Hi [[ session.user.profile.firstName ]]

3 Steps To Take Today To Better Protect Your Data

According to Gartner, worldwide information security spending will reach $81.6 billion this year. Despite that, more than 80 percent of U.S. companies have been successfully hacked. Today’s attacks are bypassing traditional security defenses at an alarming rate. Social engineering methods, like phishing scams and other credential theft, may not be very sophisticated – but trends in corporate computing like BYOD, hybrid cloud environments, employees using public Wi-Fi, and have changed the landscape of security needs while broadening the potential attack vector.

So what do you really need to protect your organization and stop cybercriminals?

In this webinar, you will learn:

-Why expensive security products may not actually protect you
-How to quickly evaluate the security posture of your organization
-Steps you can take today to protect your company, your data, and your employees
Recorded Nov 16 2016 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Manzuik, Director of Security Research, Duo Security
Presentation preview: 3 Steps To Take Today To Better Protect Your Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cure Your Doctors’ Headaches and Improve Your Hospital’s Access Security Recorded: Nov 29 2016 28 mins
    Umang Barman, Product Marketing Manager
    Industry data suggests 91% of doctors' use personal smartphones and tablets for patient care. These personal devices or BYOD enable doctors’ to reach patients anytime and from anywhere. However, IT does not control or manage these devices. Recently, Catholic Health Services of the Archdiocese of Philadelphia was fined $650,000 for a lost unencrypted and password unlocked iPhone with patient data. With Duo Trusted Access Platform, you can allow doctors to use their own smartphones and tablets while also ensuring secure access.

    In this webinar, you will learn how to:

    -Get visibility into the security of smartphones and tablets used by doctors
    -Save doctors' time to approve e-prescriptions
    -Help meet HIPAA and EPCS compliance requirements
  • 3 Steps To Take Today To Better Protect Your Data Recorded: Nov 16 2016 41 mins
    Steve Manzuik, Director of Security Research, Duo Security
    According to Gartner, worldwide information security spending will reach $81.6 billion this year. Despite that, more than 80 percent of U.S. companies have been successfully hacked. Today’s attacks are bypassing traditional security defenses at an alarming rate. Social engineering methods, like phishing scams and other credential theft, may not be very sophisticated – but trends in corporate computing like BYOD, hybrid cloud environments, employees using public Wi-Fi, and have changed the landscape of security needs while broadening the potential attack vector.

    So what do you really need to protect your organization and stop cybercriminals?

    In this webinar, you will learn:

    -Why expensive security products may not actually protect you
    -How to quickly evaluate the security posture of your organization
    -Steps you can take today to protect your company, your data, and your employees
  • 3 Critical Protections for your Microsoft Cloud Migration Recorded: Oct 19 2016 59 mins
    Ruoting Sun, Product Marketing Manager, Duo Security
    As organizations migrate to cloud-based Microsoft services like Office 365, many are concerned that traditional on-premises security infrastructures are now inadequate. The most common workloads requiring this new security approach as they move to public cloud platforms are email, Windows Desktop, and directory services.

    In this webinar, you’ll learn 3 critical protections for securing your move to the Microsoft cloud:

    •Security for Exchange and Office 365 email environments, local and remote Windows desktop logon
    •Insight around endpoints and device health accessing your Microsoft apps and services
    •Integration with on-premises and Azure Active Directory for role-based access policies
  • Why Healthcare Data is One of the Easiest Targets for Hackers Recorded: Sep 20 2016 33 mins
    Mike Hanley Program Manager for Research and Development at Duo Labs & Steve Won, Product Manager at Duo Security
    The Duo Labs research team has pinpointed some of the most significant reasons that medical records are among the easiest of any type of data to steal. For example, Duo Labs found that 76 percent of healthcare customers are running Windows 7, with 500+ known vulnerabilities to exploit.

    It only takes one outdated device for a hacker to exploit a known vulnerability. The real-world implication? A hacker gains access to patient records, including birthdates, social security numbers, medical, financial, and insurance information.

    Find out how to prevent hackers from gaining access to healthcare data instead of having to react to some of the recent ransomware attacks on healthcare organizations around the world. In this webinar, you will learn:

    The top 10 reasons healthcare data is so at risk
    How it only takes one “open door” to steal passwords, gain access to entire databases of patient information, and install malware, making your organization a ransomware target
    The top 5 fundamental and easy “good hygiene” steps you can take today
  • 10 Things I Learned by Phishing My Company Recorded: Sep 20 2016 55 mins
    Steve Edwards, Security Operations Manager at Duo Security
    Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your data and users?

    Phishing simulation tools are a powerful way to see how many and which employees are prone to fall for phishing attacks. With this information in hand, you can determine how to train those who are susceptible to avoid these attempts, and provide the tools to protect against them.

    Hear from Steve Edwards, Duo’s Security Operations Manager, on his experience conducting internal phishing campaigns at education and tech organizations. In addition to interesting metrics and appropriate techniques that come from phishing simulations, Steve has 10 valuable lessons to share.

    Watch the recording for this webinar to learn several unexpected things about phishing, your company, and human psychology.
  • Why the Ohio State University Chose Duo Recorded: Sep 20 2016 53 mins
    Helen Patton CISO, The Ohio State University & Patrick Garrity Director of Solutions Engineering, Duo Security
    Organizations with large, dispersed user populations face the challenge of protecting users in many different circumstances. When it comes to security, the human element is the most difficult to control, so having the right tools is essential.

    The Verizon 2016 DBIR reveals that 63% of breaches used weak, default or stolen credentials, and again they recommend two-factor authentication as one of the protective measures. But how can you get your privileged staff—not to mention others on campus—to accept something that creates a break in their workflow?

    In this webinar, you will learn:

    Why OSU selected Duo for two-factor and endpoint security
    How they eliminated the burden of provisioning
    The OSU approach to endpoint visibility
Our mission is to protect your mission.
Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access. With endpoint visibility, you get insight into all devices without installing an agent - identify and block outdated devices.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 3 Steps To Take Today To Better Protect Your Data
  • Live at: Nov 16 2016 5:00 pm
  • Presented by: Steve Manzuik, Director of Security Research, Duo Security
  • From:
Your email has been sent.
or close