Why Traditional Anti-Virus Protection Is Not Enough

Macky Cruz - Lead Security Engineer at TrendLabs
Learn the factors as to why traditional Anti-Virus is no longer enough to protect your businesses from the risks posed by complex security threats of today. Macky Cruz, Lead Security Engineer for TrendLabs, outlines how the changes in digital trends and technologies introduce stealthier and multi-platform threats.
• Discover what kinds of security threats plagued SMBs.
• Understand how malware infection and information theft can impact your businesses
• Learn how comprehensive security can protect your businesses from security risks.

Who should attend this webinar: This webinar has been designed to cater to both technical and non-technical viewers. It is especially useful for IT personnel and SMB owners and/or decision makers.
Nov 12 2013
37 mins
Why Traditional Anti-Virus Protection Is Not Enough
More from this community:

IT Security

  • Live and recorded (5242)
  • Upcoming (127)
  • Date
  • Rating
  • Views
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Channel
  • Channel profile
  • Virtual Patching in the Modern Data Center Enterprise Mar 12 2015 5:00 pm UTC 60 mins
    In most targeted attacks, threat actors use existing vulnerabilities as point of entry to exploit vulnerable systems. Many organizations understand the importance of closing the holes by patching the system immediately, however, in reality it is an impossible task. Zero-day vulnerabilities leave the system perpetually vulnerable, leaving attackers free to zero-in to take advantage of the hole. All it takes is one vulnerability for a system to be compromised.

    This Virtual Patching webinar discusses the options organizations have to better manage vulnerabilities. It presents new methods to help organizations adapt & mitigate known & unknown vulnerabilities.
  • Executive Action Plan for Cyber Security Mar 5 2015 6:00 pm UTC 60 mins
    Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • IT Security Budgeting and Decision Making in the Wake of Targeted Attacks Recorded: Dec 11 2014 41 mins
    It’s the golden age of cybercrime. Major data breaches are being discovered at a truly alarming pace. Executives and board members are finally taking notice—but many still haven’t evolved beyond stale thinking about the role and value of IT security. So the day-to-day work of fending off attacks remains more challenging and complex than it needs to be.

    Forrester Research VP and Principal Analyst John Kindervag will present the results of a new study commissioned by Trend Micro about IT security budgeting and decision-making priorities. He’ll share how the priorities of your peers are shifting in response to the new reality.

    At the webinar, you’ll learn:

    • How outdated perspectives on security are complicating the fight against modern cyber threats
    • How shifting the focus from return on security investment to return on risk reduction can drive more effective decision-making
    • Why security professionals must take on the role of trusted advisor within their organizations
  • BlackEnergy: The latest SCADA Threat and How To Protect Against it Recorded: Nov 25 2014 52 mins
    The Department of Homeland Security announced recently that a malware program called BlackEnergy is targeting critical infrastructure in the U.S. Industrial control systems in many key industries are at risk from threats believed to have originated with Russian government-sponsored hackers. Join Trend Micro to learn how to protect your organization from sophisticated attacks aimed specifically at your users, your supervisory control (SCADA) systems and your customers’ information. Learn now to identify risks, discover unwanted malware, and mitigate threats.
  • AWS re:Invent 2014 Roundup Recorded: Nov 20 2014 38 mins
    Hopefully you had a chance to attend 2014 AWS re:Invent and learn how Trend Micro offers security solutions optimized for AWS environments. We’ll discuss the recent announcements made at the show and how Trend Micro can help you meet your shared security responsibilities with comprehensive, elastic security. Build with confidence in the cloud, with Smart. Simple. Security that fits.
  • Cloud Compliance: Avoid the Critical Mistakes That Can Cost Your Job Recorded: Nov 20 2014 50 mins
    When it comes to ensuring compliance and security in an elastic cloud environment, a piecemeal approach is one of the most common—but treacherous—mistakes you can make. Security and compliance depend on a holistic, strategic approach, as well as a unified team with a common agenda. Join JD Sherry, Vice President at Trend Micro, and Purnima Padmanabhan, CEO of Cavirin Systems, as they outline how to build an automated system that spans from discovery through remediation.

    You will learn how to:

    • Establish and map policies
    • Evaluate and enhance your compliance posture
    • Remediate threats in an ongoing and continuous approach
  • PoS Security Threats: Increase Compliance While Reducing Costs Recorded: Nov 13 2014 62 mins
    Credit card data held by the retail and hospitality industry has attracted the attention of hackers who steal and sell this data for profit. More than 65% of retail transactions are done via credit, debit or gift cards; cash transactions continue to decline worldwide. Point of Sale (PoS) devices process these transactions and send data to payment processors, so PoS devices are at the heart of these data breaches. Learn the critical 3 types of retail PoS threats, how to increase your PCI DSS 2.0 compliance, and best practices for merchants approaching the critical holiday buying and hospitality season.
    You will learn:
    • The three types of retail PoS threat categories
    • Implications for the retail and hospitality/travel & leisure industries
    • Anatomy of an PoS attack/hacker threats
    • Best practices for merchants and payment processors
    • Resources available to protect valuable data
  • Architecting Security to Address Compliance for Healthcare Providers Recorded: Nov 12 2014 56 mins
    Healthcare organizations often lack the financial and human resources required to implement comprehensive information security programs. Increasingly complex healthcare IT systems, medical devices containing software, mobile devices, patient portals, legacy systems, and aging infrastructures, all combine to make comprehensive security of the healthcare organization’s environment ever more challenging. Join Tracy Harris/ Director of Healthcare Solutions at Trend Micro and Nadia Fahim-Koster/ Director of IT Risk Management for Meditology Services as they outline why healthcare organizations are a lucrative target for attackers. The lack of a comprehensive security program often leads to data breaches. In addition, healthcare organizations must comply with increasingly complex federal and state regulatory requirements related to the privacy and security of Protected Health Information (PHI). How can a healthcare organization achieve compliance and increase security in a comprehensive and effective way?
    Join this webcast to find out:

    • How health care organizations can address risk and achieve compliance by improving security.
    • What solutions are available to create a smart protection strategy for healthcare organizations.
    • How to architect a solution that can address endpoints, the cloud, data centers, and networks so that there is protection and insight before, during or after an attack.
  • The Evolving Threat Landscape: Advanced Persistent Threats Recorded: Oct 30 2014 45 mins
    No industry or organization is safe from today’s advanced persistent threats (APTs). APTs are stealthy, insidious and mutate quickly targeting high-value assets within the target organization, such as financial data, trade secrets and source codes. A 2012 Ponemon study of 56 large US organizations concluded there are 1.8 successful attacks per organization per week with a median cost of cybercrime at $8.9M. With conventional security not being able to keep up and with industry and governmental regulations changing and growing in complexity, a new approach of security is needed to quickly detect, shut down and block APTS.

    We invite you to listen to CSC’s, Global Technical Consulting Lead, Stephen Brennan and Trend Micro’s Deep Discovery experts discuss how CSC’s Advanced Threat Detection (ATD) leveraging Trend Micro’s Deep Discovery toolset helps organizations:
    • Quickly detect evolving and sophisticated “zero-day” malware and other APTs
    • Protect their most critical information assets and intellectual property from damage, data loss and downtime
    • Continuously monitor their entire network 24x7x365

    Register today for this informative event and you would win a $100 AMEX gift card by attending.
  • FBI Insights on Fighting Cybercrime – A Trend Micro Thought Leadership Event Recorded: Oct 28 2014 61 mins
    National Cyber Security Awareness Month (NCSAM) concludes with a focus on law enforcement. Join Jon Clay/Sr. Manager in Trend Micro Threat Research Communications as he moderates this LIVE session with a Special Agent who will share FBI insights on fighting cybercrime. Traditional criminals and cyber criminals are merging and the stakes have never been higher: U.S. organizations are the target of choice for intellectual property, trade secret resources and access to valuable Personally-Identifiable Information like credit cards and SSNs. Hear first-hand from the FBI Special Agent about previous complex investigations, international participation efforts and legal and investigative issues raised by computer and telecommunications technologies. Learn steps to take to detect and mitigate breaches, avoid jeopardizing digital forensics, and how to report cybercrime to the FBI or international authorities.
  • Shellshock Exploits Part 2: Learn from Experts Recorded: Oct 7 2014 59 mins
    The Shellshock patch race is on. Patches for the critical Shellshock (aka Bash) vulnerability are out and deployments are happening. But the bad guys aren't standing still: attacks have started and are increasing. The Shellshock/Bash vulnerability is an unprecedented threat giving attackers potential unfettered access to critical LINUX systems. Join this ShellShock Part 2 webinar to learn:
    * The risks this vulnerability poses,
    * The challenges in protectcing against attacks
    * What Trend Micro knows of current attacks; and
    * What you can expect with future attacks
  • Optimized Security For Your Virtual Environment Recorded: Oct 1 2014 40 mins
    As you build your modern data center, security is a critical consideration and yet often considered a painful necessity that slows down data center operations. Don’t let security slow you down. If you are using traditional security technologies built for a physical data center, there are better security options out there. Options that understand and take advantage of virtualization technology to fit your data center needs.

    Join this webinar to learn how the right security solution can automate security as part of provisioning process, reduce management burden while still ensuring a highly secure modern data center. Walk away with a better understanding of how security can be optimized for virtual environments to reduce impact on resources.
  • Don’t Get Rocked by ShellShock. What You Need to Know Recorded: Sep 26 2014 33 mins
    The latest vulnerability to shake the internet to its core is called ShellShock. Learn more about how this vulnerability is potentially bigger in scale and size as Heartbleed and what you and your organization can do to mitigate it. Trend Micro has already pushed remediation patches for this particular exploit to its Smart Protection Network servers, updating customers using Host Intrusion Prevention (HIPS) modules within the Deep Security platform and letting them virtually patch all of their systems. Learn more on how the issue affects you and how your organization can be protected.
  • Securing Web Apps for Fed Agencies Recorded: Sep 17 2014 54 mins
    The increased use of web apps by Federal Agencies is revolutionizing the way citizens interact with government. But web apps are also a favorite target of hackers. Join Trend Micro to learn how to :
    * Expand Detection
    * Integrate Protection
    * Centralize Visibility
    Get the inside story on simple, cost - effective ways to make your agency's web apps more secure.
  • Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall Recorded: Sep 10 2014 48 mins
    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage unitl you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Jon Clay, Sr. Manager of Global Threat Communications at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

    This LIVE webinar will answer questions such as:
    • What industries and countries are being targeted?
    • Should firms pay criminals the ransom?
    • Should organizations notify the authorities?
    • How can ransomware be mitigated?

    Bring additional questions to this informative session and hear first-hand input from a threat defense expert.
  • Smart Protection Suites from Trend Micro Recorded: Aug 27 2014 41 mins
    Extend better protection to the cloud, onsite, or both. Trend Micro Smart Protection Suites gives you complete visibility across multiple layers of interconnected threat and data protection. In this Live session, learn how organizations can achieve:
    * Better protection across all layers
    * User-centric visibility and control
    * Use any mix of cloud and on-premises
    * Lower complexity and costs
    It’s easy to switch to Complete User Protection with Trend Micro Smart Protection Suites.
  • Top 3 Ways to Improve Web App Security Recorded: Aug 26 2014 47 mins
    Russian cybergangs recently stole more than one billion passwords by exploiting common web app vulnerabilities. Your organization doesn’t have to be the next victim. Join Dawn Smeaton/Director of Web App Solutions at Trend Micro, to learn the top 3 security strategies your business can’t do without. Discover the keys to:
    * Expanding detection
    * Integrating protection
    * Centralizing visibility
    Hackers don’t discriminate. No target was too big or too small. Learn ways to mitigate the risks.
  • Russian Cybergangs: What Businesses Should Know Recorded: Aug 21 2014 40 mins
    It is being called the Hack of the Century with 1.2Billion stolen passwords and 420,000 websites breached. What can you learn from the Russian hack? Join Jon Clay, Sr. Manager of Threat Research Communication at Trend Micro, for a concise analysis. You will learn:
    * Which attack vectors were most effective in driving the attack
    * How the Russian underground is targeting your customers through you
    * Why most security pros overlook four highly cost-effective steps to protect networks

    You’ll also learn some of the newest technologies to fend off these attacks.
  • Comprehensive Security for Federal Agencies Recorded: Aug 19 2014 55 mins
    At this comprehensive, in-depth webinar, you will learn about the entire spectrum of online threats and security challenges currently facing agencies large and small, along with the state-of-the-art solutions available to combat them. Join Brendan Farnand/ Senior Manager for Customer Solutions at Trend Micro who will outline:
    • Cloud and Data Center Security: How the migration to the cloud and to virtualized data centers has created new challenges and threats, and how to effectively secure them
    • Cyber Threats and Cyber Security: Advanced cyber attacks are among the newest and most dangerous threats—learn how they work, and how best to detect them
    • Complete User Protection: As endpoints proliferate, the risks to your network multiply. Learn how to monitor and secure user activity across all the devices that connect to your network
  • Protecting Federal Agencies from Cyber Attacks Recorded: Jul 24 2014 53 mins
    With cybercriminals growing more sophisticated, federal CISOs and CIOs face tough challenges keeping data secure—and tight budgets don’t help. Following a brief review of the current cyber-threat landscape, we’ll explore the reasons that traditional security measures are insufficient to defend against today’s targeted attacks and advanced threats. The webinar will conclude with a discussion of cost-effective strategies to harden defenses against these threats without increasing security-administration overhead.
Data and Internet Protection
Thought leadership webinar series

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Traditional Anti-Virus Protection Is Not Enough
  • Live at: Nov 12 2013 2:00 am
  • Presented by: Macky Cruz - Lead Security Engineer at TrendLabs
  • From:
Your email has been sent.
or close
You must be logged in to email this