Hi [[ session.user.profile.firstName ]]

Phishing Readiness: Is your team ready?

Phishing continues to be one of the most prevalent and effective threats to organizations. Combating hackers that are determined to compromise your users requires a unique blend of tools, strategy and training.

Join our webinar to learn about:

•How to train your users to recognize these attacks more effectively and reduce your organization’s risk

•Using Phishing Readiness to simulate attacks such as Point and Click, Attachments and Data exposure at a level which would impact the employees directly

•See how to measure the effectiveness of your Phishing Readiness campaigns and show the changes in user behavior

Register now to ensure you have the right techniques, tools and procedures in place to deliver an effective Security Awareness Program.
Recorded Nov 15 2016 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Griffin, Product Manager, Cyber Security Services, Symantec
Presentation preview: Phishing Readiness: Is your team ready?
  • Channel
  • Channel profile
  • 件名: シマンテック新エンドポイントセキュリティソリューションのウェビナーのご案内 Oct 15 2020 2:00 am UTC 60 mins
    Satoshi Hayashi, Symantec Enterprise Division, Broadcom
    この多難な時代、企業は在宅での作業に伴う複雑さの増大など、拡大する攻撃対象に対応するためのシームレスなエンドポイントソリューションを必要としています。
    このウェビナーでは、シマンテックの新しいクラウド管理機能を利用して、攻撃対象の縮小、攻撃と侵害の防止、検出と対応など、攻撃チェーン全体の脅威を効果的に制御する方法をご紹介します。
    10月15日(木)午前 11 時(日本時間)より、シマンテックエンタープライズ事業部の林 聡よりシマンテックの新エンドポイントセキュリティソリューションについて、ご説明申し上げます。Symantec Endpoint Security Complete(SESC)と Symantec Endpoint Security Enterprise(SESE)からなる新ソリューションをご活用いただくことで、リモートワークを含めた様々な働き方改革と生産性向上をセキュリティを心配することなく実現できます。
    このセッションでは、以下の内容をご紹介します。
    •企業が最低限行わなければならないセキュリティ対策とは?
    •EDR導入企業が直面している課題
    •シマンテックだけが提供できる価値
    •モバイルのセキュリティ対策が重要な理由
    •モバイルに求められるセキュリティ要件とは?
    •モバイルにおけるSESC/SESEの価値
    •標的型攻撃に対して、SESはどのくらい有効なのか?
    •SESC と SESE の活用に関する質疑応答
  • Symantec Security Analytics: Full Network Visibility for Swift Incident Response Oct 14 2020 3:00 pm UTC 60 mins
    Bryan Cardoza, Product Management and Alan Hall, Product Marketing, Symantec Enterprise Division of Broadcom
    Learn about the new developments in Symantec Security Analytics that deliver comprehensive Network Traffic Analysis and Forensics for swift incident response:

    • Conduct effective threat hunting
    • Identify the root cause of an attack
    • Understand the full context and find out what happened before, during and after an attack
    • Gain visibility in your data center, remote offices and cloud workloads
    • Respond with laser focus and precision response

    Join Bryan Cardoza and Alan Hall from the Symantec Enterprise Division of Broadcom to see what’s new and what it means for your organization and Incident Response teams.
  • New Symantec Secure Web Gateway = Greater Flexibility and Stronger Security Recorded: Sep 23 2020 60 mins
    Paul Kao, Product Management, Symantec Enterprise Division, Alan Hall, Product Marketing, Symantec Enterprise Division
    Join Symantec’s Network Security Team to find out what’s new with Symantec’s industry-leading Secure Web Gateway solution and what it means for security teams. Better protection, greater performance, simplified licensing, new features, and more!

    We’ll uncover the new hardware and licensing options and how it will help you strengthen your security posture, on-premises, in the cloud or any hybrid combination. Secure your network, users, and data with the most advanced threat protection available.
  • Threat Risk Levels: Taking Your Intelligence Services to the Next Level Recorded: Sep 16 2020 59 mins
    Matt Willden, Product Mgr., Symantec Intelligence Services, Chris Larsen, Architect - WebPulse Symantec Threat Research Lab
    Enterprise network security teams need to implement granular and effective controls over their web traffic, even when a category assignment is not available from their web filters. The key is to customize and deploy threat risk control policies based on specific business needs and risk tolerance levels. Doing this helps eliminate high-risk web traffic, while allowing access to sanctioned websites and applications with acceptable risk levels.

    Join Matt Willden, Product Manager for Intelligence Services from Symantec Enterprise Division of Broadcom and Chris Larsen, Architect from the Symantec WebPulse Threat Research Lab as they provide insight into:

    - How Threat Risk Levels work and differ from URL categories
    - Why they go deeper than web filtering and categorization
    - Strategies using threat risk levels with web isolation technology
    - Examples of their success in real-world application
    - Answers to your questions

    We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Sep 10 2020 59 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. During this webinar, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Aug 26 2020 60 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. On August 26, 10 am PT, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Extending Your Symantec Identity Solutions with Our Security Services Platform Recorded: Aug 20 2020 56 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    As you transition to Digital IAM, take stock of how you are using your Symantec Identity Security solutions today and how to extend them into the future. Broadcom has developed a security services platform that will do just that – allow you to implement IAM business services used to secure, manage, and provision access underpinned by a unified, cloud-native architecture of policy, risk, session, and analytics with a common data model.

    Join Vadim Lander to learn how these services seamlessly integrate with your existing solutions so that you can transition to Digital IAM while driving automation and security benefits.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Recorded: Aug 13 2020 47 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Privileged Identity Management: Building a Zero Trust Organization Recorded: Aug 6 2020 17 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In the Forrester Report, “A Practical Guide to Zero Trust Implementation”, Forrester recommends that companies implement privileged identity management as part of their Zero Trust projects. However, some organizations may not see the connection between Zero Trust and PIM.

    In part 3 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss how PIM technologies help organizations achieve Zero Trust.

    They will also cover the “least privilege” model and wrap up this series with advice on best practices for implementing or enhancing PIM capabilities.
  • シマンテックウェビナー - ゼロトラストセキュリティモデルの導入方策 Recorded: Aug 6 2020 61 mins
    に開催されるウェビナーでは、Broadcom
    今後のセキュリティ対策をより高度化する上で、「ゼロトラスト」という考え方が重要視されつつあります。組織が「ゼロトラスト」モデルに基づいたセキュリティアーキテクチャの再設計を進める中で、コストや複雑さに悩まされることなく、望ましい「ゼロトラスト」を達成するための方策が求められています。

    8 月 6日 (木) 午前 11 時 (日本時間) に開催されるウェビナーでは、Broadcom のシマンテックエンタープライズ事業部の山内 正が、シマンテック製品を活用したゼロトラストセキュリティモデルの導入支援についてご紹介申し上げます。

    このウェビナーでは、以下のような貴重な情報を提供します。
    •「ゼロトラスト」セキュリティモデルを採用することで解決する主な課題
    •今日、これらの課題を優先的に取り組むことが重要な理由
    •「ゼロトラスト」セキュリティ対策シナリオの概要と、シマンテックのポートフォリオがエンドツーエンドの実装を可能にし、コストと複雑さの障壁を取り除く方法
  • Aggressive and Unpredictable: The Threat Posed by North Korean Cyber Attackers Recorded: Aug 5 2020 45 mins
    Dick O'Brien, Principal Research Editor, Sylvester Segura, Threat Intelligence Analyst, Javier Santoyo, Technical Director
    While no organization should assume that it is at low risk of a state-sponsored attack, this is doubly the case when it comes to North Korea-linked groups. While attackers linked to the country’s regime have been heavily involved in espionage-type attacks, they have branched out into destructive sabotage attacks and a range of financially motivated attacks. Organizations of all sizes may be potential targets and take steps to mitigate the risk of attack.

    Join Dick O’Brien, principal research editor, and Sylvester Segura, threat intelligence analyst, from Symantec’s Critical Attack Discovery and Intelligence team, along with Javier Santoyo, technical director for Symantec Endpoint Security, to learn about:
    • The North Korean cyber ecosystem
    • The varying motivations behind attacks by North Korean groups
    • A deep dive into the operations of Stonefly, a North Korean group heavily involved in stealing industrial and military secrets
    • How customers can best use Symantec products to protect themselves from these threats
  • Securing Your Remote Workforce with Symantec Recorded: Aug 5 2020 62 mins
    Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom
    Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks.
    Securing a remote workforce has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution only adds complexity and cost, eliminating many of the benefits that come with embracing digital transformation.

    Please join, Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom on Wednesday August 5 at 1pm AEST/11am SG time as he discusses the Symantec Secure Remote Access Framework and learn about:
    • The challenges and risks of securing a remote workforce
    • Best practices for empowering a secure remote workforce on your digital transformation journey
    • How Symantec can help you confidently enable a remote workforce without adding risk or complexity
  • How Symantec’s Zero Trust for Data Solution Can Prevent Your Next Data Breach Recorded: Aug 4 2020 55 mins
    Michael Dubinsky, Head of PM, Henk Van Achterberg, Technical Architect, Symantec Enterprise Division, Broadcom
    A key challenge for many CISOs driving and securing an organization’s undergoing digital transformation is protecting the corporate data from unauthorized or malicious access, while maintaining visibility and compliance in order to stay protected against data breaches.

    Please join, Michael Dubinsky, Head of Product Management for Zero Trust and Henk Van Achterberg, Technical Architect for Zero Trust, Symantec Enterprise Division, Broadcom as they discuss:

    • How to effectively secure your data and workloads regardless of who, where or what device is performing the access
    • The importance of maintaining visibility, control and compliance
    • How Symantec’s “Zero Trust for Data” protects your data, prevents attacks and optimizes security operation
  • Privileged Identity Management: What is Privilege and How is it Changing? Recorded: Jul 30 2020 13 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    The concept of “privileged” has grown beyond traditional IT users. In many organizations, we now have business users with business roles that give them the ability to download an entire customer database from their CRM or Marketing Automation systems.

    In part 2 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss the need to redefine what it means to be “privileged” and what that means for your business.
  • Symantec Competition: They Can't Handle the Truth Recorded: Jul 30 2020 61 mins
    Art Gilliland, SVP & GM, Kevin O’Leary, VP of Network R&D, Saritha Chadalavada, Email PM, Nate Fitzgerald, Web PM, Symantec
    The Symantec acquisition by Broadcom is opening up tremendous opportunities to streamline operations and to drive increased focus of our large R&D investment and product strategy in the key areas where we have established Enterprise Security market leadership. Our focus on customer innovation has created fear in our competition, who have spent the last six months aggressively going after market share while we integrated into Broadcom. While competition is understandable, we did not expect the degree with which Zscaler and Proofpoint would be so “economical with the truth” - making outright false claims.

    Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and subject matter experts from the Symantec Network R&D and Engineering teams as we walk through the real strength of Symantec’s Network Security Portfolio, address some of the egregious claims made and explore why Zscaler and Proofpoint find the truth so challenging. During this hour we will look at:

    - Why the Broadcom acquisition has set up Symantec to reach new heights
    - How Proofpoint is challenged in telling the truth
    - Outlandish statements Zscaler has made to distort reality

    We can guarantee what we present is ethical and the truth. Reserve your seat today, this will be a discussion you won’t want to miss.
  • Symantec Competition: They Can't Handle the Truth Recorded: Jul 29 2020 61 mins
    Art Gilliland, SVP & GM, Kevin O’Leary, VP of Network R&D, Saritha Chadalavada, Email PM, Nate Fitzgerald, Web PM, Symantec
    The Symantec acquisition by Broadcom is opening up tremendous opportunities to streamline operations and to drive increased focus of our large R&D investment and product strategy in the key areas where we have established Enterprise Security market leadership. Our focus on customer innovation has created fear in our competition, who have spent the last six months aggressively going after market share while we integrated into Broadcom. While competition is understandable, we did not expect the degree with which Zscaler and Proofpoint would be so “economical with the truth” - making outright false claims.

    Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and subject matter experts from the Symantec Network R&D and Engineering teams as we walk through the real strength of Symantec’s Network Security Portfolio, address some of the egregious claims made and explore why Zscaler and Proofpoint find the truth so challenging. During this hour we will look at:

    - Why the Broadcom acquisition has set up Symantec to reach new heights
    - How Proofpoint is challenged in telling the truth
    - Outlandish statements Zscaler has made to distort reality

    We can guarantee what we present is ethical and the truth. Reserve your seat today, this will be a discussion you won’t want to miss.
  • Privileged Identity Management: Customer Challenges and Maturity Recorded: Jul 23 2020 14 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In recent years we have seen changes in how we view privileged identity management. Initially, the main emphasis was on securing root and reigning in the super admins; yet lately, we have seen virtual and cloud environments introduce new types of privileged accounts.

    In part 1 of this series, Merritt Maxim, VP, Research Director from Forrester, and Clayton Donley, VP of Symantec Identity Security will discuss:

    • Customer challenges associated with a dynamically changing environment
    • Emerging requirements not being addressed by PIM vendors today

    They will also provide insight into the maturity path that customers are facing.
  • How Enterprises Can Effectively Operate Zero Trust Environments Recorded: Jul 21 2020 61 mins
    Manoj Sharma, Technical Director of Zero Trust, Symantec; Dr. Chase Cunningham, Principal Analyst, Forrester
    Join us as Dr. Chase Cunningham, Principal Analyst at Forrester, and Manoj Sharma, Technical Director at Symantec, discuss why zero trust is becoming an urgent priority for enterprises focused on protecting their users and data, and offer timely recommendations on how to build and operate a zero-trust architecture.

    Tune into this webinar to explore and get answers about:
    • What it really means to implement the zero trust model vs. traditional perimeter defenses
    • How security teams are operationalizing zero trust to enable cloud migration and remote workforce scenarios
    • How to assess your zero trust maturity and plan your own implementation journey

    *This session is eligible for CPE credits with ISC(2).
  • Webinar: Mudando a vida das pessoas em tempos de Pandemia Recorded: Jul 21 2020 63 mins
    Alexandre Siqueira- HCL , Wagner Brunca - Broadcom.
    Webinar Language: Portuguese

    Transformação Digital - Mudando a vida das pessoas em tempos de Pandemia. Como a tecnologia pode literalmente transformar a vida das pessoas. Cenários reais e novas propostas trazendo inspiração para o novo normal.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Recorded: Jul 16 2020 48 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Phishing Readiness: Is your team ready?
  • Live at: Nov 15 2016 6:00 pm
  • Presented by: James Griffin, Product Manager, Cyber Security Services, Symantec
  • From:
Your email has been sent.
or close