Cyber Threat Defense Report

Mark Bouchard/VP at Cyber-Edge Group and Jon Clay/Director of Global Threat Research at Trend Micro
Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
• One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
• Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
• Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
• One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
Apr 22 2014
61 mins
Cyber Threat Defense Report
More from this community:

Cloud Computing

  • Live and recorded (4184)
  • Upcoming (133)
  • Date
  • Rating
  • Views
  • Many companies struggle with how to sell effectively with different brands, platforms, and divisions. One company, Cenveo, has tackled this challenge head-on with Sales Cloud and Data.com, working through culturally diverse business units, data silos owned by territorial sales reps, and challenges cross selling.

    There are many approaches to achieve more effective selling which we will explore with Jason Jordan of Vantage Point Performance, author of the best-selling book, Cracking the Sales Management Code.

    Jason will share best practices that drive business results and Kathy Coates, VP of Platform Sales Technology at Cenveo, will share how Cenveo:

    -Saw immediate results from bringing together sales for 3 separate brands
    -Reinvented how they sell--and changed their company culture
    -Achieved more visibility into their entire pipeline than ever before
    -Discovered new opportunities through account hierarchies
    -Gained "eye-opening" insights on their customers
  • Most IT providers have offers related to big data, cloud, mobility and security, and companies are looking at IT as the way to reduce costs and be competitive during an economic crisis. Investments in IT trends such as cloud computing and big data will rise thanks to a new player in the game: the business departments. This analyst briefing will show why companies are investing in IT, and what will change in 2015.

    Why you should attend:

    - Discover how many companies will adopt big data, cloud, mobility and security in 2015
    - Understand the current scenario of these trends in Latin America
    - Learn what will be different in 2015 regarding each trend
  • Providing a seamless user experience from browsing to purchase requires consistent uptime and performance, and seasonal traffic spikes require elastic scalability. In this webinar, we'll explore these and other big data challenges faced by e-commerce businesses and how the cloud can provide a winning solution. We’ll review mobile shops login data analysis, dynamic content, affiliate programs, infrastructure reference architecture, mobile plate- form integration with social media, and network integration and built-in instant messaging uses cases.
  • Real business demands for greater agility, performance and automation are increasingly being held back by traditional storage platforms. As companies move from traditional storage infrastructures to the next generation data centre, they have more options for consuming storage infrastructure than ever before - as a Service, Converged Infrastructure, as an Appliance, or Software running on commodity hardware. Which combination should you choose?

    Andy will review the storage infrastructure choices available today. He will then discuss the elements you should consider for your next generation, cloud storage platform, however you choose to consume storage - Quality of Service for guaranteed application performance, In-line data reduction, Scale-out storage architectures, Self-healing high availability and Complete system automation. Finally, he will share how these capabilities have been proven in the worlds most demanding data centres, including solutions for Virtualised Applications (VMware, Microsoft) and Cloud Orchestration (OpenStack, CloudStack, VMware).
  • For any developer, choosing the right compute infrastructure and back-end database is a critically important decision. In this webinar, we'll explore specific challenges that mobile app and game developers face and how the cloud can provide a winning solution. We’ll also explore cloud solutions for big data challenges for MMOG, built-in analytics, online and offline MOG online modes, infrastructure reference architecture, and social network and cross-platform game use cases.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • „16Gb Fibre Channel HBAs - Gleich ist nicht gleich - entscheidende Vorteile mit der Emulex-Technologie“
    Entscheidende Design- und Funktionalitätsvorteile der Emulex 16Gb Fibre Channel HBAs, wie „Dynamic Port Utilization“, Brocade ClearLink-Diagnosemöglichkeiten, Daten-Priorisierung mit Quality of Service-Funktionalität, passives Cooling uvm., geben Ihren Kunden massive Vorteile beim Einsatz von Emulex Gen 5 (16Gb) Fibre Channel HBAs gegenüber anderen auf dem Markt verfügbaren Lösungen.
    Bei Gen 5 (16Gb) FC HBAs gilt wirklich – Gleich ist nicht gleich!
    Überzeugen Sie sich selbst davon, damit Sie Ihren Kunden die beste Gen 5 (16Gb) FC-Lösung anbieten können!
  • En este webcast usted aprenderá sobre cómo transformar la función de su departamento central de TI, y ser proveedor de servicios estratégicos para la empresa.
  • The BYOD trend is a symptom of consumerization in the mobile/cloud era that presents an opportunity for IT to be more relevant to the business. Recent studies show more interest than ever in BYO “anything” programs, however this transformation is hindered by concerns over security and complexity. From MacBooks and laptops to smartphones and tablets, a BYO “Anything” strategy must start with the user, not the device. By attending this webinar and discussion, you will learn:
    - How to take a people-centric approach to BYOD programs
    - Simple tips for navigating through the policy nightmares associated with BYOD
    - Key infrastructure requirement for a successful BYOD program
    - How a successful BYOD program can lead to even greater value for business mobility
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Channel
  • Channel profile
  • Virtual Patching in the Modern Data Center Enterprise Mar 12 2015 5:00 pm UTC 60 mins
    In most targeted attacks, threat actors use existing vulnerabilities as point of entry to exploit vulnerable systems. Many organizations understand the importance of closing the holes by patching the system immediately, however, in reality it is an impossible task. Zero-day vulnerabilities leave the system perpetually vulnerable, leaving attackers free to zero-in to take advantage of the hole. All it takes is one vulnerability for a system to be compromised.

    This Virtual Patching webinar discusses the options organizations have to better manage vulnerabilities. It presents new methods to help organizations adapt & mitigate known & unknown vulnerabilities.
  • Executive Action Plan for Cyber Security Mar 5 2015 6:00 pm UTC 60 mins
    Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • IT Security Budgeting and Decision Making in the Wake of Targeted Attacks Recorded: Dec 11 2014 41 mins
    It’s the golden age of cybercrime. Major data breaches are being discovered at a truly alarming pace. Executives and board members are finally taking notice—but many still haven’t evolved beyond stale thinking about the role and value of IT security. So the day-to-day work of fending off attacks remains more challenging and complex than it needs to be.

    Forrester Research VP and Principal Analyst John Kindervag will present the results of a new study commissioned by Trend Micro about IT security budgeting and decision-making priorities. He’ll share how the priorities of your peers are shifting in response to the new reality.

    At the webinar, you’ll learn:

    • How outdated perspectives on security are complicating the fight against modern cyber threats
    • How shifting the focus from return on security investment to return on risk reduction can drive more effective decision-making
    • Why security professionals must take on the role of trusted advisor within their organizations
  • BlackEnergy: The latest SCADA Threat and How To Protect Against it Recorded: Nov 25 2014 52 mins
    The Department of Homeland Security announced recently that a malware program called BlackEnergy is targeting critical infrastructure in the U.S. Industrial control systems in many key industries are at risk from threats believed to have originated with Russian government-sponsored hackers. Join Trend Micro to learn how to protect your organization from sophisticated attacks aimed specifically at your users, your supervisory control (SCADA) systems and your customers’ information. Learn now to identify risks, discover unwanted malware, and mitigate threats.
  • AWS re:Invent 2014 Roundup Recorded: Nov 20 2014 38 mins
    Hopefully you had a chance to attend 2014 AWS re:Invent and learn how Trend Micro offers security solutions optimized for AWS environments. We’ll discuss the recent announcements made at the show and how Trend Micro can help you meet your shared security responsibilities with comprehensive, elastic security. Build with confidence in the cloud, with Smart. Simple. Security that fits.
  • Cloud Compliance: Avoid the Critical Mistakes That Can Cost Your Job Recorded: Nov 20 2014 50 mins
    When it comes to ensuring compliance and security in an elastic cloud environment, a piecemeal approach is one of the most common—but treacherous—mistakes you can make. Security and compliance depend on a holistic, strategic approach, as well as a unified team with a common agenda. Join JD Sherry, Vice President at Trend Micro, and Purnima Padmanabhan, CEO of Cavirin Systems, as they outline how to build an automated system that spans from discovery through remediation.

    You will learn how to:

    • Establish and map policies
    • Evaluate and enhance your compliance posture
    • Remediate threats in an ongoing and continuous approach
  • PoS Security Threats: Increase Compliance While Reducing Costs Recorded: Nov 13 2014 62 mins
    Credit card data held by the retail and hospitality industry has attracted the attention of hackers who steal and sell this data for profit. More than 65% of retail transactions are done via credit, debit or gift cards; cash transactions continue to decline worldwide. Point of Sale (PoS) devices process these transactions and send data to payment processors, so PoS devices are at the heart of these data breaches. Learn the critical 3 types of retail PoS threats, how to increase your PCI DSS 2.0 compliance, and best practices for merchants approaching the critical holiday buying and hospitality season.
    You will learn:
    • The three types of retail PoS threat categories
    • Implications for the retail and hospitality/travel & leisure industries
    • Anatomy of an PoS attack/hacker threats
    • Best practices for merchants and payment processors
    • Resources available to protect valuable data
  • Architecting Security to Address Compliance for Healthcare Providers Recorded: Nov 12 2014 56 mins
    Healthcare organizations often lack the financial and human resources required to implement comprehensive information security programs. Increasingly complex healthcare IT systems, medical devices containing software, mobile devices, patient portals, legacy systems, and aging infrastructures, all combine to make comprehensive security of the healthcare organization’s environment ever more challenging. Join Tracy Harris/ Director of Healthcare Solutions at Trend Micro and Nadia Fahim-Koster/ Director of IT Risk Management for Meditology Services as they outline why healthcare organizations are a lucrative target for attackers. The lack of a comprehensive security program often leads to data breaches. In addition, healthcare organizations must comply with increasingly complex federal and state regulatory requirements related to the privacy and security of Protected Health Information (PHI). How can a healthcare organization achieve compliance and increase security in a comprehensive and effective way?
    Join this webcast to find out:

    • How health care organizations can address risk and achieve compliance by improving security.
    • What solutions are available to create a smart protection strategy for healthcare organizations.
    • How to architect a solution that can address endpoints, the cloud, data centers, and networks so that there is protection and insight before, during or after an attack.
  • The Evolving Threat Landscape: Advanced Persistent Threats Recorded: Oct 30 2014 45 mins
    No industry or organization is safe from today’s advanced persistent threats (APTs). APTs are stealthy, insidious and mutate quickly targeting high-value assets within the target organization, such as financial data, trade secrets and source codes. A 2012 Ponemon study of 56 large US organizations concluded there are 1.8 successful attacks per organization per week with a median cost of cybercrime at $8.9M. With conventional security not being able to keep up and with industry and governmental regulations changing and growing in complexity, a new approach of security is needed to quickly detect, shut down and block APTS.

    We invite you to listen to CSC’s, Global Technical Consulting Lead, Stephen Brennan and Trend Micro’s Deep Discovery experts discuss how CSC’s Advanced Threat Detection (ATD) leveraging Trend Micro’s Deep Discovery toolset helps organizations:
    • Quickly detect evolving and sophisticated “zero-day” malware and other APTs
    • Protect their most critical information assets and intellectual property from damage, data loss and downtime
    • Continuously monitor their entire network 24x7x365

    Register today for this informative event and you would win a $100 AMEX gift card by attending.
  • FBI Insights on Fighting Cybercrime – A Trend Micro Thought Leadership Event Recorded: Oct 28 2014 61 mins
    National Cyber Security Awareness Month (NCSAM) concludes with a focus on law enforcement. Join Jon Clay/Sr. Manager in Trend Micro Threat Research Communications as he moderates this LIVE session with a Special Agent who will share FBI insights on fighting cybercrime. Traditional criminals and cyber criminals are merging and the stakes have never been higher: U.S. organizations are the target of choice for intellectual property, trade secret resources and access to valuable Personally-Identifiable Information like credit cards and SSNs. Hear first-hand from the FBI Special Agent about previous complex investigations, international participation efforts and legal and investigative issues raised by computer and telecommunications technologies. Learn steps to take to detect and mitigate breaches, avoid jeopardizing digital forensics, and how to report cybercrime to the FBI or international authorities.
  • Shellshock Exploits Part 2: Learn from Experts Recorded: Oct 7 2014 59 mins
    The Shellshock patch race is on. Patches for the critical Shellshock (aka Bash) vulnerability are out and deployments are happening. But the bad guys aren't standing still: attacks have started and are increasing. The Shellshock/Bash vulnerability is an unprecedented threat giving attackers potential unfettered access to critical LINUX systems. Join this ShellShock Part 2 webinar to learn:
    * The risks this vulnerability poses,
    * The challenges in protectcing against attacks
    * What Trend Micro knows of current attacks; and
    * What you can expect with future attacks
  • Optimized Security For Your Virtual Environment Recorded: Oct 1 2014 40 mins
    As you build your modern data center, security is a critical consideration and yet often considered a painful necessity that slows down data center operations. Don’t let security slow you down. If you are using traditional security technologies built for a physical data center, there are better security options out there. Options that understand and take advantage of virtualization technology to fit your data center needs.

    Join this webinar to learn how the right security solution can automate security as part of provisioning process, reduce management burden while still ensuring a highly secure modern data center. Walk away with a better understanding of how security can be optimized for virtual environments to reduce impact on resources.
  • Don’t Get Rocked by ShellShock. What You Need to Know Recorded: Sep 26 2014 33 mins
    The latest vulnerability to shake the internet to its core is called ShellShock. Learn more about how this vulnerability is potentially bigger in scale and size as Heartbleed and what you and your organization can do to mitigate it. Trend Micro has already pushed remediation patches for this particular exploit to its Smart Protection Network servers, updating customers using Host Intrusion Prevention (HIPS) modules within the Deep Security platform and letting them virtually patch all of their systems. Learn more on how the issue affects you and how your organization can be protected.
  • Securing Web Apps for Fed Agencies Recorded: Sep 17 2014 54 mins
    The increased use of web apps by Federal Agencies is revolutionizing the way citizens interact with government. But web apps are also a favorite target of hackers. Join Trend Micro to learn how to :
    * Expand Detection
    * Integrate Protection
    * Centralize Visibility
    Get the inside story on simple, cost - effective ways to make your agency's web apps more secure.
  • Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Recorded: Sep 10 2014 48 mins
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage unitl you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Jon Clay, Sr. Manager of Global Threat Communications at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

    This LIVE webinar will answer questions such as:
    • What industries and countries are being targeted?
    • Should firms pay criminals the ransom?
    • Should organizations notify the authorities?
    • How can ransomware be mitigated?

    Bring additional questions to this informative session and hear first-hand input from a threat defense expert.
  • Smart Protection Suites from Trend Micro Recorded: Aug 27 2014 41 mins
    Extend better protection to the cloud, onsite, or both. Trend Micro Smart Protection Suites gives you complete visibility across multiple layers of interconnected threat and data protection. In this Live session, learn how organizations can achieve:
    * Better protection across all layers
    * User-centric visibility and control
    * Use any mix of cloud and on-premises
    * Lower complexity and costs
    It’s easy to switch to Complete User Protection with Trend Micro Smart Protection Suites.
  • Top 3 Ways to Improve Web App Security Recorded: Aug 26 2014 47 mins
    Russian cybergangs recently stole more than one billion passwords by exploiting common web app vulnerabilities. Your organization doesn’t have to be the next victim. Join Dawn Smeaton/Director of Web App Solutions at Trend Micro, to learn the top 3 security strategies your business can’t do without. Discover the keys to:
    * Expanding detection
    * Integrating protection
    * Centralizing visibility
    Hackers don’t discriminate. No target was too big or too small. Learn ways to mitigate the risks.
  • Russian Cybergangs: What Businesses Should Know Recorded: Aug 21 2014 40 mins
    It is being called the Hack of the Century with 1.2Billion stolen passwords and 420,000 websites breached. What can you learn from the Russian hack? Join Jon Clay, Sr. Manager of Threat Research Communication at Trend Micro, for a concise analysis. You will learn:
    * Which attack vectors were most effective in driving the attack
    * How the Russian underground is targeting your customers through you
    * Why most security pros overlook four highly cost-effective steps to protect networks

    You’ll also learn some of the newest technologies to fend off these attacks.
  • Comprehensive Security for Federal Agencies Recorded: Aug 19 2014 55 mins
    At this comprehensive, in-depth webinar, you will learn about the entire spectrum of online threats and security challenges currently facing agencies large and small, along with the state-of-the-art solutions available to combat them. Join Brendan Farnand/ Senior Manager for Customer Solutions at Trend Micro who will outline:
    • Cloud and Data Center Security: How the migration to the cloud and to virtualized data centers has created new challenges and threats, and how to effectively secure them
    • Cyber Threats and Cyber Security: Advanced cyber attacks are among the newest and most dangerous threats—learn how they work, and how best to detect them
    • Complete User Protection: As endpoints proliferate, the risks to your network multiply. Learn how to monitor and secure user activity across all the devices that connect to your network
  • Protecting Federal Agencies from Cyber Attacks Recorded: Jul 24 2014 53 mins
    With cybercriminals growing more sophisticated, federal CISOs and CIOs face tough challenges keeping data secure—and tight budgets don’t help. Following a brief review of the current cyber-threat landscape, we’ll explore the reasons that traditional security measures are insufficient to defend against today’s targeted attacks and advanced threats. The webinar will conclude with a discussion of cost-effective strategies to harden defenses against these threats without increasing security-administration overhead.
Data and Internet Protection
Thought leadership webinar series

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Threat Defense Report
  • Live at: Apr 22 2014 3:00 pm
  • Presented by: Mark Bouchard/VP at Cyber-Edge Group and Jon Clay/Director of Global Threat Research at Trend Micro
  • From:
Your email has been sent.
or close
You must be logged in to email this