Hi [[ session.user.profile.firstName ]]

Cybersecurity in 2016: Results from the Cyberthreat Defense Report

The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

•Understand why 62 percent of organizations expect to be breached this year.
•Learn which cyber threats are of the utmost concern to the enterprise in 2016.
•Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
Recorded Apr 20 2016 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
Presentation preview: Cybersecurity in 2016: Results from the Cyberthreat Defense Report

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience Recorded: Mar 23 2017 37 mins
    Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • 3 Proven Workflows for A Successful Windows 10 Migration Recorded: Mar 22 2017 28 mins
    Aimee Simpson, Product Marketing Manager, Code42
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • Building a Blueprint for an Insider Threat Program Recorded: Mar 16 2017 58 mins
    Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator)
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery Recorded: Oct 26 2016 48 mins
    John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
    Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

    Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

    Viewers will learn:
    - Why ransomware is a burgeoning business and who is being targeted
    - Best practices & recommendations to reduce risk and assure continuous data protection and recovery
    - How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
  • Cybersecurity in 2016: Results from the Cyberthreat Defense Report Recorded: Apr 20 2016 47 mins
    Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
    The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

    Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

    •Understand why 62 percent of organizations expect to be breached this year.
    •Learn which cyber threats are of the utmost concern to the enterprise in 2016.
    •Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
  • Defend Your Data from the Dark Side Recorded: Mar 23 2016 22 mins
    David Payne, VP Global Systems Engineering at Code42
    Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

    • Protect every version of every file forever, with no limits on file size, type or number of files

    • Shorten time to recovery and restore files to any device or iOS at any time

    • Rapidly mitigate incidents by quickly identifying the data on compromised devices
  • Minimizing Data Threats: How to Protect Your Most Precious Resource Recorded: Mar 15 2016 25 mins
    David Lingenfelter, CSA Mobile Working Group Co-Chair
    According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

    Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

    •Key considerations for minimizing the inherent risks embedded within mobile computing
    •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
    •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks
Data-centric security for the enterprise
In an era of the inevitable breach, Endpoint Data Protection is an essential and fundamental cyber security investment. Key factors such as scalability and reliability are usually the main source of all security problems. Code 42 helps enterprises with these challenges by continuously backing up laptops and desktops to capture every version of every end-user file and gather them into a central repository that’s either on-premises or in a public cloud with encryption keys onsite. For you, this means you have full visibility into endpoint data so you can limit risk, meet data privacy and compliance regulations, and easily restore lost data —at any time—even out of the office.

Learn more at www.code42.com or follow us on our blog at: blog.code42.com!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity in 2016: Results from the Cyberthreat Defense Report
  • Live at: Apr 20 2016 6:00 pm
  • Presented by: Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
  • From:
Your email has been sent.
or close