Hi [[ session.user.profile.firstName ]]

GDPR Compliance: Maintaining Security in the Cloud

Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

Join us to learn how to enable safe cloud adoption while maintaining compliance.

Key Takeaways:

• How to address security and compliance challenges when migrating to the cloud

• How to support GDPR compliance in the cloud

• Leverage a single data protection solution for email, storage, network, endpoints, and cloud

Register Today
Recorded Jan 11 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
Presentation preview: GDPR Compliance: Maintaining Security in the Cloud
  • Channel
  • Channel profile
  • Securing Containers with Symantec Control Compliance Suite May 17 2018 5:00 pm UTC 60 mins
    Anand Visvanathan, Principal Product Manager, Symantec and Vasant Kabra, Sr. Principal Software Engineer, Symantec
    Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.

    Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.

    Join us for this special webcast on May 17 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
  • Top 5 Things to Consider When Securing AWS May 15 2018 5:00 pm UTC 60 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
  • How Secure is Your Hybrid Cloud? May 10 2018 5:00 pm UTC 60 mins
    Doug Cahill, Senior Analyst and Group Director, ESG and Kevin Stultz, Director Product Management, Symantec
    Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.

    What is a hybrid cloud and how is it different from securing a traditional data center?

    Why is the development of applications for the cloud different and how does it impact security?

    What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
  • Healthcare Cyber Security: Still Playing Catch Up? May 9 2018 5:00 pm UTC 60 mins
    Axel Wirth, Distinguished Technical Architect, Symantec
    Cybersecurity is earning its seat in the boardroom with so much attention on the impacts and destruction a cyber attack or incident can have on a hospital's bottom line, or even worse, a patient. Yet healthcare providers continue to lag behind other industries when it comes to investing in cybersecurity with 74% dedicating 6% or less to IT security. So what will it take to fill the gaps that are still looming when it comes to an organization's risk management strategy?

    Join Axel Wirth, Distinguished Technical Architect, Symantec, as he shares key findings from HIMSS Analytics and Symantec's 2018 Healthcare IT Security & Risk Management Study.

    Learn about:

    - Healthcare's shift from a compliance mindset to a risk management approach.

    - Which cybersecurity frameworks are gaining momentum within the industry and why.

    - How healthcare IT leaders are addressing security while navigating the changing technology landscape to include cloud and medical devices.

    Register Today
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation May 1 2018 5:00 pm UTC 60 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • Get all your questions on GDPR answered Apr 24 2018 11:00 am UTC 60 mins
    Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Recorded: Apr 12 2018 56 mins
    Kevin Haley, Director of Security Response, Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Proxy 6.7 Upgrade Benefits – All You Need to Know Recorded: Apr 2 2018 26 mins
    Emad Wahba, Technical Account Manager, Symantec
    Join Emad Wahba from our Symantec Technical Account Management team as he walks through the benefits of upgrading the Proxy SGOS 6.7
  • Proxy 6.7 Upgrade Planning and Best Practice – All You Need to Know Recorded: Apr 2 2018 12 mins
    Emad Wahba, Technical Account Manager, Symantec
    Join Emad Wahba from our Symantec Technical Account Management team as he walks through planning and best practices for an upgrade to Proxy SGOS 6.7
  • Symantec Software Asset Management and the Newly Improved Software Portal Recorded: Mar 22 2018 52 mins
    Damon Covey, Senior Director, Product Management, Symantec and Rob Barker, Product Management, Symantec
    Join us for this webinar on March 22, where we will discuss the Symantec approach to software asset management. During this webinar, we will review and demonstrate some of the new capabilities available in Symantec IT Management Suite including the recently updated end user self-service software portal.

    The software portal enables on-demand software delivery and includes these new features:

    Customizable
    Browser agnostic
    Intelligent delivery of applications based on user role and operating system

    Don't miss this great opportunity to learn the latest and greatest information on Symantec IT Management Suite.
  • GDPR Compliance: Leveraging Technology for Breach Detection and Response Recorded: Mar 21 2018 30 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    Does your organization have a process in place for breach detection under the General Data Protection Regulation (GDPR)? Are you aware of what types of breaches must be reported within the 72hr notification period and the impact to the EU Data Subject?

    With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.

    Join us to learn about the GDPR breach notification procedures and uncover ways to help reduce the impact of a breach while improving your existing security process.

    Key Takeaways:

    - What are the requirements for reporting a breach under the GDPR?

    - How to leverage technology to identify a breach in real time.

    - Preemptive steps you can to take now to ensure a breach does not trigger the notification requirement later.


    View Now
  • GDPR Compliance: The Operational Impact of Cross-Border Data Transfer Recorded: Mar 20 2018 38 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    In today's world, information needs to move quickly and freely wherever it is needed. Yet, with the impending General Data Protection Regulation (GDPR), many organizations struggle to understand if data sharing is allowed and what data protections are required to avoid non-compliance.

    Join us for an On-Demand webinar focusing on the transfer of personal data across borders. During this session we will cover best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.

    Key Takeaways:

    - Understand what impact the GDPR has on Cross-Border Data Transfers

    - Understand the requirements for protecting EU personal data under your control

    - Learn how Symantec Solutions can assist you in protecting your personal data

    View Now
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Recorded: Mar 20 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • GDPR Compliance: What North American Organizations Need to Know Recorded: Mar 20 2018 39 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    As the Global Data Protection Regulation (GDPR) deadline looms, many North American organizations are still waiting to see the global impact of this European initiative before they take action.

    While this risk based decision might seem like a good idea now, the impacts of non-compliance could be detrimental to their organization.

    Watch this On-Demand video to learn if your organization will be impacted by the GDPR as well as what data processing tactics trigger compulsory requirements.

    Key Takeaways:

    - Is the GDPR relevant to your organization: 5 Questions to ask yourself

    - What are the GDPR Triggers that require compliance action?

    - Hypothetical scenarios to help you understand and prepare for the GDPR

    - How Symantec can help regardless of your stage of readiness

    Register Today
  • How to Tackle Data Protection Risk in time for GDPR Compliance Recorded: Mar 15 2018 62 mins
    Sunil Choudrie: Information Protection Strategist, Deena Thomchick: Sr. Dir. Product Mgmt, Steven Grossman: VP Bay Dynamics
    Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents

    The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.

    The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.

    Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.

    During this session, you will learn:

    -Why good risk management and data-centric protection go hand in hand

    -How leading technology helps you discover, monitor and protect personal data, wherever it is

    -Using data analytics to detect, quantify, and prioritize insider threats and outsider risks

    -How to free up your security team by removing unnecessary alerts and distractions

    Please join us, register today
  • Your Hidden Adversary: Understanding and Responding to Fileless Attacks Recorded: Mar 8 2018 55 mins
    Scott Hardie, Prinicipal Solutions Engineer, ATP, Symantec & David Berman, Sr. Mgr, Product Marketing, ATP, Symantec
    Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk.

    This webinar covers the fileless methods targeted attack groups and cybercriminals use and how the capabilities of Symantec Endpoint Detection and Response expose fileless threats that ‘hide in plain sight’ and quickly remediate their impacts – before the worst effects of a breach occur.

    Join us to learn how you can:

    - Detect Fileless attacks with machine learning, behavioral analysis and precise heuristics

    - Gain visibility into suspicious PowerShell activity and shutdown malicious scripts

    - Leverage built-in Malware Analysis file detonation and conviction

    - Streamline deployment of Endpoint Protection and EDR while lowering total cost of ownership

    In addition, we’ll show you Symantec’s EDR solution, ATP: Endpoint, in action, with a demo that showcases powerful investigative tools and one-click remediation of impacted endpoints.

    Register Today
  • Securing Today’s Enterprise The Proof is in the Proxy Recorded: Feb 27 2018 31 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey Recorded: Feb 22 2018 49 mins
    Robert Arandjelovic and Sunil Choudrie, Symantec
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
  • Are you ready for the new MFA requirements for PCI Compliance? Recorded: Feb 21 2018 24 mins
    Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse Recorded: Feb 15 2018 54 mins
    Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec
    It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.

    Register for this webcast for insights on the top 5 threats from the report to consider as well as:

    •The hidden signs of looming data breaches and where to look for them

    •What kind of risky employee activity could expose your most sensitive data

    •Whether file sharing, email and social or a combination change your exploitation risks

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR Compliance: Maintaining Security in the Cloud
  • Live at: Jan 11 2018 6:00 pm
  • Presented by: Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
  • From:
Your email has been sent.
or close