Hi [[ session.user.profile.firstName ]]

Top Security Considerations and Priorities in 2019

2019 is poised to be a year of disruption. Artificial Intelligence (AI) is entering the cyber battlefield, with increased regulatory activities and many other developments for enterprises to further their digital transformation efforts. These are but some of the many things that CISOs must keep up with.

What should be the key areas of focus and considerations for CISOs in developing their organisations’ security posture? What should be top in their list of priorities for this year and beyond?

Join Nick Savvides, Symantec Chief Technology Officer for Asia Pacific, as he shares the top considerations and priorities that CISOs need to focus on.

- 2019 Threat Landscape in Asia Pacific
- Key security considerations for 2019
- Steps to stay ahead in cybersecurity
Recorded Feb 21 2019 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Savvides, Chief Technology Officer, APAC
Presentation preview: Top Security Considerations and Priorities in 2019

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends Jul 25 2019 5:00 am UTC 60 mins
    Jim Reavis, Co-Founder and CEO, Cloud Security Alliance | Kevin Haley, Director, Security Technology & Response, Symantec
    Is your perception of cloud security matching the reality?

    We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec.

    Join cloud security experts, Jim Reavis co-founder and CEO of the Cloud Security Alliance, and Kevin Haley, Director, Security Technology and Response as they discuss:

    - Key findings from the 2019 Cloud Security Threat Report.
    - Real world examples of security threats and whether the perception of cloud security matched up to the evolving cloud threat.
    - Emerging trends in cloud security that can help you respond to the evolving attack surface.
  • Redefining Endpoint Security - How to Better Secure the Endpoint Recorded: Jun 27 2019 56 mins
    Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 Research
    Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.

    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    • How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.

    • How PayPal is using Symantec Endpoint Security to protect their endpoints.

    • How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:

    - Introducing never seen before innovation to deliver best-in-class prevention

    - Hardening Detection and Response to help customers achieve superior threat prevention,

    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation

    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization

    Register Today
  • Next Generation Security Operations: Symantec Threat Intelligence Recorded: Jun 19 2019 37 mins
    Peter Sparkes, Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    Preparing for the threats of tomorrow will require faster, deeper integration of technology, process, intelligence and warriors. However, making so many moving components work seamlessly together can be a challenge.

    Join Peter Sparkes, Symantec’s Senior Director of Cyber Security Services for Asia Pacific and Japan, in this webinar as he discusses the OODA Loop Strategy:

    - Observe: Expanding detection and extending coverage across the ecosystem
    - Orientate: Utilising threat intelligence with planning, process and playbooks
    - Decide: Empowering the analyst and the impact on business
    - Act: Proactive defense through managed endpoints detection and response and orchestration

    Register now to watch the webinar.
  • Top Security Considerations in Moving to the Cloud Recorded: Jun 19 2019 30 mins
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Symantec Web Isolation Recorded: Jun 19 2019 39 mins
    Dan Amiga, Vice President, Web Isolation, Symantec
    With 90% of cyber attacks coming through web and email, the need for Web Isolation has never been greater. But is it possible to have an air gap on all fronts without negatively affecting the user experience?

    Join us in this webinar as Don Amiga, Vice President of Web Isolation at Symantec, reveals the ins and outs of Web Isolation, including:

    - Why organisations today need military grade air gaps
    - The architecture behind Web Isolation
    - Live demo and use cases and how to implement Web Isolation for each
    - How Symantec Web Isolation offers superior integration and protection

    Register now to watch the webinar.
  • Symantec Emerging Technologies: We Invest So You Don't Have To Recorded: Jun 19 2019 24 mins
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • Zero Trust: Integrated Cyber Defense & ISTR Observations Recorded: Jun 19 2019 43 mins
    Nick Savvides, Chief Technology Officer, Asia Pacific, Symantec
    With the internet and the cloud being a critical part of most organisations today, the walled network is soon becoming a thing of the past. When your network is essentially the internet, the only secure mindset is Zero Trust.

    Join us in this webinar as Nick Savvides, Symantec’s Chief Technology Officer for Asia Pacific and Japan, discusses:

    - The evolution from Open Security to Zero Trust
    - Key learnings from the Internet Security Threat Report (ISTR) Vol. 24
    - The guiding principles and practical applications of Zero Trust
    - Symantec’s vision of Zero Trust

    Register now to watch the webinar.
  • Keynote Address: Symantec Outlook & Vision Recorded: Jun 19 2019 33 mins
    Kevin Reardon, Vice President, Worldwide Strategy and Consulting, Symantec
    Even as technological advances make it easier for organisations to undertake a digital transformation, the challenges of cloud migration, privacy legislation and advanced adversaries still remain.

    Join Kevin Reardon, Vice President of Worldwide Strategy and Consulting at Symantec, in this webinar as he discusses Symantec’s outlook and vision for 2020 and beyond, including:

    - Challenges securing the digital transformation
    - Symantec’s Integrated Cyber Defense approach
    - How an integrated platform can help simplify and resolve digital transformation challenges
    - What your next steps should be

    Register now to watch the webinar.
  • An Introduction to Symantec Email Fraud Protection Recorded: Jun 18 2019 61 mins
    Adrian Covich, Director Systems Engineering Symantec | Brian Westnedge, Sr. Director, Global Channels, Valimail
    Are attackers leveraging your domains to impersonate and send emails to your clients and business partners?

    Symantec has launched Email Fraud Protection, an add on cloud service solution that provides organisations with a fully automated approach to the implementation of DMARC, SPF and DKIM to prevent attackers from spoofing their domain names and provide protection from Business Email Compromise (BEC).

    During this webinar, you will discover how Symantec Email Fraud Protection can safeguard your organisation from these impersonation and phishing attacks and how it can help organisations overcome the complexity of achieving sender authentication. We will be diving deep into DMARC Enforcement, and taking a look at Symantec’s newly hosted innovative approach to DMARC, a simpler and more streamlined method to prevent phishing attacks.

    Join us as we discuss:

    - DMARC Enforcement and why you should be at quarantine or reject
    Domain configuration
    - Achieving enforcement without processing PII
    - Increasing brand reputation and sender trust through authentication
  • The Office 365 Dilemma – How Secure is Secure? Recorded: Jun 11 2019 31 mins
    Sunil Choudrie, Senior Strategist, Symantec
    Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.

    The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.

    Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.

    Register Today
  • The Importance of Building Your Zero Trust Program on a Solid Platform Recorded: May 9 2019 62 mins
    Gerry Grealish, Symantec and Salah Nassar, Symantec
    Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides.

    The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation.

    Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging.

    Join us in this webinar where we’ll look at:

    • Requirements for adopting a Zero Trust model across the entire security stack

    • Key considerations as you plan your Zero Trust programs

    • Benefits of a platform versus fragmented approach

    You’ll gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it.

    Please Join Us, Register Today
  • Operational Technology Security: Building a System of Trust Recorded: May 2 2019 63 mins
    Nick Savvides, Chief Technology Officer, APAC, Symantec
    As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise.

    Operational Technology (OT) is mission-critical in these industries, but legacy systems are often outdated and nearly impossible to secure with traditional corporate security controls. The infamous Symantec-discovered Stuxnet malware that manipulated centrifuges in Iranian nuclear, was carried in via USB, demonstrating the devastating physical consequences of outdated security controls to OT.

    Join Nick Savvides, CTO, Asia-Pacific, Symantec, to learn how Symantec can help you protect your factories, refineries, hospitals, building management and infrastructure by embedding security directly into industrial equipment, and helping you better monitor industrial networks for cyber threats..

    During this webinar, Nick will discuss:

    - The fundamentals of OT security and the importance OT security analytics for advanced threats
    - How to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
    - Recommendations for securing OT environments and building a system of trust.
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Recorded: Apr 25 2019 45 mins
    Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape Recorded: Mar 28 2019 63 mins
    Nick Savvides, Chief Technology Officer, APAC, Symantec
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    • Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    • Living off the land and supply chain attacks are now a staple of the new threat landscape.

    • Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    • Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please join us. Register today.
  • Cyber Security Platform Shift Recorded: Mar 7 2019 20 mins
    Art Gilliland, Exec. VP & GM, Ent. Products, Symantec | Peter Doggart, VP, Symantec | Jon Oltsik, Snr. Principal Analyst, ESG
    Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organisations adapt their cyber security technology strategies?

    There's a seismic shift happening in cyber security. Integrated platforms are the future. Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.

    In this webinar, you will learn about:

    •New customer research demonstrating the need for integrated platforms
    •Unprecedented industry collaboration around the platform shift in cyber security
    •Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)
    •How the ICD platform drives customer adoption and value
    •New innovations extending the value of the ICD platform

    Please join us. Register today.
  • Top Security Considerations and Priorities in 2019 Recorded: Feb 21 2019 63 mins
    Nick Savvides, Chief Technology Officer, APAC
    2019 is poised to be a year of disruption. Artificial Intelligence (AI) is entering the cyber battlefield, with increased regulatory activities and many other developments for enterprises to further their digital transformation efforts. These are but some of the many things that CISOs must keep up with.

    What should be the key areas of focus and considerations for CISOs in developing their organisations’ security posture? What should be top in their list of priorities for this year and beyond?

    Join Nick Savvides, Symantec Chief Technology Officer for Asia Pacific, as he shares the top considerations and priorities that CISOs need to focus on.

    - 2019 Threat Landscape in Asia Pacific
    - Key security considerations for 2019
    - Steps to stay ahead in cybersecurity
  • Cloud Security: Thinking Beyond the Perimeter Recorded: Feb 14 2019 55 mins
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond Recorded: Feb 12 2019 47 mins
    Kevin Haley, Director Security Response, Symantec
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • What is your Security Strategy with Vanishing Perimeter? Recorded: Dec 20 2018 60 mins
    Vamsi Ponnekanti, Director, Systems Engineering, Symantec
    Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.

    Are you Responsible for:
    - Setting security objectives and strategies for your IT department
    - Identifying, controlling and reporting security incidents
    - Developing enterprise wide security programs
    - Driving security or compliance or regulatory initiates

    Then this webinar is for you!

    What will the webinar address?
    - How to plan for security in the move to the cloud?
    - How to protect your users from an evolving threat landscape?
    - How to make sure your data is secured and maintains compliance with legal regulations?
    - How to effectively manage new types of devices and your mobile/remote users?

    Register Now!
  • Symantec's Security Predictions: 2019 and Beyond Recorded: Dec 13 2018 44 mins
    Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec
    The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?

    Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.

    Learn more about:

    - How Artificial Intelligence (AI) will be leveraged in cyber security
    - How growing 5G deployment and adoption will catalyze new attacks
    - Where attacks will be targeted at

    Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.

    Register Now »
Symantec APAC Integrated Cyber Defense Webinar Series
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top Security Considerations and Priorities in 2019
  • Live at: Feb 21 2019 5:00 am
  • Presented by: Nick Savvides, Chief Technology Officer, APAC
  • From:
Your email has been sent.
or close