Hi [[ session.user.profile.firstName ]]

2019 Internet Security Threat Report (ISTR): The New Threat Landscape

As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

Join us as we discuss these trends and more:

• Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

• Living off the land and supply chain attacks are now a staple of the new threat landscape.

• Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

• Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

Please join us. Register today.
Recorded Mar 28 2019 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Savvides, Chief Technology Officer, APAC, Symantec
Presentation preview: 2019 Internet Security Threat Report (ISTR): The New Threat Landscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Operational Technology Security: Building a System of Trust May 2 2019 12:00 am UTC 60 mins
    Nick Savvides, Chief Technology Officer, APAC, Symantec
    As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise.

    Operational Technology (OT) is mission-critical in these industries, but legacy systems are often outdated and nearly impossible to secure with traditional corporate security controls. The infamous Symantec-discovered Stuxnet malware that manipulated centrifuges in Iranian nuclear, was carried in via USB, demonstrating the devastating physical consequences of outdated security controls to OT.

    Join Nick Savvides, CTO, Asia-Pacific, Symantec, to learn how Symantec can help you protect your factories, refineries, hospitals, building management and infrastructure by embedding security directly into industrial equipment, and helping you better monitor industrial networks for cyber threats..

    During this webinar, Nick will discuss:

    - The fundamentals of OT security and the importance OT security analytics for advanced threats
    - How to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
    - Recommendations for securing OT environments and building a system of trust.
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape Recorded: Mar 28 2019 63 mins
    Nick Savvides, Chief Technology Officer, APAC, Symantec
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    • Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    • Living off the land and supply chain attacks are now a staple of the new threat landscape.

    • Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    • Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please join us. Register today.
  • Cyber Security Platform Shift Recorded: Mar 7 2019 20 mins
    Art Gilliland, Exec. VP & GM, Ent. Products, Symantec | Peter Doggart, VP, Symantec | Jon Oltsik, Snr. Principal Analyst, ESG
    Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organisations adapt their cyber security technology strategies?

    There's a seismic shift happening in cyber security. Integrated platforms are the future. Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.

    In this webinar, you will learn about:

    •New customer research demonstrating the need for integrated platforms
    •Unprecedented industry collaboration around the platform shift in cyber security
    •Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)
    •How the ICD platform drives customer adoption and value
    •New innovations extending the value of the ICD platform

    Please join us. Register today.
  • Top Security Considerations and Priorities in 2019 Recorded: Feb 21 2019 63 mins
    Nick Savvides, Chief Technology Officer, APAC
    2019 is poised to be a year of disruption. Artificial Intelligence (AI) is entering the cyber battlefield, with increased regulatory activities and many other developments for enterprises to further their digital transformation efforts. These are but some of the many things that CISOs must keep up with.

    What should be the key areas of focus and considerations for CISOs in developing their organisations’ security posture? What should be top in their list of priorities for this year and beyond?

    Join Nick Savvides, Symantec Chief Technology Officer for Asia Pacific, as he shares the top considerations and priorities that CISOs need to focus on.

    - 2019 Threat Landscape in Asia Pacific
    - Key security considerations for 2019
    - Steps to stay ahead in cybersecurity
  • Cloud Security: Thinking Beyond the Perimeter Recorded: Feb 14 2019 55 mins
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond Recorded: Feb 12 2019 47 mins
    Kevin Haley, Director Security Response, Symantec
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • What is your Security Strategy with Vanishing Perimeter? Recorded: Dec 20 2018 60 mins
    Vamsi Ponnekanti, Director, Systems Engineering, Symantec
    Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.

    Are you Responsible for:
    - Setting security objectives and strategies for your IT department
    - Identifying, controlling and reporting security incidents
    - Developing enterprise wide security programs
    - Driving security or compliance or regulatory initiates

    Then this webinar is for you!

    What will the webinar address?
    - How to plan for security in the move to the cloud?
    - How to protect your users from an evolving threat landscape?
    - How to make sure your data is secured and maintains compliance with legal regulations?
    - How to effectively manage new types of devices and your mobile/remote users?

    Register Now!
  • Symantec's Security Predictions: 2019 and Beyond Recorded: Dec 13 2018 44 mins
    Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec
    The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?

    Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.

    Learn more about:

    - How Artificial Intelligence (AI) will be leveraged in cyber security
    - How growing 5G deployment and adoption will catalyze new attacks
    - Where attacks will be targeted at

    Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.

    Register Now »
  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations Recorded: Dec 12 2018 67 mins
    Axel Wirth, Distinguished Healthcare Architect
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Recorded: Dec 6 2018 46 mins
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • What’s new? The Broadest and Deepest Cloud Security for SaaS, PaaS & IaaS Recorded: Dec 6 2018 61 mins
    Deena Thomchick, Senior Director of Cloud Security, Symantec Linda Park, Senior Manager, IaaS Security & Compliance, Symantec
    Organizations are using more cloud services for more business-critical activities. At the same time organizations face growing privacy regulations, a high rate of data loss (accidental exposures and breaches), and ever-increasing attacks on their cloud assets.

    It is challenging to get the visibility and security you need to protect your Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) clouds as cloud security offerings have been both limited in scope and fragmented across point products.

    Let us show you what’s new and how our solutions will give you the most complete visibility, data security, threat protection and compliance management for your public cloud services with integrated cloud security.

    Learn more about our latest innovations in cloud security for SaaS, PaaS, and IaaS

    •.New Integrated Compliance Management for IaaS – the first Cloud Security Posture Management (CSPM) solution integrated with Cloud Access Security Broker (CASB) and Cloud Workload Protection Platform (CWPP) offering detailed compliance remediation.

    •. Fastest Acting Cloud App Security – the first API-based CASB that can remediate security issues in seconds, with new Fast APIs for Microsoft and Box.

    •. Broadest & Deepest Cloud App Coverage – CASB data security and threat protection for any cloud app, including custom apps.

    •. Best DLP and Threat Protection for IaaS Storage – Gartner Magic Quadrant leading Data Loss Prevention (DLP) and threat protection now integrated with Cloud Workload Protection(CWP) and Gartner Magic Quadrant leading CloudSOC CASB.

    Please Join Us, Register Today
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: Dec 5 2018 61 mins
    Brian Duckering, Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webinar to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webinar, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 Recorded: Dec 4 2018 45 mins
    Damon Covey, Sr. Director, Product Management, Symantec
    The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are here! Please join us for a special webinar on Tuesday, December 4 to learn all about these exciting new solutions.

    We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3, the new web console, smart wizards, and much more!

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!

    Register Now
  • The IoT Enterprise: Why Your Organisation Is Already IoT'd Recorded: Nov 28 2018 61 mins
    Nick Savvides, Chief Technology Officer APAC, Symantec
    With the potential for energy savings, improvement of business processes, automation of the supply chain and more, organisations around the world are giving IoT a serious look - but security concerns are proving to be a barrier for adoption.

    With most IoT devices and platforms missing even basic security hygiene and existing network security tools lacking the capability to properly manage an IoT network, implementing IoT devices can be a security nightmare.

    Join us in our upcoming webinar as we discuss the current state of IoT in enterprises, the challenges of properly securing IoT devices, and our top recommendations on how to resolve these challenges and prepare your organisation for the age of automation.
  • Stop Phishing Attacks with Email Threat Isolation Recorded: Nov 22 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.

    Register Today
  • A CTO’s Perspective: Network Security for the Cloud Generation Recorded: Nov 21 2018 31 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilised and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappears.

    In this webinar, we'll look at today's new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Dr. Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec, as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session, they'll discuss:
    • A security insider's view of market trends and the 24/7/365 demands of a distributed workforce.
    • The increased complexity of managing full security stack with limited resources.
    • The technical challenges of securing cloud applications.
    • Cloud solutions that solve cloud problems.

    It promises to be an insightful event for all security, network and IT professionals. After their presentation, the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Nov 14 2018 62 mins
    Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic EMEA
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • See How Easy It Is To Hack a Mobile Device (Video Demo) Recorded: Nov 7 2018 5 mins
    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • Ask the Experts—Securing Data and Email in Office 365 Recorded: Oct 30 2018 63 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Improving compliance and governance through automation Recorded: Oct 4 2018 59 mins
    Puneet Kukreja, Deloitte Partner, Cyber Risk Advisory | Paul McPhee, Symantec Strategic Sales Manager, Emerging Technologies
    Businesses and Individuals, need to have clear visibility of the strength and application of their security controls, to protect their systems.

    Governance over the controls is as important as implementing the controls in the first place and understanding what the important controls are and how they need to be measured is vital. The ability to measure the application and effectiveness of cyber controls in a streamlined and automated way to allow effective decision making and remediation of issues is key to ensuring they are providing the protection required.

    Australian businesses face several Cyber Governance & Compliance challenges:

    - Compliance Validation: Concerns over verifying technology compliance

    - Cyber Threat: Concerns over detection of advanced cyber threats causing a data breach

    - Privacy or Regulatory: Concerns over PII, PCI, MAS regulation, Mandatory data breach and data privacy

    - Security Visibility: Concerns over inefficient reporting of security posture or security controls

    - Establish Controls: Architect, design, implement and operationalise new security controls

    Deloitte and Symantec are hosting a live webinar to discuss cyber governance and compliance challenges in Australia.

    Join this webinar for insights into cyber operations, business reporting and strategies for navigating the current landscape.
Symantec APAC Integrated Cyber Defense Webinar Series
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2019 Internet Security Threat Report (ISTR): The New Threat Landscape
  • Live at: Mar 28 2019 5:00 am
  • Presented by: Nick Savvides, Chief Technology Officer, APAC, Symantec
  • From:
Your email has been sent.
or close