Hi [[ session.user.profile.firstName ]]

Verizon Security Summit Series Session 8: DBIR and VIPR Report Insights

Securing the Real-Time Enterprise— Insights from the DBIR and the VIPR Report

The real-time enterprise is fast and efficient. Data breach response must be as well. The DBIR tells us that time-to-compromise and time-to-exfiltration happens in minutes; while time-to-discovery takes months and time-to-containment takes days or longer. What can be done to accelerate detection and containment (and prevent or slow down threat actor activity)? Enter the VIPR Report, its Incident Response Plan review and breach simulation findings, and its key takeaways for a more effective response. We've examined three years of our IR Plan readiness assessments as well as our data breach simulation exercise observations, findings, and recommendations.

This webinar will:

Shed light on DBIR data breach and cybersecurity incident trends

Highlight incident readiness and response findings from the VIPR Report

Provide key takeaways to effective incident response capabilities
Recorded Apr 24 2020 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Grim, Verizon VTRAC
Presentation preview: Verizon Security Summit Series Session 8: DBIR and VIPR Report Insights
  • Channel
  • Channel profile
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Dec 16 2020 3:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    Topic: All Star Panel Year-End Review

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to review 2020 cybersecurity events and the current cybersecurity threat landscape.

    Eric K. Gentry of the Verizon Threat Research Advisory Center will cover:
    •The biggest challenges of 2020 investigations and threat intelligence
    •Lessons learned from 2020
    •Top 3 things to do when preparing for 2021

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Nov 18 2020 3:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    Topic: Dark, Deep, Surface Web Hunting

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the dark, deep, surface web hunting and the current cybersecurity threat landscape.

    Farzad Seihoun with the Verizon Threat Research Advisory Center will cover:
    •Defining the space and accessing it
    •Overview of what the dark web hunting team is seeing and reporting
    •Dark web hunting as a service solutions

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Oct 21 2020 2:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    This Month: 2020 Payment Security Report

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss PCI attacks and the current cybersecurity threat landscape.

    John Grim with the Verizon Threat Research Advisory Center will cover:
    •2020 Payment Security Report highlights
    •PCI Forensic Investigation findings and trends
    •Breach readiness tips

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Sep 16 2020 2:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This webinar will cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Next Generation Technologies and Cybersecurity - Verizon Identity Aug 19 2020 6:00 pm UTC 75 mins
    Jim Stanley- Business development ,Transaction processing and Mark Schermann- Head,Partnership and Alliances
    Blockchain technology is transforming the way we do business with the promise of decentralized ledgers for consumers. Blockchain brings cost savings, removes the intermediaries and boosts efficiency. Although some of the blockchains underlying capabilities provide data confidentiality and integrity, cybersecurity controls and standards need to be adopted for organizations using blockchain to protect and manage identity and access data.
     
    Business leaders, CIO, CISO and enterprise architects should join this panel discussion to understand Blockchain-enabled decentralized identities and learn how Conduent’s blockchain platform layered with the Verizon Identity Solution offers trust and privacy-centric identity and access management for decentralized applications. We will show how public and enterprise users can build a secure and tamper-proof digital identity compromised by their biometrics and personal documents.


    In this webinar you will learn:
    - How Verizon ID and the Conduent Blockchain Application Services Platform (CBASP) provide users with a secure mechanism for accessing CBASP applications from a mobile phone
    - How to provide users with an ability to share and upload documents securely while maintaining their digital identity using a decentralized file system
    - How to strengthen and future proof identity traceability and authorization using Elliptic Curve Digital Signature Algorithm (ECDSA) for signing digital transactions
    - Review important use cases and joint value proposition for various industry segments
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Aug 19 2020 2:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    Topic: Cyber Espionage Report

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss cyber espionage attacks and the current cybersecurity threat landscape.

    John Grim of the Verizon Threat Research Advisory Center will cover:
    •Cyber Espionage Report highlights
    •PCI Forensic Investigation findings and trends
    •Breach readiness tips and tools

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • In Cybersecurity, Integrity Matters. We're Talking Machines, Not Just People Aug 5 2020 6:00 pm UTC 75 mins
    Dave Grady, Verizon Chief Security Evangelist
    Although many of us don’t think about integrity in the context of cybersecurity, it is a critical component of any security program, especially in highly regulated environments.

    Having confidence in the integrity of the machines connected to your network —that is, knowing if a configuration change occurred in error or with malicious intent—is an absolute necessity in the digital world. From applications running on cloud-based virtual machines to IoT endpoints monitoring critical services, data integrity (or the lack thereof) can make or break an organization overnight.

    And having real-time, round-the-cloud visibility into whether the machines on your network are actually configured the way you think they are is another absolute necessity. Changes made in error to settings in any number of systems can have the same detrimental impact as intentional changes made by a bad actor, including compliance issues, data theft and compromised operations.

    In this webinar you will learn:
    - How the new telemetry point of machine state helps shorten the time between compromise, detection and response
    - The importance of establishing baselines for normal behavior from servers where sensitive data resides, and for endpoints monitoring essential operations
    - The benefits of having real-time, non-repudiated evidence of tampering in the state of machines running in cloud, IoT and 5G/MEC environments
  • How to Develop a Data-Driven, Risk-Based Cybersecurity Program Aug 5 2020 2:00 pm UTC 75 mins
    Dave Grady, Verizon Chief Security Evangelist
    Being able to tell a meaningful, actionable, data-driven story about your company’s cybersecurity posture is one of the most important skills a CISO can develop. But this webinar isn’t exactly about that. Instead, this webinar aims to help security-program stakeholders and influencers – Board members, C-suite executives and senior business-line managers – become more discerning and demanding consumers of security data, so they can more effectively contribute to their organization’s response to cyber-risk.

    As more companies adopt a “risk-based approach” to cybersecurity, it’s critical that stakeholders ask for, and get, the data they need for strategic decision-making.

    You’ll learn about:
    - Types of data available for analysis
    - How to trust the data and not your feelings
    - The importance of creating a framework for establishing and monitoring its security risk posture
  • Real Time Situational Awareness for Timely Decisions and Fast Responses Jul 28 2020 6:00 pm UTC 60 mins
    Nick Nilan, Jesse James, Bob Carter, Matthew Melton, Chief Daniel Oates
    Nothing slows down and hinders public safety efforts like inaccurate or incomplete information. Data sources, siloed in disparate solutions and departments, often contribute to the problem.

    As a Verizon hosted and managed solution in the AWS GovCloud, Real Time Response System gives you a holistic real-time view of data sources and easy access to tools you need to respond to incidents. It’s interoperability with other third party public safety offerings promotes inter-agency collaboration, enhances situational awareness and helps improve decision making by helping identify threats through the integration of multiple technologies--not only when there’s a crisis, but also during daily operations.

    The Criminal Justice Information Services (CJIS) ready solution integrates large amounts of data from multiple sources, such as computer-aided dispatch, video sensors, record management systems, and third-party databases. It compiles data and provides city agencies with a consolidated, accurate and real-time view of the city.

    Learn how Real Time Response System has improved operational efficiency and real-time awareness for public safety organizations. Experience a live demonstration on how your agency can take advantage of Real Time Response System, and how the Verizon, Genetec, AWS partnership provides the best managed solution for Public Safety.
  • Zero Trust Architecture with Private IP & Software Defined Perimeter Jul 15 2020 6:00 pm UTC 75 mins
    Junaid Islam, Director of Security Technology
    Man-in-the-middle attacks expose personal information, leaving organizations vulnerable to significant revenue loss and users open to theft and a sense of betrayal by the brands they trust.

    Man-in-the-middle attacks can catch users unaware because they happen behind the scenes. Adversaries have multiple methods at their fingertips to intercept traffic, decrypt data and steal personal information from their victims.

    Verizon offers frontline defense solutions. Verizon supports a zero-trust approach to networking for remote access, internal network segmentation and cloud applications to help organizations defeat network-based attacks and gain more peace of mind with the right safeguards in place.

    Join this webinar to learn:
    - Techniques for intercepting man-in-the-middle attacks before servers are compromised
    - How Software defined perimeter (SDP) helps defeat network-based attacks
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB) Jul 15 2020 2:00 pm UTC 90 mins
    Dave Kennedy, Managing Principal, Open Source Intelligence
    Topic: Traveling Abroad

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss traveling abroad safety tips and the current cybersecurity threat landscape.

    Clarence Hill with the Verizon Threat Research Advisory Center will cover:
    •Cyber risks to traveling
    •Threat actor modus operandi
    •Ways to mitigate the travel threat

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Rebuilding an Industry Resilient Against Disruption Jul 9 2020 6:00 pm UTC 60 mins
    George Blankenship: Former Executive, Tesla Motors, Apple Computer and GAP Inc. & Ron Insana: Senior Analyst CNBC
    Return to Business as Unusual: A Webinar Series

    Supply chain management and end-to-end visibility have accelerated the need for broad industry transformation, including the implementation of telematics, IoT and other technologies to enable flexibility and scale to respond to a new normal.

    We will discuss the following in this Webinar:
    - Raw materials, inventory management and distribution challenges.
    - Visibility beyond tier 1 providers deep into the supplier’s supply chain is imperative to mitigate disruption.
    - Protecting revenues with flexible product and market strategies requires partnerships across the ecosystem.
    - What’s different now and how that might be leveraged into a competitive advantage going forward.
    - Understand if today is difficult for your company, it's probably difficult for others as well. Those who see today as an inflection point and focus on what could be possible when things get back to new normal are the companies who will come out of this situation as the winners of tomorrow.
    - Focus on what’s coming. What is on the horizon that could be incorporated into something that customers will need, or want, to use.
    - Focus on the customer, not what they say they want, but what they could be given that they might not even know to ask for. This leads to differentiation, competitive advantage and brand loyalty.
    - Focus on what happens after the sale… letting customers know they are important, they will be taken care of and you are available to help them generates ambassadors who bring other customers.
  • CX today: the leaders and the laggards. Jul 9 2020 4:15 am UTC 45 mins
    Steve Nuttall – Fifth Quadrant; Mathew Wells – Verizon Business Group; Amelia Diggle – Verizon Connect
    In 2020, Verizon sponsored a report by Fifth Quadrant, a leading research organization with deep knowledge of the customer experience (CX) industry.

    The research surveyed CX experts in the Australian market and revealed a wide divergence in maturity – between those setting the pace in our increasingly multichannel world, and those still at the very start of their CX improvement journey.

    Join leaders from Fifth Quadrant and Verizon as we discuss the key issues in CX and contact centers today, including:
    •The ‘CX flywheel’ and how to harness it
    •How AI is already transforming CX for many organizations
    •The impact of Covid-19 and remote working on CX

    Moderator:
    Steve Nuttall – Director, Fifth Quadrant
    Panelist:
    Mathew Wells – Solutions Executive, Verizon Business Group
    Amelia Diggle – Service Designer, Verizon Connect
  • Cyber security and the remote workforce Jul 9 2020 3:30 am UTC 45 mins
    Chris Omant, John Sandiford, Prescott Pym, Ashish Thapar
    Ensuring secure and strong mobile connectivity is one of the most fundamental challenges of remote working.

    Not every household has access to next-gen, high-speed broadband. Even those that do are often still using networks that are unsecured. This exposes many of today’s remote workers – and therefore their employers – to potential cyberattack.

    In this session, we look at how organizations can apply Zero Trust principles to their protect, detect and respond capabilities in order to deliver secure communications and data privacy for a remote workforce.

    Our panel will discuss different solutions for providing efficient and sustainable security in the redefined world of work, including:
    •Secure Access Service Edge (SASE) to alleviate load on traditional VPN
    •Behavioral analytics
    •End-point security
    •Mobile device management


    Moderator:
    Chris Omant, APAC Security Services Product Manager, Verizon Business Group
    Panelist:
    Ashish Thapar, Managing Principal, VTRAC, Verizon Business Group
    John Sandiford, Principal Security Architect, Verizon Business Group
    Prescott Pym, APAC Security Operations Director, Verizon Business Group
  • Digital Strategies For The New Normal Jul 9 2020 2:45 am UTC 45 mins
    Nilesh Pritam, Duncan Kenwright, Robert Le Busque & Willis Kwok
    The ability of organizations to shift from offices to remote working is a testament to the transformative power of today’s networks.

    In this session, experts from Verizon discuss what else to expect from networks in the years to come – especially as scalable virtualized connectivity and cloud-ready applications deliver new levels of flexibility and speed.

    Join us as we discuss questions that include:
    •What are the key challenges facing technology leaders in this period of accelerated change?
    •What pillars already exist that can help organizations quickly adopt new operating models?
    •How do software defined networking (SDN) and virtualized network services enable greater automation?
    •How will multi-access edge computing (MEC) and wireless tech like 5G transform the way organizations work?

    Moderator:
    Nilesh Pritam, Corporate Communications, Asia Pacific, Verizon Business
    Panelist:
    Duncan Kenwright, Managing Director, Solution Architect, Asia Pacific, Verizon Business
    Rob Le Busque, Regional Vice President, Asia Pacific, Verizon Business
    Willis Kwok, Product Manager, Asia Pacific, Verizon Business
  • Business as Usual. Redefined. Jul 9 2020 2:00 am UTC 45 mins
    Sampath Sowmyanarayan, Group President, Verizon, Rob Le Busque, Regional Vice President Asia Pacific, Verizon
    After Covid-19, remote working is no longer a benefit or a luxury. It is becoming the norm.

    Remote working has been a growing issue for businesses for many years. But nobody could have predicted how quickly and comprehensively the world would switch to a remote working model in response to Covid-19.

    This keynote session features Sampath Sowmyanarayan, Verizon Business Group’s President of Global Enterprise, and Rob Le Busque, Verizon Business Group’s Regional Vice President Asia Pacific.

    Together they discuss some of the findings of the recent report Sampath co-authored with Val Elbert of the Boston Consulting Group. The fireside chat will cover some of the key questions facing business leaders today:
    –How can organizations drive competitive advantage through smart and secure remote working?
    –How will technology shape enterprises and government departments post covid-19?
    –What key challenges need to be solved by CIOs and CISOs?
    –Who will be the winners and why?

    Speakers:
    Sampath Sowmyanarayan, SVP & President Enterprise, Verizon Business Group
    Rob Le Busque, Regional Vice President, Asia Pacific, Verizon Business Group
  • How to securely deliver the adaptive enterprise Recorded: Jul 2 2020 47 mins
    Alistair Neil | Ashish Khanna
    As organisations start to navigate their way out of the pandemic, business leaders are re-calibrating their strategies and plans to enable prosperity in the new world. It has become clear that technology has an even larger role to play, and a digital foundation that you can operate from will help ensure you remain open for business. Behind the scenes, IT and Security teams need to review architecture stacks and assess if their current platforms - whether implemented pre- or during Covid - stack up as employees return to work, in many cases, to a different environment than prior. In this webinar, you will learn about the fundamental components of cloud based, identity-centric networks and the technologies and policies that should be put in place to secure them.

    Presented by:

    Alistair Neil – Director, International Security Solutions, Verizon Business
    Ashish Khanna - Director, Cyber Defense Professional Services, Verizon Business
  • A Next Gen Technology that will Define Cybersecurity in Next Decade Recorded: Jul 1 2020 31 mins
    Dave Grady, Verizon Chief Security Evangelist & Bruce Biesecker, Director of Network and Information Security
    This next decade will see the world become exponentially digital as legacy processes and hardware are replaced with smart systems and devices. This digital transformation will help companies create new products, business models, and even industries, while making existing enterprises run smarter and than before. However, it will also significantly increase the cyberattack surface of organizations as each connection creates a new access point to a company’s data.
     
    Over the next decade, cybersecurity should become your key strategic focus of digital transformation if you hope to help ward off financially-motivated cyberfraud and the havoc caused by trolls and mischief-makers. There are a number of next-generation technologies that you’ll be able to incorporate over the coming years to help give your organization the advantage it needs to defend against ever-growing threats. This webinar will focus on one of the most promising tools in the future of cybersecurity.

    Join this webinar to learn:
    - The benefits of using S.O.A.R. (Security, Orchestration, Automation, and Response)
    - The importance of implementing security operations automation
    - How to connect security tools and integrate disparate security systems
  • Driving Cybersecurity Performance. Improve Results with Evidence-Based Analysis Recorded: Jul 1 2020 54 mins
    Dave Grady, Verizon Chief Security Evangelist & Lou Celi, Program Director, ESI ThoughtLab
    New report finds cybersecurity investment generates substantial ROI as large firms fend off rising cyberattacks.

    ESI ThoughtLab, along with Verizon and a group of cybersecurity advisors release findings from study of 1,009 of the world’s largest firms. A comprehensive study conducted by ESI ThoughtLab reveals that increased investment in cybersecurity can generate a significant ROI of 179% and provide greater protection as companies cope with the fallout from COVID-19.

    The study benchmarked the cybersecurity investments, practices, and performance metrics of 1,009 firms across 13 industries and 19 countries to identify the most effective approaches for mitigating cybersecurity risks and losses. This ground-breaking research was conducted in conjunction with an advisory group of cybersecurity, cyber insurance, and technology specialists, including Verizon Business, AIG, KnowBe4, Optiv, Fiserv, Cowbell Cyber, Arceo.ai, and Edelman.
  • Verizon Security Summit Series Session 2: Security in a 5G World Recorded: Jun 30 2020 59 mins
    Alex Schlager, Verizon, Executive Director Product
    Verizon Security Summit Series Session 2: Security in a 5G World

    This webinar will:
    - Discuss the promise of 5G and explain how network evolution - from 2G to 3G to 4G and LTE - has provided Verizon with invaluable insights into network security
    - Review the security implications of 5G and 5G-enabled applications
    - Demonstrate how Verizon is working to ensure that the future will be more secure.
Delivering the connected world. Simply. Securely. Reliably.
We deliver the promise of the connected world.

In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Verizon Security Summit Series Session 8: DBIR and VIPR Report Insights
  • Live at: Apr 24 2020 8:00 pm
  • Presented by: John Grim, Verizon VTRAC
  • From:
Your email has been sent.
or close