As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.
In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.
Join our upcoming webinar and learn about:
- Core requirements for a Next Gen SOC
o Flexible Log Collection
o Big Data Processing
o Advanced Analytics
o Real-Time Intelligence
- SOC-centric services: Incident Response and Advanced Intelligence
- SOC operating models – Building your own SOC, Operating Models & Extending Services
- Developing the next generation of security professionals
RecordedJul 21 201652 mins
Your place is confirmed, we'll send you email reminders
Peter Sparkes, Senior Director, Cyber Security Services, Symantec
From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.
Join Symantec's leading threat expert, Peter Sparkes as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:
- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats
Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan
With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.
Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.
" Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
" Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
"Understand how these regulations can enable you to gain trust and enhance customer experiences
John Cunningham, VP - Cloud Security APAC, Symantec
Do you know who’s using your cloud?
Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?
Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.
On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:
•The state of today’s cloud security landscape
•How to detect unauthorised access or risky user activity
•How to protect your cloud from cyber threats
Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
Peter Sparkes, Senior Director, Cyber Security Services, Symantec
Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.
New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.
How does your Security Operations Center (SOC) keep up?
Join us to learn how to scale and extend the capabilities of your SOC.
We’ll review topics such as:
- Automated security event analysis
- Human security event analysis and prioritisation
- Threat visibility across key on-premise and cloud control points
- Consumption of technical and strategic threat intelligence
Timothy Chiu - Senior Director of Product Marketing, Symantec
Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.
Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organisation needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.
The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.
In this webinar learn:
• Why Proxy architecture is more important than ever as a critical security component of your network
• How a web proxy can serve as a platform for advanced threat detection and data protection
• Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line
Traditional network security products often only kick in when a threat strikes, allowing you to react quickly and effectively to breaches. But every second that is spent identifying and reacting to a breach is another second that the attacker can make off with sensitive data.
But why react when you can act? With Symantec Security Analytics, your IT security team will be able to proactively search for hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advance threats before they can launch an attack.
Key benefits of Symantec Security Analytics:
• Expose the source and scope of an attack with unrivalled data enrichment and threat intelligence
• Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
• Reduce time to resolution with sophisticated anomaly detection and advanced network forensics
Empower your network with truly proactive defence. Sign up for our webinar today to learn how Symantec Security Analytics can help you take down threats before they strike.
Nick Savvides, Chief Technology Officer (Pacific and Japan), Symantec
In 2018, the Internet of Things (IoT) will take centre stage as botnets, ransomware, and hackers target them with creative techniques such as playing analog sounds to exploit vulnerabilities in these devices.
Attackers are also gaining expertise in psychology in decision theory, and may use this knowledge to manipulate users. Artificial intelligence (AI) and blockchain technology will also join the fray in the never-ending arms race between cyberattackers and cybersecurity.
Join us at our ‘2018 Cybersecurity Predictions’ webinar as we discuss these predictions and more, and get prepared for where the security landscape may be headed.
Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation
On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.
But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.
Join us at our webinar as we discuss:
• How to find out if your company will be impacted by the GDPR
• What is needed to comply with the GDPR
• How the GDPR will be enforced in Asia Pacific
• Capitalising on the GDPR to improve your business
• Real-life issues faced by organisations and how technology can help fix them
Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.
Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Anand Visvanathan, Principal Product Manager, Symantec
The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:
- Measure and prove compliance with security regulations, mandates, and best practices
- Determine risk and prioritise remediation
Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
Nick Savvides, Chief Technology Officer (Pacific and Japan), Symantec
2017 was a year dominated by costly cyber-attacks, massive data breaches, malicious ransomware, and economic espionage. With cyber-criminals getting bolder, and financial rewards getting bigger, cyber-attacks are now a regular occurrence in the news.
Join us in this webinar as we review:
• The threat landscape of 2017
• Who or what were to blame for these ransomware and cyber-attacks
• What lessons can security professionals like you take from the year
• What solutions can help secure you as we move into 2018
Cloud integration is no longer an advantage, but a necessity in today’s business landscape. But with sensitive data constantly shuttling between on-premise servers and third-party cloud services, existing point-based security products can no longer effectively track and secure the ever-flowing stream of information.
Current data security models rely on hardening your network and data centre, but cloud integration requires data to move beyond the perimeters of your infrastructure – leaving your data exposed and vulnerable.
In our upcoming “Information Centric Security – The Convergence of Data Protection Technologies” webinar, we discuss:
•Why the cloud requires a new approach to data security
•How to bridge the gap between DLP, Cloud and Users
•How to eliminate key management issues through automation
•How Symantec Information Centric Security works to protect your data wherever it is
Join the webinar to gain the latest insights into data security in the cloud generation, and how to protect your sensitive data throughout its life cycle, wherever it may reside.
Gathering data on cyber threats is one thing – creating useful intelligence out of that data, and then making that intelligence actionable is another. An effective system of gathering, analysing and operationalising threat intelligence can often mean the difference between just in time, and too late. But how do you tame the deluge of data?
In our upcoming "Operationalising Threat Intelligence" webinar, we discuss:
- Being proactive vs. reactive
- Technical vs. adversary intelligence
- Informational vs. actionable intelligence
Sign up for our webinar and learn how to operationalise threat intelligence to better protect your organisation from emerging threats.
Dr. Hugh Thompson, Chief Technology Officer, Symantec
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
In this webinar learn:
- How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
- A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
Jamie Cromer, Director of Competitive Intelligence, Enterprise Security Product Management, Symantec
Prevent, detect, respond and assess, all through a single agent
Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?
Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.
In this webinar, you’ll learn how to:
- Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention
- Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution
- Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console
- Lower your IT burden and reduce complexity with everything built into a single agent
- Facilitate a painless migration and get your IT staff up-to-speed
Finally, watch a demo that showcases how Symantec helps stop ransomware and unknown threats with Next-gen technologies built into a single light weight agent.
Fictional AI minds like SkyNet in The Terminator and WOPR in WarGames captured our imaginations in the 1980s. Fast forward to the 21st century and now advanced machine learning (ML) and artificial intelligence (AI) have become a critical component of the cybersecurity landscape.
Machines learn complex patterns and understand subtle interactions from oceans of diverse security telemetry data, yet cybersecurity is not the first industry to use ML or AI to accelerate innovation and change the way it works.
In our upcoming ‘Combatting Advanced Cybersecurity Threats with Artificial Intelligence and Machine Learning’ webinar, we discuss how:
• ML and AI is changing the cyber security industry and why it is important for the future of cybersecurity
• Big data and predictive models equal smarter protection
• Symantec uses advanced machine learning – from endpoints to the cloud – to analyse file attributes, behaviours and relationships
• ML and AI will have to evolve to combat threats against their use
Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.
Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?
In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:
• Govern access to data, apps, and systems that may reside in the cloud
• Secure information no matter where it sits or goes
• Protect against advanced threats in this new environment
• Minimise risk and ensure compliance as workloads move to the cloud
Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead, Risk Advisory, Deloitte
With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.
These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.
Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.
Join this webinar to learn about:
- New challenges introduced by the Australian mandatory data breach notification law
- Key steps in the journey towards data privacy compliance
- How to monitor insider threats
- How to leverage these regulations to gain trust and ensure great customer experiences
We look forward to your participation in this free webinar.
Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.
Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.
This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.
Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec
What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.
Get advice on preventing data breaches from these industry experts:
• Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.
• Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.
Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.