Hi [[ session.user.profile.firstName ]]

Symantec Predictions for 2016 – Looking Ahead

Throughout 2015, we saw how much consumer and corporate confidence was rocked by the number of mega breaches that exposed the identities of millions of people.

So what lies ahead next year?

As the year draws to a close, Symantec’s security intelligence team has put together the top security predictions for the year ahead and beyond.

Join our webinar to hear about our top predictions for 2016 and what they mean for you.
Recorded Dec 17 2015 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Savvides, Business Manager, Information Protection, Pacific
Presentation preview: Symantec Predictions for 2016 – Looking Ahead

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture May 30 2017 5:00 am UTC 30 mins
    Kirk Gibbons, System Engineer, Symantec
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • What’s New in Symantec IT Management Suite 8.1? Recorded: Apr 20 2017 58 mins
    Damon Covey, Director of Product Management, Symantec
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more

    We look forward to having you for this live session.
  • SEP 14 Webinar Series: Zero-Day Attacks and What To Do About Them? Recorded: Apr 11 2017 43 mins
    Christopher Covert, Enterprise Products Group – Solution Product Manager, Asia Pacific & Japan, Symantec
    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today!
  • What does the European GDPR mean for businesses in Asia Pacific? Recorded: Mar 23 2017 55 mins
    Brian Fletcher, Director - Government Affairs, Symantec and Thio Tse Gan, Practice Lead - Cyber Risk Services, Deloitte SEA
    With the advent of Big Data came not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data. This gave rise to the General Data Protection Regulation (GDPR), a modernisation and harmonisation of data protection laws in the European Economic Area.

    The GDPR gives individuals greater control over their personal data, while also streamlining regulation and fostering consumer trust in businesses. However, with implementation just around the corner in 2018, over 90% of businesses are still underprepared for compliance within the next two years(1).

    Join this webinar to learn about:
    •What GDPR entails and what the timelines are
    •Who's who in the protection of personal data
    •Business concerns with the GDPR
    •Key steps of the journey towards GDPR compliance
    •How Symantec Control Compliance Suite Assessment Manager (CCS AM) can help your organisation with GDPR compliance

    (1) Vanson Bourne Survey, 2016
  • SEP 14 Webinar Series: Block The Risk Of Ransomware Recorded: Mar 14 2017 30 mins
    Jonathan Korba, System Engineer, Symantec
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be impacted again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    •What are your options if you’re targeted by a ransomware attack
    •Why Symantec Endpoint Protection 14 can address ransomware better than other solution
    •How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec Endpoint Protection 14 in action. We will share a demo with you that showcases the power of its advanced technologies.
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Feb 9 2017 50 mins
    Damon Covey, Director of Product Management, Symantec
    Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.

    Join our webinar to learn:
    - What these changes are
    - How these changes can impact managing your environment, especially for patch management
    - How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
  • ATM Threats to the Financial Sector Recorded: Jan 24 2017 54 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Recorded: Dec 20 2016 64 mins
    Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation
    2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.

    As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.

    Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
  • Next Generation Endpoint Protection: Hype or Hope? Recorded: Nov 22 2016 64 mins
    Adrian Sanabria, Senior Security Analyst at 451 Research & Kevin Haley, Director Security Response at Symantec
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more

    Register Now
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Recorded: Nov 8 2016 60 mins
    Sunil Choudrie, Global Solutions Manager Symantec and Jamie Manuel, Sr. Marketing Manager
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Recorded: Oct 20 2016 48 mins
    Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec
    Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

    This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

    Join our upcoming webinar and learn about:
    •The importance of workflow for Incidence Response
    •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
    •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
    •The integrated incident response process that supports security incident investigation and remediation
    •The follow up actions required to close an incident
  • Phishing Readiness: People can be the weakest link Recorded: Sep 22 2016 38 mins
    Mr Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec
    Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

    In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.

    Join our upcoming webinar and learn about:
    -Why individuals fall victim to cyber-attacks
    -How to measure each employee’s susceptibility
    -How to identify individuals/departments most at risk
    -How smarter, individualised training helps

    Turn your weakest links into your strongest defenders against cyber-attacks today.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Recorded: Aug 18 2016 61 mins
    Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • What makes a Next Gen SOC? Recorded: Jul 21 2016 52 mins
    Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • How secure is your Office 365 deployment? Recorded: Jun 16 2016 59 mins
    Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • Symantec 2016 Internet Security Threat Report (APJ) Recorded: May 26 2016 55 mins
    Peter Sparkes, Senior Director, Cyber Security Services – Asia Pacific & Japan
    It’s an unfortunate truth: cyber crime has become part of our daily lives. Even though mega-breaches no longer surprise us, it’s still essential to be vigilant and protect your organization.

    Attend this much-anticipated webinar for an analysis on the 2016 cyber threats from the newly released Symantec Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • Why 78% of all legitimate websites are putting your end users at risk

    Register now for the latest analysis of APJ cyber threats and specific steps you can take to improve your security posture in 2016.
  • Website Security Threat Report 2016 – Key insights and recommendations Recorded: May 26 2016 58 mins
    Jeff Barto – Symantec Trust Strategist
    Presenting the key insights of Symantec's Website Security Threat Report 2016 - Our annual report on the latest cybercrime trends and developments. Join this webinar to learn:

    · Why today’s web threats and data breaches are bigger and more aggressive than ever before
    · How the industry is responding to new vectors of attack
    · The future big topics for website security
    · Best practice tips and recommendations
  • Dridex: The Financial Threat Clogging Our Mailboxes Recorded: May 5 2016 31 mins
    Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec
    Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

    Join this webcast as we discuss:

    •Dridex propagation methods, in particular its massive spam campaigns.
    •How Dridex attempts to steal banking information.
    •Guidance on how to protect against Dridex infections

    (This webinar is sponsored and brought to you by Symantec.)
  • Demystifying Insider Threat Recorded: Mar 10 2016 59 mins
    Kenneth Durbin,Unified Security Practice Manager for Symantec and Tom Blauvelt,Security Architect for Symantec
    What is “Insider Threat?” The term Insider Threat means different things to different people. We’ll walk you through the three types of Insider Threat as defined by the Carnegie Mellon CERT; Insider Sabotage, Theft of Intellectual Property, and Fraud, and provide real world examples of each.

    We'll explain how Insider Threat impacts individuals, both personally and professionally, the economy, business and National Security.

    Most important will explore how to defend against Insider Threat with a focus on the best in class solutions Symantec provides to help you win the battle.

    By attending this webcast you will learn:

    - What is Insider Threat?
    - Why we all should care about this threat
    - Solutions to defend against Insider Threat
  • Addressing The Skills Gap In Your Cyber Security Team Recorded: Feb 23 2016 43 mins
    Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    As the cyber threats in the business world evolve, so do the demands on your IT security specialists and their expertise. However it is widely acknowledged that finding, attracting and retaining the skilled talent needed to build and maintain a solid cyber security team presents its own challenges.

    Skilled professionals are in high demand, so attrition is rife, but there is also a fundamental shortage of the number of cyber security experts available to respond to the evolving threat landscape and protect our businesses.

    In this webinar, Peter Sparkes will explore the skills gap in the different stages of a security programme and provide recommendations on:

    • How to create and operationalise a robust cyber security team
    • How to build and upskill existing talent
    • Approaches to address the skills gap in different stages of your security programme
    • Different methods of sourcing skilled security professionals

    (This webinar is sponsored and brought to you by Symantec.)
Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Symantec Predictions for 2016 – Looking Ahead
  • Live at: Dec 17 2015 5:00 am
  • Presented by: Nick Savvides, Business Manager, Information Protection, Pacific
  • From:
Your email has been sent.
or close