Hi [[ session.user.profile.firstName ]]

Verizon Threat Research Advisory Center - Protected Health Information

Fellow Cybersecurity Practitioner:
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
This month's theme: Protected Health Information
Recorded Mar 21 2018 77 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Grim and David Kennedy, Verizon Enterprise Solutions
Presentation preview: Verizon Threat Research Advisory Center - Protected Health Information
  • Channel
  • Channel profile
  • Top Five Benefits of Versa SD WAN Jul 24 2018 3:30 am UTC 60 mins
    Danny Johnson, Dir-Verizon, Helen Wong, Verizon, Rob McBride, Dir-Versa
    Join us and our strategic partner, Versa Networks, for a discussion on Managed SD WAN Security Branch solutions. Through real use cases in deployments at scale, we will discuss how Managed SD WAN can help increase bandwidth, agility and reliability - while maintaining security.
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse Recorded: Jul 18 2018 79 mins
    David Kennedy and John Rudolph, Verizon Global Security
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • How to Transform Your Network From “No and Slow” to “Yes and Go” Recorded: Jul 17 2018 54 mins
    Mark Hollman - Head of SDN/NFV Product Marketing, Verizon Mark Burgbacher – Lead, Verizon Application Enablement Team
    Large enterprises are under pressure to stay ahead of ever increasing customer expectations and developments in technology. They need to be able to innovate, scale and deploy at speed without incurring high costs. Learn how SDN is becoming an enabler to help enterprises accomplish these business objectives, and how Platform as a Service will help your organization accelerate into the future. Now, more than ever, you need to include Network in your full stack DevOps teams.
  • Verizon Threat Research Advisory Center - Cyber-Espionage and Threat Hunting Recorded: Jun 20 2018 77 mins
    John Grim and David Kennedy, Verizon Enterprise Solutions
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Cyber-Espionage and Threat Hunting

    Our Verizon Threat Research Advisory Center presenters will be:
    •Chris Novak, Director, Investigative Response
    •Jihana Clemetson, Senior Analyst, Threat Intelligence
    •Marcus Cymerman, Senior Analyst, Network Forensics
    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas

    For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.

    Following the cyber-espionage insights, we'll cover the following topics:

    •Current Intelligence
    •Attacks & Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Your IoT Security Strategy: Critical Factors For Secure Implementations Recorded: Jun 12 2018 37 mins
    Bharadwaj Pulugundla, Manager Digital Innovation, Verizon Enterprise Solutions
    The Internet of Things (IoT) presents an unparalleled opportunity for organizations to break new ground with innovative products and solutions. It will also give consumers the ability to efficiently access goods and services in real-time at any desired location. However, businesses must continue to ensure maximum protection for their assets and the data they hold.

    This webinar presents the case for:

    · Why security efforts need to be focused and comprehensive when implementing an IoT strategy
    · The need to have a robust structure from which to base your security and privacy controls
    · Why a 5-point framework is a highly effective approach

    The discussion will also leverage industry examples to help you understand how integrating good cyber security controls into your innovative IoT solutions will help meet your critical business objectives.
  • Verizon Risk Report - Streamline Security with Actionable Insights Recorded: May 17 2018 39 mins
    Katie Crammer, Director, Verizon Global Security Solutions
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Verizon Risk Report - Streamline Security with Actionable Insights Recorded: May 17 2018 39 mins
    Katie Crammer, Director, Verizon Global Security Solutions
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing Recorded: May 16 2018 73 mins
    John Grim and David Kennedy, Verizon Enterprise Solutions
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • 2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion Recorded: May 10 2018 60 mins
    Craig Bowman, Vice President - Advanced Solutions, Verizon
    The 2018 Verizon Data Breach Investigations Report (DBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,216 confirmed breaches. But what does it really mean for federal agencies?

    Join our panel of federal cyber security experts for a look at some of the key findings of the 2018 report:
    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • State affiliated actors are prevalent threat actors against the public sector.
    • The average time gap between the first click on a phishing campaign and the first report to security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Chris Gagne- ASAIC, Criminal Investigative Division, Cyber Forensics and Technology Unit, United States Secret Service
    • Matthew Noyes - Cyber Policy and Strategy Director, United States Secret Service
    • Bernard Wilson - Program Manager - Network Intrusion Responder (NITRO), United States Secret Service
    • Jeff Wagner- Associate Chief information Officer, U.S. Office of Personnel Management (OPM).
    • Marc Spitler- DBIR Author/Analyst, Verizon
    • Craig Bowman (moderator)- Vice President, Advanced Solutions Division, Verizon
  • Virtual Network Services Enterprise Orchestration Demonstration Recorded: Apr 19 2018 15 mins
    Mark Hollman, Senior Manager–SDN & NFV Product Marketing Verizon Enterprise Solutions
    This webinar demonstrates Verizon Virtual Network Services (VNS) end to end automated provisioning process. Based on a recording conducted in our Tulsa lab environment, two virtual services (routing and security) are provisioned in around five minutes on to a white box uCPE device, giving an overview of the available tools, the user experience, and some highlights and benefits of the VNS product offering.
  • Verizon Threat Research Advisory Center - 2018 Data Breach Investigations Report Recorded: Apr 18 2018 82 mins
    John Grim, David Kennedy, and Marc Spitler, Verizon Enterprise Solutions
    Live Broadcast from RSA ....featuring an overview of the new 2018 Data Breach Investigations Report.
  • 2018 Verizon Data Breach Investigations Report - Panel Discussion Recorded: Apr 10 2018 61 mins
    Moderator, Jeff Duran with threat experts
    Tuesday, April 10th, 10am EST

    The 2018 Verizon Data Breach Investigations Report, now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,347 confirmed breaches. But what does it really mean to you? Join our panel of experts for a first look at some of the key findings of the 2018 report:

    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • Forget slick cybercriminals targeting billion-dollar businesses. Most attacks are opportunistic and target the unprepared.
    • The average time gap between the first click on a phishing campaign and the first report to Security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • Based on our data, one industry saw 93% of their data breaches occur at the point of sale.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Rick Holland, CISO, Vice President Strategy at Digital Shadows
    • Michael Coden, CISSP, Managing Director, BCG Platinion North America, Head of Cybersecurity Practice
    • Chris Camacho, CEO at NinjaJobs

    The cybersecurity answers you want, straight from the experts.
  • Demystifying the move to MS Azure, how to easily implement a cloud strategy Recorded: Mar 22 2018 49 mins
    Larry Cimbalista, Product Manager, Verizon; Jaime Schmidtke, Cloud Networking Specialist, Microsoft
    Learn how easy it can be to bring up applications in the MS environment simply, securely and reliably.

    In this session you’ll learn how MS Azure is helping large enterprises quickly add cloud connections locally, regionally and globally to drive sales, grow revenue and compete.
  • Verizon Threat Research Advisory Center - Protected Health Information Recorded: Mar 21 2018 77 mins
    John Grim and David Kennedy, Verizon Enterprise Solutions
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • Verizon Threat Research Advisory Center - Cryptocurrency Attacks Recorded: Feb 21 2018 89 mins
    John Grim and David Kennedy, Verizon Enterprise Solutions
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Last Minute Guide to Help Address GDPR Compliance Recorded: Feb 21 2018 39 mins
    Saab Bharaj, Principal Consultant, Data Protection and Privacy, Verizon Enterprise Solutions
    By now, you’re probably well into the implementation of policies and governance to ensure your organization is GDPR-compliant. Nevertheless, you may still be questioning whether there is a database, process or function within your department that hasn’t been through the full rigor of your compliancy program.

    Join our live webinar as a sanity check against best practice and real-life examples whether:
    - All sources of applicable data have been identified and risk-assessed you have created a comprehensive policy framework and guidance
    - Functional departments understand their risks and taken the correct steps to mitigate
    - Have sufficient transparency in place
    - Know which third parties are holding data on your behalf
    - Learn the required ongoing governance and testing of your compliance processes
  • Embrace the Datacenter of the Future with Network Virtualization Recorded: Feb 15 2018 27 mins
    Mark Hollman, Sr. Mgr Product Marketing at Verizon
    The terms SDN (Software-Defined Network) and NFV (Network Function Virtualization) are on many agendas right now, but what does network virtualization really mean in practical terms for the data center environment?

    In this session we will discuss your move to the cloud, including how to:

    •Speed time to market: Embracing new technologies to quickly deploy new services or turn on new sites.
    •Become more agile: Leveraging application enablement to facilitate agile business processes and help customers connect to multiple clouds/CSPs.
    •Manage costs: Consolidating your rack to free up space and control costs.
    •Enhance the customer experience: Improving application performance and limiting downtime from outages.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing Recorded: Jan 17 2018 71 mins
    John Grim and David Kennedy, Verizon Enterprise Solutions
    Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.

    Each month, we will have a specific theme to help promote awareness and best practices.
  • Staying Safe Online Recorded: Dec 13 2017 34 mins
    Rebecca Meller, Manager Security Product Marketing, Verizon Enterprise Solutions
    Verizon Good Cyber Hygiene Webinar focusing on how to not fall victim to various social engineering tactics used by cyber criminals.
  • Transforming the Digital Customer Experience Recorded: Dec 7 2017 53 mins
    Danny Johnson Director of Strategic Enterprise Networks, Verizon Enterprise Solutions Product Marketing
    Digital transformation. It’s disrupting every industry and impacting how you deliver a great customer experience. Companies that ignore it risk their very survival; but those that embrace it can dramatically improve customer satisfaction and drive greater value. The truth is, keeping up with bandwidth demands and continuing innovation, while transitioning from manual processes to end-to-end digital processes, is extremely difficult on their own. Plus your customers have an expectation of your brand to be available 24x7 and deliver at any time of the day or night that they desire.

    Join our live webinar and learn:
    · Why digital transformation will only be successful if you begin with the customer in mind.
    · What digital technologies are being used by top companies to maximize customer satisfaction and drive revenues.
    · How to define the best approach to transforming the customer experience for your industry/organization.

    HOST
    Danny Johnson
    Director of Strategic Enterprise Networks, Verizon Enterprise Solutions Product Marketing

    PANEL
    Tim Stevens
    Global Lead for Vertical Marketing

    Forrest Carr
    Director of Business Innovation & Digital Experience
Delivering the connected world. Simply. Securely. Reliably.
We deliver the promise of the connected world.

In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Verizon Threat Research Advisory Center - Protected Health Information
  • Live at: Mar 21 2018 2:00 pm
  • Presented by: John Grim and David Kennedy, Verizon Enterprise Solutions
  • From:
Your email has been sent.
or close