From DevOps to DevSecOps: Cloud and Security in 2019 and Beyond
Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.
Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:
- The challenges organizations are facing on how they can culturally come together
- How security can be an integral part of the DevOps practice to solve these challenges
- DevOps growth from mid-market to enterprise
- Challenges with using traditional security tools/processes and collaboration through automation
- Fostering shared responsibility among Security and DevOps
This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.
Tim Sandage, Sr. Security Partner Strategist, AWS
Reuven Harrison, CTO & Co-Founder, Tufin
Brian Johnson, CEO, DivvyCloud
Constancio Fernandes, Senior Director Development, Symantec
RecordedNov 28 201848 mins
Your place is confirmed, we'll send you email reminders
Damon Covey, Sr. Director and Rob Barker, Product Manager
In today’s world of increasing threats, there is a greater need to reduce the latency in data collection and act quickly based on that data. Join us on March 13 for a special webinar focused on our new real-time visibility and remediation capabilities to help protect and secure endpoints.
In this webinar, we will discuss and demonstrate how Symantec endpoint management provides:
•gain deep visibility into your organization’s endpoints and software
•make better-informed decisions
•take faster actions such as identifying vulnerabilities and quickly deploying the appropriate patches and updates
Integration with Symantec Endpoint Protection (SEP)
•quarantine endpoints that fail a compliance scan to prevent the spread of infection
•monitor the health of the SEP agent and quickly remediate if needed
or the health of the SEP agent and quickly remediate if needed
Don’t miss this great opportunity to learn how Symantec endpoint management solutions can strengthen endpoint security and maximize user productivity.
Gerry Grealish, Symantec and Salah Nassar, Symantec
Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides.
The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation.
Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging.
Join us in this webinar where we’ll look at:
• Requirements for adopting a Zero Trust model across the entire security stack
• Key considerations as you plan your Zero Trust programs
• Benefits of a platform versus fragmented approach
You’ll gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it.
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
Sameer Vasanthapuram, Kevin Stultz and Paul Hortop
Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.
In this webinar, you’ll learn:
- How CWP for Storage protects against the latest threats and malware
- Ways CWP for Storage delivers scalable security that integrates with DevOps workflows
Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 Research
Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.
As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.
Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:
• How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
• How PayPal is using Symantec Endpoint Security to protect their endpoints.
• How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
- Introducing never seen before innovation to deliver best-in-class prevention
- Hardening Detection and Response to help customers achieve superior threat prevention,
- Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
- Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden
Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.
As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.
Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:
Monitor activity and security configurations
Control access and prevent risky changes or privileged misuse
Detect malicious insiders and compromised accounts
Keep S3 buckets private and secure confidential data with DLP
Defend S3 buckets from advanced malware threats
John McNiece,Sr. Product Manager, Symantec and Arnav Ghosh, Product Manager, Symantec
The Cloud Generation brings a host of new challenges --- vulnerability to increasingly malicious attacks; inability to gain a unified view across multiple cloud and on-premises environments; disparate security policies and tools; and massive traffic to monitor, analyze, and protect.
Join us for a live webinar where we will take a closer look at some of the greatest security challenges companies are facing as they move to the cloud. We will discuss what companies are experiencing and the solutions they are adopting to bolster their response.
In this session, you will:
•. Hear real-world security scenarios as witnessed by a former SOC analyst
•. Learn why the cloud has been particularly challenging to secure
•. Find out how Symantec Managed Security Services (MSS) can help to strengthen and improve your cloud strategy through Managed Cloud Defense
Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.
From the explosion of coinmining activity in 2018, to the 600% rise in targeted activity against IoT devices, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.
Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:
• How targeted attacks are evolving to exploit new technologies like IoT.
• The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
• A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec
The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?
Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.
Learn more about:
- How Artificial Intelligence (AI) will be leveraged in cyber security
- How growing 5G deployment and adoption will catalyze new attacks
- Where attacks will be targeted at
Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.
Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS
There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.
Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.
During this session, you will learn:
-How DevOps and InfoSec teams can align to the new DevSecOps paradigm
-Why continuous compliance management is a new business imperative
-How to build security in to your Continuous Integration/Continuous Development pipeline
Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.
Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.
Key Learning Objectives:
• Insights on cryptojacking, fileless threats and ransomware
• Capabilities you need to protect yourself from these threats
• Best practices for more efficient and effective endpoint security
Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
• Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
• Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
• How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
From DevOps to DevSecOps: Cloud and Security in 2019 and BeyondTim Sandage (AWS), Reuven Harrison (Tufin) Brian Johnson (DivvyCloud) and Constancio Fernandes (Symantec)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]47 mins