Hi [[ session.user.profile.firstName ]]

January Monthly Threat Webinar - Destructive Attacks to Critical Infrastructure

Hear the latest on the most recent data breaches, web threats, and cyber security topics in the news.
The recent attacks on Ukrainian Power Utility are highlighting a recent shift in destructive attacks against Critical Infrastructure. In this webinar Ed Cabrera, VP Cybersecurity Strategy and former CISO of the US Secret Service, will be joining us to cover this latest trend we’re seeing in the use of destructive malware against both critical infrastructure and commercial organizations. Learn the latest in destructive malware and why this technique is being used by threat actors today.
Recorded Jan 29 2016 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; Ed Cabrera VP Cybersecurity Strategy
Presentation preview: January Monthly Threat Webinar - Destructive Attacks to Critical Infrastructure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing the Hybrid Cloud in Azure Recorded: Oct 13 2016 33 mins
    Lauren Newby, Manager of Cloud Workload Security at Trend Micro
    Learn how Trend Micro Deep Security is working hand in hand with Microsoft to provide customers a secure cloud to meet their business needs for the hybrid cloud reality of today, and tomorrow.

    In this webinar you will learn:
    • Microsoft Ignite announcements for Azure
    • How organizations should be thinking about security for the hybrid cloud
    • How to use Deep Security to manage and deploy security in the cloud
    • How to achieve cost effective compliance
  • Monthly Threat Webinar Series: September 2016 – Mobile Ransomware Recorded: Sep 29 2016 28 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    This month’s webinar will focus on the mobile ransomware landscape including the evolution of the threat, where we’re seeing attacks occur, and how to protect your devices from this threat. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top mobile ransomware threats observed.
  • Optimizing Hybrid Cloud Security in the Software-Defined Data Center Recorded: Sep 27 2016 29 mins
    Mike Smith, Director, Modern Data Center Solutions, Trend Micro
    Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.

    In this webinar you will learn how to….
    -Optimize data center resources with virtualization-aware security
    -Deliver automated security across environments
    -Manage and deploy security efficiently
    -Achieve cost effective compliance
  • What Every MS Exchange Professional Needs to Know About Ransomware Recorded: Sep 19 2016 31 mins
    Michael Osterman and Chris Taylor, Director Product Marketing
    In the first 5 months of 2016 Trend Micro found more new ransomware families than the last 2 years combined. Enterprising criminals are flocking to get in on this lucrative market which makes your job even tougher since most ransomware is delivered via a phishing email.

    In this session, Mike Osterman, from Osterman Research and Chris Taylor from Trend Micro will cover the latest ransomware research and best practices to keep ransomware out of your email system and from impacting your users.
  • Protecting Your Applications and Data in AWS Recorded: Sep 15 2016 53 mins
    Saif Chaudhry, Principal Architect at Trend Micro; Dwayne Hoover, Sales Engineering Manager, Sumo Logic
    Enterprises are running their workloads across complex, hybrid infrastructures, and need solutions that provide full-stack, 360-degree visibility to support rapid time to identify and resolve security threats. Trend Micro Deep Security offers seamless integration with Sumo Logic’s data analytics service to enable rich analysis, visualizations and reporting of critical security and system data. This enables an actionable, single view across all elements in an environment.

    In this webinar, you will learn how to:
    • Leverage Trend Micro Deep Security’s seamless integration with Sumo Logic’s data analytics service to enable rich analysis, visualizations and reporting of critical security and system data
    • Accelerate compliance by using a single tool that meets most compliance requirements when combined with Sumo Logic
    • Live demo showing how to integrate Deep Security with Sumo Logic Platform in three easy steps.
    • How to leverage out-of-the-box dashboards and saved-searches to improve your security posture
    • See a live use case to show the trail of an attack in Sumo's and how to remediate it quickly with Deep Security
  • Simplify Cloud Security for your Azure Hybrid Environment with Deep Security Recorded: Sep 9 2016 58 mins
    Lauren Newby, Hybrid Cloud Security, Trend Micro; Saif Chaudhry, Principal Architect, Trend Micro
    Trend Micro recently launched the new Deep Security VM in the Azure Marketplace, making it easier for organizations, large and small, to bake security into cloud workloads. Deeply integrated with Microsoft Azure, Deep Security simplifies security management for physical, virtual and cloud workloads from a single comprehensive product with the ability to scale security at the speed of your business. With Deep Security, you can accelerate compliance by using a single tool that meets most compliance requirements when combined with Microsoft Azure, providing you audit evidence without slowing you down.
  • Monthly Threat Webinar Series: August 2016 - 1H'16 Security Roundup Recorded: Aug 30 2016 42 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    This month’s webinar will feature information from our 2016 mid-year security roundup report where we detail out the latest trends within the threat landscape affecting the world. From Ransomware and Business Email Compromise to Data Breaches we’ll cover the most important threats that are targeting our customers and businesses. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top threats observed.
  • Monthly Threat Webinar Series: June 2016 – Exploit Kits Recorded: Jul 1 2016 21 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    This month’s webinar will cover the latest trends in exploit kits and how to protect against them. Recent developments by the actors behind the exploit kits have caused some shifts in which ones are being used. We will also cover the vulnerabilities utilized within a number of the most popular exploit kits.
  • Realities Of Defending Multiple Cloud Services In Today’s Enterprise Recorded: Jun 18 2016 101 mins
    Mark Nunnikhoven, VP, Cloud & Emerging Technologies, Trend Micro
    How do you properly evaluate the risk across cloud computing services? Can you move beyond knowing what services are in use to knowing how they are being used? Can your choice of service provider reduce your risk and the operational impact of adopting cloud services?

    Join us as we discuss the scope of the issue, the roadmap to resolve it, and share experiences and perspectives of two leading executives grappling with these issues today.
  • May Monthly Threat Webinar: Go From Hunted to Hunting Recorded: May 31 2016 48 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
  • Cloud automation in Microsoft Azure with CHEF and Trend Micro Deep Security Recorded: May 26 2016 39 mins
    Keith Vidal, Microsoft; Jessica Devita, CHEF; and Jeffrey Westphal, Senior Sales Engineer Trend Micro
    Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.

    You will learn how to:
    • Automate your security posture within Azure
    • Use Chef to build compliance and resiliency into your Azure workloads
    • Take security automation to the next level
  • Life after platform EOS: Vulnerabilities keep coming…and they don't expire Recorded: May 19 2016 31 mins
    Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro
    If you’re like 58% of organizations out there, you're still in the process of migrating off Windows Server 2003...almost a year after it went End of Support. Regardless of the end of support environment you’re dealing with, vulnerabilities will still keep coming...and so will the attacks looking to take advantage of them, including high profile varieties like Ransomware. The good news is that there are effective ways to deal with end of support platforms while you transition. In this session you will learn about:
    • The latest in vulnerabilities, including those affecting EOS platforms like Windows Server 2003
    • Best practices for protecting EOS platforms from attacks, including Ransomware
    • How Trend Micro’s proven security can help
  • 3 Secrets to Becoming a Cloud Security Superhero Recorded: May 16 2016 34 mins
    Pat McDowell, Solutions Architect, AWS; and Dawn Smeaton, Director AWS Workload Security, Trend Micro
    Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day by overcoming compliance and design challenges using a (not so) secret arsenal of AWS and Trend Micro security tools.
  • April Monthly Threat Webinar – 0-Days & Virtual Patching Recorded: Apr 29 2016 31 mins
    Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro
    This month’s threat webinar will discuss how 0-days are used, who uses them, and what the good vulnerability researchers do to ensure people and organizations are protected.
  • How to Defeat Ransomware Recorded: Apr 27 2016 63 mins
    Ed Cabrera, VP Cybersecurity Strategy. Jon Clay, Cybersecurity Expert
    Join Ed Cabrera, former CISO for US Secret Service and now VP Cybersecurity Strategy and Jon Clay, Cybersecurity Expert for Trend Micro in a webinar that will give you the latest information you need to know on how to effectively protect you and your organization from ransomware and the more insidious crypto-ransomware. Ed and Jon will share the latest trends being used by cybercriminals into this threat which the FBI recently asked for support from businesses and security organizations due to the invasiveness of the attacks against businesses. Trend Micro will also share best practices you can implement to minimize the risk but also specific advanced detection capabilities available within multiple solutions to block the threat across its entire lifecycle.
  • Times of Risk and Cybersecurity Recorded: Apr 22 2016 29 mins
    Fernando Thompson, CIO, UDLAP
    This is the 2nd installment of this webinar series and features Fernando Thompson Chief Information Officer of UNIVERSIDAD DE LAS AMERICAS PUEBLA (UDLAP). Universidad De Las Americas Puebla. Fernando’s presentation will centre around:
    • the biggest security challenges are that are facing the university,
    • what lead him to look for a breach detection solution,
    • how he and his team went about researching the best solution,
    • if they used third party/industry tools to help validate their decisions on breach detection solutions.
    • What other solutions they looked at besides Trend Micro Deep Discovery,
    • why they chose Deep Discovery,
    • how they deployed,
    • the results they have achieved; and
    • recommendations on best practices for organizations looking to select a breach detection solution.
  • Accelerating PCI Compliance in the Hybrid Cloud Recorded: Apr 21 2016 98 mins
    Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro
    The modernization of the data center and move to the cloud—in combination with increasing consumer pressure to protect cardholder information and an expanding corporate focus on data protection—can make the process of PCI compliance daunting. The good news is that help is available and can make things easier for CISOs trying to balance security and compliance with business agility.
  • How to Make Ironclad Security Purchase Decisions Recorded: Apr 20 2016 31 mins
    Andrew Braunberg, VP, NSS Labs; and Thomas Skybakmoen, VP, NSS Labs
    Andrew Braunberg and Thomas Skybakmoen of NSS Labs discuss:
    • The nature and role of third-party testing.
    • Trend Micro Deep Discovery’s results in the 2015 BDS Testing.
    • Considerations for decision makers when making security purchasing decisions.
  • PCI Compliance for the Enterprise Recorded: Apr 18 2016 28 mins
    Farshad Ghazi, Global Product Manager, HPE Security; Steve Neville, Director, Hybrid Cloud Security, Trend Micro
    Protecting PCI was difficult enough when US-based consumers thought it was done by mirrors and magic. For the past six months, consumers have had hands-on experience with chip-protected bank cards, yet data breaches still occur. This webinar will look at how PCI compliance is changing due to pressures from consumers on one side, corporate management that finally is starting to take data security seriously, and the CISO in between them who must implement bank card security while balancing the pressures from consumer and management.
  • Thinking About Replacing AV with Next Gen Endpoint? Recorded: Apr 12 2016 44 mins
    Andrew Stevens, Director, Global Product Marketing User Protection - Endpoint Solutions
    Organizations are looking at their endpoint security with a critical eye these days, with more awareness than ever that traditional signature-based antivirus (AV) alone is not enough against modern threats. Learn about next gen techniques like behavioral analysis / machine learning, application whitelisting / control, vulnerability shielding, memory inspection, endpoint detection & response (EDR), lateral movement protection and what the 2016 Gartner Endpoint Magic Quadrant says about endpoint protection. In this webinar, you’ll also learn about Trend Micro’s 's combination of proven and next gen endpoint capabilities, which will help your organization protect, detect, and respond to threats better in an automated, integrated solution.
Global leader in security software and solutions.
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.

· In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.

· Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: January Monthly Threat Webinar - Destructive Attacks to Critical Infrastructure
  • Live at: Jan 29 2016 9:00 pm
  • Presented by: Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro; Ed Cabrera VP Cybersecurity Strategy
  • From:
Your email has been sent.
or close