Hi [[ session.user.profile.firstName ]]

CIO of Williams Advanced Engineering Shares How They Solved 0365 Challenges

(2:28 Customer Testimonial Video)
Learn how ROKiT Williams Racing has secured email, data, and threat from account takeover in their Office 365 (O365) environment
Recorded Mar 22 2019 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Graeme Hackland, Chief Informations Officer, Williams Group
Presentation preview: CIO of Williams Advanced Engineering Shares How They Solved 0365 Challenges
  • Channel
  • Channel profile
  • National Cyber Security Awareness Month: Fostering a Secure Tomorrow (FAST) Oct 23 2019 5:00 pm UTC 60 mins
    Paige Hansen, Chief of Identity Education, Symantec | Sixto Cancel, Founder and CEO, Think of Us
    In honor of National Cyber Security Awareness Month (NCSAM), join Sixto Cancel, the founder and CEO of Think of Us and Paige Hanson, Chief of Identity Education, Symantec as they discuss the unique risks young people in foster care face with identity theft/cyber safety.

    The webinar with focus on simple actions these young people can take to help protect themselves in the areas of cyber safety and identity theft.

    Register Today
  • National Cyber Security Awareness Month- Protect IT Oct 16 2019 5:00 pm UTC 60 mins
    Kevin Haley | Eva Velasquez | Ryan Lawless
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • National Cyber Security Awareness Month - Secure IT Recorded: Oct 9 2019 61 mins
    Dina Steinke | Michael Enos | Zara Smith
    Symantec invites you to join us, as well as TechSoup and the Michigan Small Business Development Center, for a discussion on how to apply added layers of security to your devices and online accounts. The changes in technology are not slowing, with all of the changes cybercriminals are adapting to become more sophisticated. Better protect your personal info with available security features on your own devices.

    We will focus on small businesses and nonprofits and the topic will include:

    · Creating strong, unique passphrases

    · Multi-factor authentication

    · Safe online shopping

    · How to spot and avoid phishing

    Register Today
  • National Cyber Security Awareness Month - Own IT Recorded: Oct 2 2019 63 mins
    Paige Hanson | Collin Robinson | Larry Magid | Kelvin Coleman
    Start October strong with Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day. Understanding how to protect your most significant personal information is crucial in this world of constant connection.

    We will focus on elements of home and family and the topics will include:

    • Safe social media

    • Updating your Privacy Settings

    • Best practices for device applications (apps)

    Register Today
  • Replacing Crowdsourced Fraud Intelligence: Why Customers are Making the Switch Recorded: Oct 1 2019 36 mins
    Jeremy Kraft, Symantec | Arvind Rao, Symantec | Myles Huffman, Symantec
    Most adaptive authentication solutions are actually data aggregators; rooted in commodified, crowdsourced seed intelligence originating from third party sensors that’s free and available to all. Today’s cybercriminals are bypassing adaptive authentication controls by crowdsourcing that same publicly available seed intelligence into their own machine learning algorithms.

    Symantec’s adaptive authentication intelligence originates directly from sensors built into Symantec’s widely distributed products like Endpoint Security, Web Proxy, Email Security, Data Loss Prevention, and from our consumer threat protection technologies – the world’s largest private ecosystem of seed intelligence. Because our intelligence is not crowdsourced or publicly available, cybercriminals’ machine learning algorithms lack the necessary data to emulate legitimate consumer users and thereby circumvent adaptive authentication controls to commit fraud.

    Symantec Validation and Identity Protection (VIP) also includes adaptive authentication capabilities to detect your Device Health, Behavior Patterns, Network Integrity, Presence of Malware, and Private Browsing Fingerprint.

    The result is that Symantec VIP provides a better consumer user experience with less authentication friction, far fewer false positives, and a significant, long term reduction in fraud while maintaining consumer privacy and data anonymity.

    Key Takeaways:

    - Understand the implications of using adaptive authentication solutions that rely on crowdsourced seed intelligence to combat fraud

    - Gain insight into the benefits of using nonpublic-facing seed intelligence to verify identities

    - See how Symantec combines its widely distributed network of sensors with consumer-friendly multi-factor authentication

    Register Today
  • Symantec Endpoint Vulnerability Remediation Product Launch Recorded: Aug 29 2019 52 mins
    Rob Barker, Director, Product Management, Symantec
    We are very pleased to announce the official launch of Symantec Endpoint Vulnerability Remediation. A new solution that seamlessly integrates with Symantec Endpoint Protection using the same agent and console to quickly discover, prioritize, and remediate vulnerabilities.

    In this webinar, we will discuss and demonstrate how Symantec Endpoint Vulnerability Remediation allows you to:

    •Find and fix vulnerabilities in just a few clicks
    •Prioritize remediation based on level of risk
    •Expand the robust protection of SEP using same console and agent

    Don’t miss this great opportunity to learn all about Symantec Endpoint Vulnerability Remediation.

    Register Today
  • On the Horizon: Preparing for the California Consumer Privacy Act (CCPA) Recorded: Aug 27 2019 56 mins
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Kim Allman, Director Gov't Affairs, Symantec
    On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. Often compared to the EU’s General Data Protection Regulation (GDPR), processes required to comply with the CCPA can be overwhelming from understanding the regulation, managing requirements as well as consumer requests.

    What should governance, risk and compliance executives know in order to prepare for CCPA?

    Join our webcast to learn:

    - The basics of the CCPA…what are the requirements and why is it impactful.

    - Find out how to leverage GDPR preparedness for the CCPA.

    - Review how technology investments can help your organization achieve CCPA compliance.

    Please Join Us, Register Today
  • Staying on Top of Malicious Emails with Threat Intelligence and SOAR Recorded: Aug 27 2019 58 mins
    Al Cooley, Director of Product Management, Deepsight Threat Intelligence, Symantec and Jay Spann, Swimlane SOAR Evangelist
    Gone are the days when phishing was a single act targeting a specific individual. Today, malicious emails have grown into a vehicle for targeted attacks against entire organizations. Many SecOps teams do not have the bandwidth, time-tested processes or the data to properly investigate suspicious emails and determine if attachments or links are malicious.

    For companies with a SIEM, this problem is more profound. If they don’t have intelligence beyond their own data, they have no way of using their SIEM investment to look for other indicators of compromise.

    Symantec and Swimlane cybersecurity experts will discuss how the integration of security orchestration, automation and response (SOAR) and threat intelligence can be used to thwart attacks.

    You will learn:

    - Details about the growing threats posed by phishing and malicious emails

    - Threat investigation challenges for the SIEM environment

    - How threat intelligence speeds identification and management of email threats

    - What SOAR can do for resource-strapped SecOps teams

    - How the Symantec DeepSight and Swimlane integration can help defend against advanced attacks

    Register Today
  • How to Detect Targeted Ransomware with MITRE ATT&CK™ Recorded: Aug 22 2019 57 mins
    Dick O'Brien, Principal Editor, Symantec & Adam Pennington, Principal Cyber Security Engineer, MITRE
    Cyber criminals are turning to targeted ransomware at an accelerated pace, motivated no doubt by the success of recent attacks. Join experts from Symantec and MITRE as we explore the latest research and best practices for detecting targeted ransomware in your environment.

    We will cover:

    • The latest trends in attacks

    • An in depth look at GoGalocker

    • How to use the ATT&CK™ knowledge base to describe these threats

    • Mitigations and defenses for dealing with Gogalocker

    Please Join Us, Register Today
  • How to Effectively Secure Hundreds of Thousands of Mobile Devices Recorded: Aug 15 2019 57 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Join us as we cover ways to effectively and efficiently secure mobile devices across a broad range of industries.

    As more enterprises are recognizing the need for greater visibility into mobile threats and the desire to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify – malware, phishing, network attacks and much more.

    While this is a starting point, there are other elements, characteristics, and abilities that have a far greater impact on the protection of an organization’s sensitive assets, information, and data that are not discussed often enough.

    This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late.

    • Focus on high user acceptance rates - poor adoption rates can make a good solution worthless.

    • Provide security on managed & unmanaged devices - equally effective security should be available for mobile devices and use cases.

    • Protection of sensitive data and systems should take place in real time - relying on third-party solutions or human intervention could be too late.

    • Resource demand should be minimal - maintaining and updating the solution should be efficient and require minimal resources.

    Participants should leave this webinar with knowledge and considerations to help them evaluate mobile security solutions and plan an effective deployment and execution in their own environment.

    Register Today
  • Building Resilience into Your DevOps Environment Recorded: Aug 8 2019 52 mins
    Chris Riley, Editor, Sweetcode.io & Mitch Ashley, Director Research Analysis, MediaOps
    As DevOps matures the principles and practices to build a sustainable secure, and compliant environment become a greater priority. Automation is key to security DevOps environments, and building into that automation compliance, workload and venerability tooling is critical. In this webinar we will talk about how these practices can not only be implemented in an automated way, but how they help ensure that high velocity environments sustain.

    - Why venerability scanning matters for DevOps
    - Workload protection for DevOps
    - Securing your DevOps tools
    - Building in compliance for your infrastructure

    Register Today
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Recorded: Aug 2 2019 43 mins
    Sameer Vasanthapuram, Kevin Stultz and Paul Hortop
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware.

    In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • How a Managed EDR Analyst Hunts, Investigates, and Remediates an Incident Recorded: Jul 30 2019 9 mins
    Symantec
    Demo Video (8 mins)

    In this demo, a Symantec Managed Endpoint Detection and Response (MEDR) analyst walks through an end-to-end example of how he:

    - Creates an automated investigation playbook and hunts for a threat

    - Demonstrates how he investigates suspicious detections from the managed threat hunt

    - Remediates the incident to quickly stop the spread of the attack, and
    Shares what is communicated to the customer within the incident assessment summary.

    To learn more visit: https://go.symantec.com/MEDR
  • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends Recorded: Jul 25 2019 59 mins
    Jim Reavis, Co-Founder and CEO, Cloud Security Alliance | Kevin Haley, Director, Security Technology and Response, Symantec
    Is your perception of cloud security matching the reality?

    We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec.

    Join Cloud security experts, Jim Reavis, Co-Founder & CEO at Cloud Security Alliance, and Kevin Haley, Director Security Technology and Response at Symantec as they discuss:

    • Key findings from the 2019 Cloud Security Threat Report

    • Real world examples of security threats and whether the perception of cloud security matched up to the evolving cloud threat.

    • Emerging trends in cloud security that can help you respond to the evolving attack surface.

    Register Today
  • Explore the Benefits of Endpoint Detection and Response Tools and Services Recorded: Jul 18 2019 58 mins
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts.

    We'll cover:

    - Trends impacting threat detection efforts

    - How organizations are using EDR and MEDR solutions

    - The benefits of using an MEDR service

    Register Today
  • Breached! Next Generation Network Forensics for the Cloud Recorded: Jul 11 2019 60 mins
    Karl Vogel, Worldwide Solutions Architect, Symantec and Dennis Carpio, Sr. Director Business Development, Ixia
    The average cost of a breach is US$4 million. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?

    In this webinar learn:

    • Best practices around network and cloud forensics and breach response.

    • Hear real-life scenarios that were handled by Symantec’s Incident Response experts.

    • See a demo of how Symantec Security Analytics in the cloud provides the details that expose the full source and scope of any threat or attack targeting your information assets.

    • See how you can arm your Incident Response team to significantly speed the time to conduct and complete network and cloud forensic investigations.

    Please Join Us, Register Today
  • Powered by #AI, Targeted Attack Analytics Stop Cyber Threats Others Never See Recorded: Jul 10 2019 2 mins
    Symantec
    Symantec's Targeted Attack Analytics Enables Customers to Uncover the Most Dangerous Cyber Attacks (Video: 1:46 mins)

    Stopping Threats Our Competitors Let In

    We stop threats hiding in plain sight.
    Endpoint, Network, Email, Cloud.
    However they attack, we've got you covered

    View Now
  • Symantec Web Security Services Overview (Video: 2:15 mins) Recorded: Jul 8 2019 3 mins
    Symantec
    Web Security Services (WSS) Overview (Video: 2:15 mins)

    Learn how Symantec’s cloud-based WSS solution enables advanced security and compliance without compromising application or network performance, or the experiences of your users

    View Now
  • Symantec Web Security Service Reporting Capabilities (Demo Video) Recorded: Jul 8 2019 3 mins
    Symantec
    Web Security Service Reporting (Demo Video: 2:18 mins)
    Reporting capabilities embedded in Symantec WSS help you understand what’s going on throughout your network. See how you can select from pre-built reports and create and distribute customized reports.

    View Now
  • Symantec Web Security Service Acceptable Use Policy (Demo Video) Recorded: Jul 8 2019 2 mins
    Symantec
    Web Security Service Acceptable Use Policy (Demo Video: 1:33 mins)

    Now you can block visits to specific sites, block searches or site visits based on categories of sites, allow users to understand why they were blocked, and assign policies by user or user groups all through Web Security Service

    View Video Now
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CIO of Williams Advanced Engineering Shares How They Solved 0365 Challenges
  • Live at: Mar 22 2019 8:55 pm
  • Presented by: Graeme Hackland, Chief Informations Officer, Williams Group
  • From:
Your email has been sent.
or close