Hi [[ session.user.profile.firstName ]]

GDPR Compliance: Maintaining Security in the Cloud

Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

Join us to learn how to enable safe cloud adoption while maintaining compliance.

Key Takeaways:

• How to address security and compliance challenges when migrating to the cloud

• How to support GDPR compliance in the cloud

• Leverage a single data protection solution for email, storage, network, endpoints, and cloud

Register Today
Recorded Jan 11 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
Presentation preview: GDPR Compliance: Maintaining Security in the Cloud
  • Channel
  • Channel profile
  • Zero Trust: A Plan for Implementation Sep 16 2021 3:00 pm UTC 60 mins
    Vadim Lander, CTO & Distinguished Engineer
    In the first webinar in his Zero Trust series, Vadim Lander described the complete picture of a Zero Trust environment – the ultimate goal. Then, in the second webinar, he described how Zero Trust works.

    In this webinar, Vadim boils it down to practical implementation and suggests a plan for achieving Zero Trust. He also outlines how to transition from static to contextual to intelligent observation to achieve the level of maturity you need to satisfy your business goals. He will discuss outcomes required for each level of Zero Trust maturity.
  • Making Sense of the MITRE Evaluations - Symantec Endpoint Security Jun 24 2021 6:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Adam Licata, Director of Endpoint PM, Adam Glick, Software Engineer
    Now that the 2020 MITRE ATT&CK results are out, and everyone’s had a chance to review performance scores, it’s time to take a more careful look. What do they mean? How were the tests done? And how is MITRE ATT&CK different from other evaluations?

    Join us for a panel discussion, June 24, 11 am PT, with Director of Security Response Kevin Haley, Director of Endpoint Product Management Adam Licata, and Software Engineer Adam Glick. They will discuss the details of the MITRE results and how to use them to strengthen security in your organization.
  • Do you know DLP? Recorded: Jun 16 2021 50 mins
    Kedar Apte, Head of DLP Core Product Management and Sunil Choudrie, DLP Product Marketing Manager, Symantec
    Symantec Data Loss Prevention is a powerful solution, and we want to help you get the most out of it. Join us in a webinar focused on helping you get maximum value from your DLP program. We will address the most common questions that our customers ask, highlight key features and answer any other questions you have.
  • Adaptive Protection - Level Up Your Endpoint Security Recorded: Jun 10 2021 59 mins
    Kevin Haley, Director, Symantec Security Response, Symantec and Michael Suby, Research Vice President, IDC
    With cyber attackers more motivated than ever, how can organizations strengthen their endpoint security?

    Symantec Security Response Director Kevin Haley and IDC Research Vice President Michael Suby are with us in this webinar to discuss how our new Adaptive Protection feature, part of Symantec Endpoint Security Complete, can help you turn the tables on attackers and better protect your data and endpoints. In this session:

    • Explore why a one-size-fits all approach to endpoint security does not work
    • Learn about Adaptive Protection and how it can streamline your security work streams
    • Listen to several case studies to understand the real-world value of Adaptive Protection
  • A Hybrid Approach on Your Journey Towards Cloud-delivered Secure Web Gateway Recorded: Jun 9 2021 56 mins
    John Grady, Senior Analyst, Network Security, ESG and Alan Hall, Symantec Network Information Security
    While a cloud-delivered Secure Web Gateway (SWG) is the ultimate destination for most security organizations, many are early in their journey and are taking a measured approach moving forward. Whether due to compliance concerns, network complexity, or simply preference, many organizations will continue to manage on-premises SWGs as part of a hybrid approach, while progressing to the cloud over time. What is best for your organization and which path will you take?...Will you maintain a primarily on-premises SWG footprint, immediately move your SWG and policies to the cloud, or navigate to somewhere in-between through a hybrid approach?

    Join the discussion with security analyst firm, ESG and Symantec, a Division of Broadcom on how an "all-or-nothing" approach isn't the only option and how a hybrid approach to an effective SWG might be the approach for you.
  • We’re on Your Cloud Journey: Symantec Endpoint Security Recorded: May 27 2021 61 mins
    Adam Licata, Director Endpoint Product Management, Symantec Endpoint Security, Broadcom
    As the drive to cloud adoption continues to accelerate, Symantec Endpoint Security is streamlining the path for those enterprises on the journey. Join us for a webinar with Endpoint Product Management Director Adam Licata, Thursday, May 27, 2021, 11 am PST, to learn more about our expanded Endpoint Security cloud features. In this session, you will:

    • Learn about the most important new features recently released on our Endpoint cloud console
    • Find out how you can use them to defend against today’s increasingly aggressive attacks
    • See a demo of how they enhance protection, simplify detection and response and integrate with SEP Mobile and more.

    Our Speaker
    Adam Licata, Director Endpoint Product Management, Symantec Endpoint Security, Broadcom
  • Delivering on Outcomes of XDR: How to Know in Seconds If You’ve Been Impacted Recorded: May 26 2021 44 mins
    Shad Harris, Senior Security Expert at Broadcom; Ashwin Radhakrishnan, Product Manager at Anomali
    With the integration of Anomali Match and Symantec Integrated Cyber Defense Exchange (ICDx), security operations teams can know in seconds if they’ve been impacted by a newly discovered threat, and benefit from continuous, real-time matching as new intelligence is ingested.

    Join us on May 26, 9 am PT (12pm ET) for a special webinar with Shad Harris of Symantec at Broadcom and Ashwin Radhakrishnan of Anomali, as they talk in-depth about leveraging deeply rich threat intelligence to know within seconds if you’ve been breached.

    • What security telemetry is collected from Symantec and streamed into Anomali Match?
    • What does it take to deploy both ICDx and Anomali Match?
    • How does Match help you get the most out of your log data and threat intelligence?
    • What does a SOC analyst see when viewing data in Match?
  • Securing the Future of Remote Work with CloudSOC Mirror Gateway Recorded: May 25 2021 42 mins
    Dori Varas, Senior Product Management, Stephen Hearty, Senior Product Marketing
    In your rush to get employees up and running from home, did you have time to optimise the security experience? The future of remote work is here to stay and it’s essential that all your employees have a secure way to access cloud services.

    Discover how Symantec CloudSOC Mirror Gateway provides high level security on unmanaged devices without needing an agent or the use of reverse proxy technologies.

    Join us for a special webinar as we address:

    - The challenges with providing secure access for unmanaged devices (BYOD) and the limitations of Reverse Proxy.
    - What is CloudSoc Mirror Gateway, how it secures cloud access for your remote workforce, and the benefits to your organization.
    - How to implement a data centric Zero Trust security solution that secures the future of remote working.
  • New Symantec Research: Attackers Hiding in Plain Sight Recorded: May 18 2021 41 mins
    Kevin Haley (Director, Symantec Security Response) and Dick O’Brien (Senior Research Editor)
    Dual-use tools, once only the domain of APT groups, are now used in ransomware attackers and other cyber crimes. Symantec blocked 1.4 billion attempts by attackers to use these tools in 2020.

    Based on newly released research, this webinar will cover:

    - How attackers are living off the land with dual-use tools
    - What you can do to defend against these common and yet sophisticated attacks
  • Endpoint Security: See More, Find More, Do More Recorded: May 13 2021 61 mins
    Bill Bowles III, Technical Director, Symantec Endpoint Security, Broadcom
    Discover the Rich Capabilities in Symantec EDR

    In these days of growing threats and increasing demands on your time in the SOC, are you looking for ways to get more value out of your Symantec Endpoint Detection and Response (EDR) feature? Join us for a webinar on Thursday, May 13, 2021, 11 am PST, for a live demo and talk where Client Services Consultant Bill Bowles will share his special tips and tricks for maximizing your time and increasing your effectiveness when using Symantec EDR. You will:

    • Learn about the integration between our Targeted Attack Analytics tool and EDR with a demo of how it can help with detection and response to aggressive attacks such as SolarWinds.
    • Find out how to query the Endpoint directly as well as the dataset provided by EDR for evidence of compromise.

    Our Speaker
    Bill Bowles III, Client Services Consultant, Symantec Endpoint Security, Broadcom
  • Is Mobile a Weak Link in Your Endpoint Protection? Recorded: Apr 29 2021 45 mins
    John Gfeller VI, Solutions Engineer, Symantec Endpoint Security
    Now that work from home has become a regular routine, mobile devices are playing an even more critical role in business. At the same time, mobile has increasingly become an attractive target for malicious actors. Join us in a webinar on April 29, 2021, 11 am PT, with Symantec Mobile Engineers Mike Soto and Devyn Prasad who will discuss the key factors every enterprise should consider when building their mobile defense. In this session, you will:

    • Find out why skipping mobile protection in your security plan is not an option
    • Learn why you need mobile technologies that protect against a wide range of mobile threats without sacrificing employee productivity
    • Hear the details of the important elements of a robust mobile defense
    • See a real-world attack illustrating what can happen if a malicious actor successfully pulls off an attack

    Our Speakers
    Devyn Prasad, Product Manager, Symantec Endpoint Security
    Mike Soto, Mobile Product Engineer, Symantec Endpoint Security
  • Securing the Future of Remote Work with CloudSOC Mirror Gateway Recorded: Apr 28 2021 43 mins
    Dori Varas, Senior Product Management, Stephen Hearty, Senior Product Marketing
    In your rush to get employees up and running from home, did you have time to optimise the security experience? The future of remote work is here to stay and it’s essential that all your employees have a secure way to access cloud services.

    Discover how Symantec CloudSOC Mirror Gateway provides high level security on unmanaged devices without needing an agent or the use of reverse proxy technologies.

    Join us for a special webinar as we address:

    - The challenges with providing secure access for unmanaged devices (BYOD) and the limitations of Reverse Proxy.
    - What is CloudSoc Mirror Gateway, how it secures cloud access for your remote workforce, and the benefits to your organization.
    - How to implement a data centric Zero Trust security solution that secures the future of remote working.
  • Zero Trust – How it Works Recorded: Apr 27 2021 55 mins
    Vadim Lander, Identity Security CTO & Distinguished Engineer
    In his first webinar in his Zero Trust series, Vadim Lander described the complete picture of a Zero Trust environment – the ultimate goal. In this webinar Vadim will go into detail of how it works in the context of API infrastructure with continuous analytics and authorization within every session. He will also cover how to bring it into your traditional IAM environment so it can benefit too.
  • Extended Detection and Response (XDR): The Promise. The Potential. The Journey. Recorded: Apr 22 2021 59 mins
    Dave Gruber, Senior Analyst, Enterprise Strategy Group, Adam Licata, Director Product Management Endpoint Security, Symantec
    The promise of Extended Detection and Response (XDR) is significant—cyber security companies across the globe are jumping on the XDR bandwagon, with many repositioning existing offerings as XDR products. But with so many XDR offerings available, which solution is the right fit for your organization?

    Dave Gruber of the Enterprise Strategy Group (ESG) and Adam Licata of Symantec explore what XDR is, what different approaches to XDR exist, and ESG research showing how security teams want to adopt it.

    Join us for a special webinar as we fact-check the state of XDR:

    - What is XDR and what value can it deliver?
    - XDR today vs. the future potential of XDR
    - Breaking down of XDR and its core capabilities
    - Symantec’s approach to enabling XDR
  • Delivering on Outcomes of XDR: Threat Analytics and Visualization Recorded: Apr 21 2021 61 mins
    Kyle Black, Technical Director Jeremy Follis, Technical Director, Network Security
    Extended Detection and Response (XDR) helps drive stronger security and faster response times, if as promised, it enables your security operations center to focus on mitigating the most urgent threats. How? Collecting telemetry across all control points, normalizing it, and then applying analytics to uncover trends in malicious events, user behavior, or network anomalies. Delivering that deeply rich correlated and aggregated intelligence to your security operations team in a simple and visual way allows your team to quickly respond to previously unknown risks. XDR drives efficiencies, allowing your Level 1 security analyst to do Level 2 work by connecting the dots for them.

    Join us on April 21, 9 am PT (12pm ET) for a special webinar with Kyle Black and Jeremy Follis of Symantec at Broadcom, as they talk in-depth about threat analytics and visualization.
    • What is XDR and how does it help the Security Operations Center (SOC)?
    • What security telemetry is collectable and how important is data normalization?
    • What types of threat analyses can be done automatically and what’s the net result?
    • Why is tracking user and device behavior critical to threat detection?
    • How does visualizing threat analytics help a security analyst?
  • Endpoint Security: Hunt Down and Stop Stealthy Attacks Recorded: Apr 20 2021 58 mins
    Vikram Thakur, Technical Director, Symantec Endpoint Security
    When setting priorities on where to focus limited resources, SOC teams often lack context to identify clues that may reveal a critical attack unfolding in their environments. Join us for a webinar led by Technical Director Vikram Thakur, who will talk about how Symantec’s Threat Hunters utilizes in-house analytics to assist SOCs in contextualizing and responding to such attacks. Through the discussion, you will:

    • Learn more about the types of analytics that are critical for making sense of alerts and incidents emerging from your network
    • Find out how data is evaluated in the greater context of your vertical or geolocation to expose more and improve the quality of your threat research
    • Discover how threat hunters assess and notify you with enriched incident details
    • Listen to examples of how the Symantec Threat Hunter feature has helped enterprises to expose and put a stop to evolving attacks.

    Our Speaker
    Vikram Thakur, Technical Director, Symantec Endpoint Security
  • Threat Intelligence from Symantec Endpoint Security Complete Recorded: Apr 15 2021 51 mins
    Adam Licata, Director Endpoint Security Product Management and Kevin Haley, Director, Symantec Security Response
    The process of sifting through clues about threats in your environment is often manual and time-consuming. It’s something you’d like to shortcut, especially when an attack could be at your doorstep.

    Join us for a webinar with Endpoint Product Management Director Adam Licata, and Director Security Response Kevin Haley, Thursday, April 15, 2021, 11 am PST, to learn about our new Threat Intelligence API, available through Symantec Endpoint Security (SES) Complete. The new feature jumpstarts the research process, putting Symantec’s Global Intelligence Network (GIN) at your fingertips – on a platform you probably already use.

    In this session, you will:

    • Find out about how you can use real-time threat enrichment to accelerate investigations
    • Learn more about our integrations with other TIPs, SIEMs and SOARs.
  • Endpoint Security is Mission Critical Recorded: Apr 14 2021 60 mins
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
    Global cyber threats have become increasingly aggressive, and enterprises are experiencing living-off-the-land and supply chain attacks at a staggering rate. Join us for a webinar with VP and GM of Endpoint Security Adam Bromwich, Wednesday, April 14, 1 pm AEST/11 am SGT, to learn more about how Symantec has been flexing its engineering muscle to counter these attacks and laying plans for further R&D investment in 2021. In this session, you will find out about:

    • Endpoint portfolio enhancements that strengthen defenses against crippling attacks
    • Our vision for the Endpoint Security portfolio in 2021 and beyond

    Our Speaker
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
  • Endpoint Security: Bolster Defenses Against Stealthy Attacks! Recorded: Apr 1 2021 57 mins
    Roi Abitboul, Head of Threat Defense, Symantec Endpoint Security, Broadcom
    Active Directory (AD) is the threat actor’s chosen attack vector. As the most widely used service for managing and controlling resources in an enterprise, AD provides complete visibility into where the sensitive data lives and who has permission to access it. Join us in a webinar, April 1, 2021, 11 am PST, where Head of Threat Defense Roi Abitboul discusses the challenges of protecting this highly vulnerable IT asset. You will:

    • Learn how you can address stealthy attacks by containing attackers, disrupting their reconnaissance and preventing them from using AD to move laterally to other assets
    • Discover how you can greatly reduce time, effort, and error in containing breaches on the endpoint.
    • View a live demo of Symantec’s Threat Defense for Active Directory feature and see how you can protect your organization against stealthy attacks.

    Our Speaker
    Roi Abitboul, Head of Threat Defense, Symantec Endpoint Security, Broadcom
  • Delivering on Outcomes of XDR: Cross-Control Point Visibility Recorded: Mar 31 2021 61 mins
    Kyle Black, Technical Director, Symantec and Jeremy Follis, Technical Director Network Security, Symantec
    Extended Detection and Response (XDR) holds great promise for enterprise customers. A holistic XDR approach integrates and controls all control points—laptops, mobile devices servers, cloud, network, identities, and even third-party products.
    Join us on March 31, 9 am PT (12pm ET) for a special webinar with Kyle Black and Jeremy Follis of Symantec, a Division of Broadcom, as they talk in-depth about cross-control point visibility.
    • What is cross-control point visibility and why is it important?
    • What control points are the most crucial to monitor?
    • What role does Network Detection and Response play in XDR?
    • What data is collectable and how important is data normalization?
    • How can information from one control point help another?
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR Compliance: Maintaining Security in the Cloud
  • Live at: Jan 11 2018 6:00 pm
  • Presented by: Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
  • From:
Your email has been sent.
or close