Hi [[ session.user.profile.firstName ]]

GDPR Compliance: Maintaining Security in the Cloud

Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

Join us to learn how to enable safe cloud adoption while maintaining compliance.

Key Takeaways:

• How to address security and compliance challenges when migrating to the cloud

• How to support GDPR compliance in the cloud

• Leverage a single data protection solution for email, storage, network, endpoints, and cloud

Register Today
Recorded Jan 11 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
Presentation preview: GDPR Compliance: Maintaining Security in the Cloud
  • Channel
  • Channel profile
  • Part 3 of 3: Secrets of Mature DLP Programs - Getting from "How" to "Wow"! Sep 20 2018 5:00 pm UTC 60 mins
    Symantec
    In the third and final session of the three-part webcast series:

    Part 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud

    As hybrid cloud infrastructures become the new normal, DLP programs must adapt and expand to ensure that data – where ever it’s located – stays protected. New challenges include uncovering shadow data in unauthorized apps, eliminating multiple islands of DLP overhead, and maintaining performance across on-prem hardware and the cloud.

    Join Symantec on September 20 and Learn how to:

    -Reuse existing DLP policies and workflows for cloud apps

    -Incorporate authentication and encryption with Symantec ICE & VIP

    -Discover sensitive data within cloud apps with Symantec CloudSOC

    Register Today

    About the three-part DLP webcast series:
    In working with our Data Loss Prevention (DLP) customers, we have found that there is disparity in the DLP program maturity state. Customers that do not have executive support or cross-functional reviews struggle to manage and resolve DLP incidents. This produces and outcome where the number of policies are greatly reduced, workflows are not modified, and/or employee training and discipline are not implemented.

    We would like to invite you to join a 3-part webcast series to learn how other DLP customers were able to enhance their DLP deployment into a fully mature DLP program.

    On-Demand:
    Part 1: First Things First - Understanding "Normal" Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)

    Part 2: Talking it Out - Cross-Functional Communication Key to Mature DLP Programs (View Now: http://bit.ly/0830DLPwebcast)
  • Part 2 of 3: Secrets of Mature DLP Programs - Getting from "How?" to "Wow !" Aug 30 2018 5:00 pm UTC 60 mins
    Symantec
    In the second of the three-part webcast series:

    Part 2: Talking It Out – Cross-functional Communication Key to Mature DLP Programs

    With data in hand, successful teams work to earn executive support for cross-functional business-leader incident reviews. Without this buy-in workflows are not modified, employee training & discipline is not implemented, and disabling of policies can result.

    Join Symantec on August 30th, and learn:

    -Timely workflow adjustments

    -Thoughtful policy adjustments

    -Consistent employee training & discipline

    Register Today

    About the 3-Part DLP webcast series:
    In working with our Data Loss Prevention (DLP) customers, we have found that there is disparity in the DLP program maturity state. Customers that do not have executive support or cross-functional reviews struggle to manage and resolve DLP incidents. This produces and outcome where the number of policies are greatly reduced, workflows are not modified, and/or employee training and discipline are not implemented.

    We would like to invite you to join a 3-part webcast series to learn how other DLP customers were able to enhance their DLP deployment into a fully mature DLP program

    Upcoming webcasts:
    September 20th: Part 3 of 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud (Register Now: http://bit.ly/0920DLPwebinar)

    On-Demand:
    Part 1 of 3: First Things First - Understanding “Normal” Through Smart Incident Response and UEBA (View Now: http://bit.ly/0809DLPWebinar)
  • Why Data-Centric Authentication is at the Heart of Zero Trust Aug 28 2018 5:00 pm UTC 60 mins
    Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
    It’s called a ‘data breach’ for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a ‘Zero Trust” model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.

    To implement “Zero Trust” successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device needs to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.

    In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:

    •What are the components of Zero Trust?
    •How to implement Zero Trust successfully in your organization.
    •What are the important security solutions core to Zero Trust and why data protection and identity are central to this model
    •What to look for in Zero Trust data-centric authentication vendor
  • Part 1 of 3: Secrets of Mature DLP Programs – Getting from “How?” to “Wow!” Aug 9 2018 5:00 pm UTC 60 mins
    Symantec
    In the first of a three-part webcast series:

    Part 1: First Things First - Understanding “Normal” Through Smart Incident Response and UEBA

    Incident triage dominates daily efforts by DLP teams. But more incidents arrive than can be closed - and up to 80% are false positives – so high risk actions get missed. New user and entity behavior analytics platforms like Symantec ICA dramatically reduce false positives, so there’s time to refine processes and educate other organizations.

    Join Symantec on August 9, and learn:

    -What’s abnormal but acceptable business behavior?

    -What’s abnormal but dangerous activity? and how dangerous is it?

    -How to address without changing policies?

    Register Today

    About the 3-Part DLP webcast series:
    In working with our Data Loss Prevention (DLP) customers, we have found that there is disparity in the DLP program maturity state. Customers that do not have executive support or cross-functional reviews struggle to manage and resolve DLP incidents. This produces and outcome where the number of policies are greatly reduced, workflows are not modified, and/or employee training and discipline are not implemented.

    We would like to invite you to join a 3-part webcast series to learn how other DLP customers were able to enhance their DLP deployment into a fully mature DLP program

    Upcoming webcasts:
    August 30th: Part 2 of 3:Talking It Out – Cross-functional Communication Key to Mature DLP Programs (Register Today http://bit.ly/0830DLPwebcast)

    September 20th: Part 3 of 3: Data, Data Everywhere - Increasing DLP Value as Everyone Goes Cloud (http://bit.ly/0920DLPwebinar)
  • A CTO’s Perspective: Network Security for the Cloud Generation Jul 25 2018 5:00 pm UTC 30 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    •. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce

    •. The increased complexity of managing full security stack with limited resources

    •. The technical challenges of securing cloud applications

    •. Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Jun 20 2018 60 mins
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Explaining the value of the architecture within our Proxy? Recorded: Jun 19 2018 11 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Sunil Choudrie & Robert Arandjelovic ask they discuss architecture within Security Web Gateway
  • What impact the cloud has had on modern organisation and the security challenges Recorded: Jun 19 2018 7 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Sunil & Robert as they discuss modern-day security in this Ask the Expert series
  • How does our integrated cyber defence work with relation to web gateway Recorded: Jun 19 2018 7 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Robert Arandjelovic & Sunil Choudrie during this Ask the Expert session where they talk through cyber defence and web gateway
  • What role does the Security Web Gateway play in your proxy posture? Recorded: Jun 19 2018 5 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Symantec experts Sunil Choudrie & Robert Arandjelovic talk through Security Web Gateway during this Ask the Expert video.
  • Symantec Endpoint Protection Mobile Product Updates - June 2018 Recorded: Jun 12 2018 32 mins
    Maya Mandel VP of Product, Symantec
    Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.

    You will learn about:

    - What new features are in the Symantec Endpoint Protection Mobile incident model
    - End-user emails localization
    - New Suspicious URLs tab
    - New unwanted app conditions
    - Symantec Web Security Service (WSS) integration
    - Symantec Cloud Access Security Broker (CASB) integration
    - And more

    Register Today
  • Securing Containers with Symantec Control Compliance Suite Recorded: Jun 12 2018 49 mins
    Vasant Kabra, Sr. Principal Software Engineer, Symantec and Curtis Barker, Product Portfolio Manager, Symantec
    Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.

    Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.

    Join us for this special webcast on June 12 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
  • GDPR: The Importance of Looking Beyond 25 May, 2018 Recorded: May 25 2018 61 mins
    Robert Arandjelovic, Giampiero Nanni
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • How Can Your Organization Safeguard Against Phishing Emails? Recorded: May 24 2018 27 mins
    Jimmy Lin, Product Manager, Email Security.cloud, Symantec
    Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.

    In this how-to session, we will demonstrate:

    - How to optimize the configurations of your Email Security.cloud service to protect your organization.

    - We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:

    • SPF Authentication
    • DMARC Authentication
    • Business Email Scam Analyzer
    • Email Impersonation Control

    Register Today
  • Accelerating Incident Response with Intelligence-Driven Security Orchestration Recorded: May 23 2018 47 mins
    Al Cooley,Director Product Mgmt, Symantec / Meny Har, VP Product, Siemplify / Nimmy Reichenberg, CMO, Siemplify
    Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and multiple consoles often hinder teams from building the story they need to respond to truly malicious activity.

    Join Symantec and Siemplify on Wedensday, May 23, to see how intelligence-driven orchestration helps SOCs overcome these challenges by enabling deeper, higher quality investigations and expediting incident response.

    During this session you’ll learn:

    - The vital role context plays in security operations and how it powers incident investigation and response

    - How threat intelligence and security orchestration provide deeper insights to streamline alert validation, incident prioritization and response

    - How Siemplify and Symantec DeepSight Intelligence integrate, drive a standardized workflow and improve security incident response

    Register Today
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: May 22 2018 60 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • GDPR: Identifying and Responding to a Data Breach Recorded: May 22 2018 63 mins
    Duncan Brown IDC, Ilias Chantzos, Sunil Choudrie and Giampiero Nanni,Symantec
    With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.

    Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss

    •Findings from the current IDC GDPR Assessment
    •Gain practical advice on GDPR breach notification rules
    •Guidance issued from European Data Protection Authorities
    •Data transfers and how a breach can affect multiple locations and jurisdictions.
  • SEP Deception – All you need to know Recorded: May 18 2018 40 mins
    Adam Licata, Product Marketing Manager, SEP, Symantec
    Deception is a new features of SEP 14.1. Learn how to deploy and utilize this unique feature to identify hackers and remove risks.
  • SEP Hardening– All you need to know Recorded: May 18 2018 40 mins
    Adam Licata, Product Marketing Manager, SEP, Symantec
    Understand how and why to deploy the new SEP Hardening feature in an effort to increase your overall security posture.
  • Top 5 Things to Consider When Securing AWS Recorded: May 15 2018 53 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR Compliance: Maintaining Security in the Cloud
  • Live at: Jan 11 2018 6:00 pm
  • Presented by: Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
  • From:
Your email has been sent.
or close