Hi [[ session.user.profile.firstName ]]

The Future of Cyber Security

Changes in the threat landscape over the past couple of years demonstrate that whilst attackers are moving faster with more sophisticated methods, defenses are not. In 2014 we experienced more far-reaching vulnerabilities, even faster attacks, more files held for ransom and far more malicious code than in previous years.

So what does this mean for the future of your cyber security strategy?

In this webinar, Symantec security expert Peter Sparkes will explore trends impacting the threat landscape and what organisations should consider when building a cyber security strategy that moves from a strategy of prevention only to a strategy of “core" prevention, detection and rapid response and remediation. In this session we will explore:

• How the Internet of Things will impact your security posture.
• How big data & security analytics can improve detection against emerging and advanced threats.
• How to move to a proactive cycle of rapid response and remediation.

(This webinar is sponsored and brought to you by Symantec.)
Recorded Nov 5 2015 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mr Peter Sparkes Senior Director, Managed Security Services, Asia Pacific and Japan, Symantec
Presentation preview: The Future of Cyber Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Next Generation Endpoint Protection: Hype or Hope? Recorded: Nov 22 2016 64 mins
    Adrian Sanabria, Senior Security Analyst at 451 Research & Kevin Haley, Director Security Response at Symantec
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more

    Register Now
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Recorded: Nov 8 2016 60 mins
    Sunil Choudrie, Global Solutions Manager Symantec and Jamie Manuel, Sr. Marketing Manager
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Recorded: Oct 20 2016 48 mins
    Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec
    Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

    This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

    Join our upcoming webinar and learn about:
    •The importance of workflow for Incidence Response
    •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
    •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
    •The integrated incident response process that supports security incident investigation and remediation
    •The follow up actions required to close an incident
  • Phishing Readiness: People can be the weakest link Recorded: Sep 22 2016 38 mins
    Mr Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec
    Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

    In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.

    Join our upcoming webinar and learn about:
    -Why individuals fall victim to cyber-attacks
    -How to measure each employee’s susceptibility
    -How to identify individuals/departments most at risk
    -How smarter, individualised training helps

    Turn your weakest links into your strongest defenders against cyber-attacks today.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Recorded: Aug 18 2016 61 mins
    Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • What makes a Next Gen SOC? Recorded: Jul 21 2016 52 mins
    Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • How secure is your Office 365 deployment? Recorded: Jun 16 2016 59 mins
    Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • Symantec 2016 Internet Security Threat Report (APJ) Recorded: May 26 2016 55 mins
    Peter Sparkes, Senior Director, Cyber Security Services – Asia Pacific & Japan
    It’s an unfortunate truth: cyber crime has become part of our daily lives. Even though mega-breaches no longer surprise us, it’s still essential to be vigilant and protect your organization.

    Attend this much-anticipated webinar for an analysis on the 2016 cyber threats from the newly released Symantec Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • Why 78% of all legitimate websites are putting your end users at risk

    Register now for the latest analysis of APJ cyber threats and specific steps you can take to improve your security posture in 2016.
  • Website Security Threat Report 2016 – Key insights and recommendations Recorded: May 26 2016 58 mins
    Jeff Barto – Symantec Trust Strategist
    Presenting the key insights of Symantec's Website Security Threat Report 2016 - Our annual report on the latest cybercrime trends and developments. Join this webinar to learn:

    · Why today’s web threats and data breaches are bigger and more aggressive than ever before
    · How the industry is responding to new vectors of attack
    · The future big topics for website security
    · Best practice tips and recommendations
  • Dridex: The Financial Threat Clogging Our Mailboxes Recorded: May 5 2016 31 mins
    Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec
    Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

    Join this webcast as we discuss:

    •Dridex propagation methods, in particular its massive spam campaigns.
    •How Dridex attempts to steal banking information.
    •Guidance on how to protect against Dridex infections

    (This webinar is sponsored and brought to you by Symantec.)
  • Demystifying Insider Threat Recorded: Mar 10 2016 59 mins
    Kenneth Durbin,Unified Security Practice Manager for Symantec and Tom Blauvelt,Security Architect for Symantec
    What is “Insider Threat?” The term Insider Threat means different things to different people. We’ll walk you through the three types of Insider Threat as defined by the Carnegie Mellon CERT; Insider Sabotage, Theft of Intellectual Property, and Fraud, and provide real world examples of each.

    We'll explain how Insider Threat impacts individuals, both personally and professionally, the economy, business and National Security.

    Most important will explore how to defend against Insider Threat with a focus on the best in class solutions Symantec provides to help you win the battle.

    By attending this webcast you will learn:

    - What is Insider Threat?
    - Why we all should care about this threat
    - Solutions to defend against Insider Threat
  • Addressing The Skills Gap In Your Cyber Security Team Recorded: Feb 23 2016 43 mins
    Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    As the cyber threats in the business world evolve, so do the demands on your IT security specialists and their expertise. However it is widely acknowledged that finding, attracting and retaining the skilled talent needed to build and maintain a solid cyber security team presents its own challenges.

    Skilled professionals are in high demand, so attrition is rife, but there is also a fundamental shortage of the number of cyber security experts available to respond to the evolving threat landscape and protect our businesses.

    In this webinar, Peter Sparkes will explore the skills gap in the different stages of a security programme and provide recommendations on:

    • How to create and operationalise a robust cyber security team
    • How to build and upskill existing talent
    • Approaches to address the skills gap in different stages of your security programme
    • Different methods of sourcing skilled security professionals

    (This webinar is sponsored and brought to you by Symantec.)
  • Strategies for the Inevitable Breach (Jointly Presented with Gartner) Recorded: Jan 21 2016 57 mins
    David Allott, APJ Enterprise Security, Symantec/ Sid Deshpande, Principal Research Analyst, Gartner
    Today’s cybercriminals employ sophisticated tactics to infiltrate target organizations, customizing attacks to bypass security defenses and achieve their goals. Despite organizations investing in the best prevention technologies, today’s security products are largely not integrated, and security teams are scrambling to ‘connect the dots’ and uncover these threats.

    Join this webinar jointly presented by Gartner and Symantec as we discuss:
    -Latest developments across the threat landscape and why security mindsets are changing.
    -The security framework and complementary technologies needed for effective advanced threat defense.
    -How to strengthen your security strategy using Symantec’s Advanced Threat Protection.
  • Symantec Predictions for 2016 – Looking Ahead Recorded: Dec 17 2015 63 mins
    Nick Savvides, Business Manager, Information Protection, Pacific
    Throughout 2015, we saw how much consumer and corporate confidence was rocked by the number of mega breaches that exposed the identities of millions of people.

    So what lies ahead next year?

    As the year draws to a close, Symantec’s security intelligence team has put together the top security predictions for the year ahead and beyond.

    Join our webinar to hear about our top predictions for 2016 and what they mean for you.
  • Strategies to Deliver Actionable Threat Intelligence Recorded: Dec 3 2015 42 mins
    Mr Noel Cheok, Strategy & Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec
    The threat landscape is evolving quickly, and you have to keep up. Many organisations are still in a reactive mode, addressing vulnerabilities and threats by relying on information freely available on the web - by which time the damage has already been done. On the other hand, IT security professionals with too much information available become uncertain of how to incorporate the threat intelligence into their security programme, and end up relying on protection from the perimeter.

    In this session, we’ll discuss how organisations can incorporate threat intelligence into their security programmes and focus on the threats most relevant to your environment to reduce the risk or impact from an incident.

    You’ll learn:
    • What threat intelligence is, and is not.
    • Best practices to consume threat intelligence.
    • How to put intelligence into context and make it actionable.
    • Incorporating intelligence into the lifecycle of your security programmes.

    (This webinar is sponsored and brought to you by Symantec)
  • Faster Response with Innovative Advanced Threat Protection Technology Recorded: Nov 26 2015 60 mins
    David Allott, Head, APJ Solutions Marketing, Enterprise Security / Alan Lee, Senior Manager, CISSP, CISA, Product Manager
    As advanced threats rapidly increase in complexity, technology must evolve to find smarter ways of detecting and blocking attack techniques across IT control points.

    Symantec has developed 3 innovative technologies with Advanced Threat Protection that will change the game - helping customers detect, prioritise and respond to threats within minutes – from a single console, with a single click.

    Join this webinar to understand how Symantec technology can improve your advanced threat protection.
  • The Future of Cyber Security Recorded: Nov 5 2015 55 mins
    Mr Peter Sparkes Senior Director, Managed Security Services, Asia Pacific and Japan, Symantec
    Changes in the threat landscape over the past couple of years demonstrate that whilst attackers are moving faster with more sophisticated methods, defenses are not. In 2014 we experienced more far-reaching vulnerabilities, even faster attacks, more files held for ransom and far more malicious code than in previous years.

    So what does this mean for the future of your cyber security strategy?

    In this webinar, Symantec security expert Peter Sparkes will explore trends impacting the threat landscape and what organisations should consider when building a cyber security strategy that moves from a strategy of prevention only to a strategy of “core" prevention, detection and rapid response and remediation. In this session we will explore:

    • How the Internet of Things will impact your security posture.
    • How big data & security analytics can improve detection against emerging and advanced threats.
    • How to move to a proactive cycle of rapid response and remediation.

    (This webinar is sponsored and brought to you by Symantec.)
  • The Next Level of Advanced Threat Protection Recorded: Oct 29 2015 54 mins
    Marie Pettersson, Senior Manager / Alan Lee, Senior Manager, CISSP, CISA and VSTP, Product management
    Are you prepared to face the consequences of today’s sophisticated APTs?

    The volume and sophistication of today’s threats are escalating beyond the scope of traditional security strategies. Many IT departments struggle to detect, contain and remediate against new and emerging APTs.

    Security strategies relying on point products that lack integration and visibility across all attack vectors are no longer enough.

    Symantec understands the next level of advanced threat protection is hinged on a security strategy that spans emails, networks and endpoints – and must provide:
    - Unmatched visibility and intelligence across all attack vectors
    - Swift response and remediation with a single click – from a single console
    - Easing of IT resources that would otherwise be spent on chasing false positives
    - Reducing the risk of losing critical organizational data that might result in business loss

    Join the webinar: “The Next Level Of Advanced Threat Protection”, to learn more from Symantec experts and get a first view of our new ATP solution and relevant use cases.

    (This webinar is sponsored and brought to you by Symantec.)
  • Kill The Password Recorded: Sep 23 2015 46 mins
    David Allott, Head, APJ Solutions Marketing, Enterprise Security
    Securing your data is your number one priority, but it’s at risk because of the very things that help make your organization successful - cloud and mobile. Did you know 80% of breaches could be eliminated with two-factor authentication?

    For IT departments, the challenge is supporting the explosion of devices with access from anywhere, and cloud-based apps that contain your data, but are not within your visibility or control.

    Many times the only thing between your data in the cloud and attackers is a password – and passwords alone are vulnerable, costly and complex.

    Tune in live on September 23, 2015 to learn:

    - How your organization can confidently embrace cloud and mobile with
    secure access from any device.

    - Why eliminating the password improves the security and convenience
    of two-factor authentication.
  • Kill The Password Recorded: Sep 23 2015 36 mins
    David Allott, Head, APJ Solutions Marketing, Enterprise Security
    Securing your data is your number one priority, but it’s at risk because of the very things that help make your organisation successful - cloud and mobile. Did you know 80% of breaches could be eliminated with two-factor authentication?

    For IT departments, the challenge is supporting the explosion of devices with access from anywhere, and cloud-based apps that contain your data, but are not within your visibility or control.

    Many times the only thing between your data in the cloud and attackers is a password – and passwords alone are vulnerable, costly and complex.

    Tune in live on September 23, 2015 to learn:
    - How your organisation can confidently embrace cloud and mobile with secure access from any device.
    - Why eliminating the password improves the security and convenience of two-factor authentication.
Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Cyber Security
  • Live at: Nov 5 2015 5:30 am
  • Presented by: Mr Peter Sparkes Senior Director, Managed Security Services, Asia Pacific and Japan, Symantec
  • From:
Your email has been sent.
or close