However, some organizations may not see the connection between Zero Trust and PIM.

    In part 3 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss how PIM technologies help organizations achieve Zero Trust.

    They will also cover the “least privilege” model and wrap up this series with advice on best practices for implementing or enhancing PIM capabilities.
  • シマンテックウェビナー - ゼロトラストセキュリティモデルの導入方策 Recorded: Aug 6 2020 61 mins
    に開催されるウェビナーでは、Broadcom
    今後のセキュリティ対策をより高度化する上で、「ゼロトラスト」という考え方が重要視されつつあります。組織が「ゼロトラスト」モデルに基づいたセキュリティアーキテクチャの再設計を進める中で、コストや複雑さに悩まされることなく、望ましい「ゼロトラスト」を達成するための方策が求められています。

    8 月 6日 (木) 午前 11 時 (日本時間) に開催されるウェビナーでは、Broadcom のシマンテックエンタープライズ事業部の山内 正が、シマンテック製品を活用したゼロトラストセキュリティモデルの導入支援についてご紹介申し上げます。

    このウェビナーでは、以下のような貴重な情報を提供します。
    •「ゼロトラスト」セキュリティモデルを採用することで解決する主な課題
    •今日、これらの課題を優先的に取り組むことが重要な理由
    •「ゼロトラスト」セキュリティ対策シナリオの概要と、シマンテックのポートフォリオがエンドツーエンドの実装を可能にし、コストと複雑さの障壁を取り除く方法
  • Aggressive and Unpredictable: The Threat Posed by North Korean Cyber Attackers Recorded: Aug 5 2020 45 mins
    Dick O'Brien, Principal Research Editor, Sylvester Segura, Threat Intelligence Analyst, Javier Santoyo, Technical Director
    While no organization should assume that it is at low risk of a state-sponsored attack, this is doubly the case when it comes to North Korea-linked groups. While attackers linked to the country’s regime have been heavily involved in espionage-type attacks, they have branched out into destructive sabotage attacks and a range of financially motivated attacks. Organizations of all sizes may be potential targets and take steps to mitigate the risk of attack.

    Join Dick O’Brien, principal research editor, and Sylvester Segura, threat intelligence analyst, from Symantec’s Critical Attack Discovery and Intelligence team, along with Javier Santoyo, technical director for Symantec Endpoint Security, to learn about:
    • The North Korean cyber ecosystem
    • The varying motivations behind attacks by North Korean groups
    • A deep dive into the operations of Stonefly, a North Korean group heavily involved in stealing industrial and military secrets
    • How customers can best use Symantec products to protect themselves from these threats
  • Securing Your Remote Workforce with Symantec Recorded: Aug 5 2020 62 mins
    Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom
    Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks.
    Securing a remote workforce has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution only adds complexity and cost, eliminating many of the benefits that come with embracing digital transformation.

    Please join, Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom on Wednesday August 5 at 1pm AEST/11am SG time as he discusses the Symantec Secure Remote Access Framework and learn about:
    • The challenges and risks of securing a remote workforce
    • Best practices for empowering a secure remote workforce on your digital transformation journey
    • How Symantec can help you confidently enable a remote workforce without adding risk or complexity
  • How Symantec’s Zero Trust for Data Solution Can Prevent Your Next Data Breach Recorded: Aug 4 2020 55 mins
    Michael Dubinsky, Head of PM, Henk Van Achterberg, Technical Architect, Symantec Enterprise Division, Broadcom
    A key challenge for many CISOs driving and securing an organization’s undergoing digital transformation is protecting the corporate data from unauthorized or malicious access, while maintaining visibility and compliance in order to stay protected against data breaches.

    Please join, Michael Dubinsky, Head of Product Management for Zero Trust and Henk Van Achterberg, Technical Architect for Zero Trust, Symantec Enterprise Division, Broadcom as they discuss:

    • How to effectively secure your data and workloads regardless of who, where or what device is performing the access
    • The importance of maintaining visibility, control and compliance
    • How Symantec’s “Zero Trust for Data” protects your data, prevents attacks and optimizes security operation
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Demystifying the NIST Cybersecurity Framework (CSF): CSF 101
  • Live at: Oct 11 2016 5:00 pm
  • Presented by: Ken Durbin, Unified Security Strategist, Symantec, Adam Sedgewick, Senior Information Technology Policy Advisor, NIST
  • From:
Your email has been sent.
or close