Hi [[ session.user.profile.firstName ]]

Keep Connected Episode 3: Enabling and Securing the Remote Workplace

Welcome to ‘Keep connected: enabling and securing the remote workplace'.

The ‘Keep Connected’ series was created to help businesses achieve continuity – and even discover better ways of working – in today’s increasingly uncertain landscape. In the third instalment, our panellists will be discussing the core network and security implications behind the recent shift to home working.

As organisations of all shapes and sizes have adapted to enable fully remote workforces, new questions are being asked of the underlying network infrastructures we all depend on. Systems and processes built for an office-based world of work are now flexing and evolving to ensure critical apps and tools can be accessed seamlessly – and securely – from practically anywhere.

This webinar features Tony Judd, Verizon’s UK MD, and Stephen Keenan, Executive Director, Client Services – EMEA, Verizon Business Group. They will look in detail at what some of the UK’s biggest commercial operations have learned while tackling the new technical challenges created by the dramatic change in working patterns.

Join us as we discuss the latest best practice in terms of connectivity and business continuity – and explore what implications current events might have for the future of work itself.
Recorded Apr 23 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Judd, Verizon’s UK MD, and Stephen Keenan, Executive Director, Client Services – EMEA, Verizon Business Group.
Presentation preview: Keep Connected Episode 3: Enabling and Securing the Remote Workplace
  • Channel
  • Channel profile
  • Verizon Threat Research Advisory Center MIB: All Star Panel Dec 15 2021 3:00 pm UTC 90 mins
    Chris Novak, John Grim, Dave Kennedy
    The end of 2021 is nearly here. Tune in to our All Star Panel of cybersecurity experts for a discussion summarizing where we've been and projections for where we're headed in cybersecurity, investigative response, and threat intelligence. Takeaways:

    • The biggest security challenges of 2021
    • Lessons learned from 2021
    • The way forward for 2022

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Threat Research Advisory Center MIB: PCI Attacks Nov 17 2021 3:00 pm UTC 90 mins
    John Grim, Neal Maguire, Dave Kennedy
    The Verizon Payment Security Report (PSR), first published in 2010, is the only report of its kind. The PSR provides an in-depth perspective on the regulatory landscape of the payment card industry (PCI). Join this session and find out about:

    • PFI (PCI Forensic Investigation) findings / trends
    • 2021 Payment Security Report highlights
    • The way forward: mitigating attacks / breach readiness

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Cyber Risk Roundtable Series Ep. 4 Nov 4 2021 4:00 pm UTC 75 mins
    Dave Grady, Verizon Security Evangelist
    Verizon presents The Cyber Risk Roundtable Series Episode 4

    In partnership with CrowdStrike

    In this 4-part webinar series, Verizon and partnering security experts discuss the state of cybersecurity and the role of security as a business enabler.

    The panel will review the latest data and research from Verizon’s gold standard research reports coupled with our field experience doing 600+ breach investigations every year to educate the cybersecurity community on ways to become more resilient and innovative through digital transformations.

    Cybersecurity stakeholders will learn how to…
    Focus on the most likely attack vectors for their industry and the resources available to build an agile, intelligence-driven security program.
    Ensure security has a seat at the table during product innovation and technology evaluations
    Build a collaborative relationship between security, network and IT teams, both tactically and strategically
    Leverage data to enable maximum return on program investments
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Recover Oct 20 2021 2:00 pm UTC 90 mins
    Stefan Englbrecht, Dave Kennedy
    NIST CSF Recover – Oops they did it again: Preparation and Lessons Learned

    NIST CSF Recover is about developing and implementing appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. Stefan Englbrecht, VTRAC Team, will cover how to use NIST CSF Recover to:

    • Develop a post-incident action plan
    • Learn from previous Incidents by conducting lessons-learned discussion and completing a postmortem review of any IR actions
    • Ensure continual maturation of an organization’s IR lifecycle

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Cybersecurity Innovation Showcase Ep. IV: What’s Lurking in Your Supply-Chain? Sep 16 2021 8:00 pm UTC 53 mins
    John Grim, Tony St. Clair
    Cybersecurity Innovation Showcase Series: In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond.

    In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain.

    This webinar will explore:
    Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures
    Elements of a robust Supply-Chain Risk Management and effective Incident Response program
    Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
  • Cybersecurity Showcase Ep. III: Verizon's Threat and Vulnerability Portfolio Sep 16 2021 6:00 pm UTC 60 mins
    Kevin Horvath, Verizon
    The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed.

    Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used.

    This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services:
    • Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs.
    • Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams.
    • Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.
  • Showcase Ep. II: From Intrusion Detection to Full-Fidelity Forensics Sep 16 2021 4:00 pm UTC 60 mins
    Dave Grady, Verizon Security Evangelist
    Verizon Cybersecurity Showcase Episode II: From Intrusion Detection to Full-Fidelity Forensics: Gain the level of visibility you need with Network Detection and Response

    Learn how to use Network Detection and Response to maintain intrusion detection system (IDS) compliance as well as to uncover known and unknown threats lurking within the traffic flowing in your environment. Verizon cybersecurity experts will lead a demonstration to illustrate the three main use cases for Network Detection and Response and help you understand which approach may provide the right level of visibility and protection for your organization’s needs.
  • Showcase Ep. I SASE: Key Considerations for Securing Today's Networks Sep 16 2021 2:00 pm UTC 60 mins
    Dave Grady, Verizon Security Evangelist
    In this 4-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    New and emerging technologies are driving digital transformation across all industries, moving companies closer to becoming real-time enterprises capable of operating in ways once unimaginable. From Cloud and 5G to applications, next-generation technologies are enabling companies to run faster, smarter and better than ever before.

    This webinar explores some of the key cybersecurity implications of new and emerging technologies, with the goal of educating security program influencers about an emerging framework for meeting this challenge – SASE, a Secure Access Service Edge.

    Verizon believes SASE is merging the Network and Security together, in the cloud – without the added complexity. It’s the evolution of delivering networking and security from the cloud to protect users, applications and data. It is an extension of NaaS – including security without sacrificing performance.

    In this webcast from Verizon, you’ll hear from the front lines of SASE some best practices, strategies, and crucial considerations for securing today’s modern, rapidly evolving networks.

    During this webinar, you’ll learn:
    • The networking solutions, applications, and devices that are key components in SASE
    • SASE core capabilities
    • How a SASE strategy fits into an overall security strategy
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Respond Sep 15 2021 2:00 pm UTC 90 mins
    Clarence Hill, Dave Kennedy
    NIST CSF Respond – Investigative Response

    In the grand scheme of cybersecurity incidents, data breaches tend to be the most severe and the most important to prepare for. Join this session for an update on the the cyberthreat landscape and takeaway:

    • Cyber threat actors and actions
    • Challenges with the cyber threat landscape
    • Tool solutions and approaches as a way forward

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Verizon Presents: Welcome to the New Workplace, Webinar #5 Aug 18 2021 6:00 pm UTC 60 mins
    Neil Saunders, Managing Director, GlobalData & Ron Insana, Contributor to CNBC and MSNBC
    Verizon Presents: Welcome to the New Workplace: Let's Get Real About Retail

    There may be no industry that's evolved more over the past year than retail. Join our webinar to learn where the industry continues to head, and how new solutions can help make sure you're delivering the experiences customers value and expect. During the webinar, you will hear what it takes to meet the demand of the new normal - and what lies ahead - exploring topics such as:

    • Omnichannel ecosystems
    • Customer retention practices
    • Direct-to-customer (OTC) channels
    • Supply chain transformation

    Meet your speaker & host:

    Neil Saunders, Managing Director, GlobalData
    In addition to overseeing proposition development and research output, Neil also works to help clients understand the retail, shopper and market landscape, and advises them on how to develop, evolve and implement business strategies.

    Ron Insana, Contributor to CNBC and MSNBC
    Ron has spent nearly three decades as a highly respected business journalist and money manager. He's written for Money magazine and USA Today, and hosted two nationally syndicated radio programs.
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Detect Aug 18 2021 2:00 pm UTC 90 mins
    John Grim, Dave Kennedy
    NIST CSF Detect – Threat Hunting

    The best defense is a strong offense. Threat hunting has become a necessary part of proactive cybersecurity. Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) technologies play an important role in a swift and effective threat detection and response capability. Join this session and find out about:

    • Cyber threat landscape overview
    • Threat hunting toolkit components
    • Threat hunting approach and considerations
    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Address Growing Cybersecurity Demands Recorded: Aug 4 2021 42 mins
    Dave Grady, Chief Security Evangelist at Verizon
    As our Digital Transformation Solution Series comes to a close, join Dave Grady, Chief Security Evangelist at Verizon, to learn more about the cybersecurity landscape, trends in breach behavior and how they affect your assets.

    Integrating the right end-to-end security program is a complex proposition. We help make it easier by working with you to identify your vulnerabilities, and to design a cybersecurity strategy that addresses them. Our cybersecurity expertise can support security program integration across your enterprise—from your network’s core to devices at the edge.
  • 5G privée, Edge Computing : accélérer la transformation de votre entreprise ! Recorded: Aug 4 2021 55 mins
    Lourdes Hernandez , Business Development Partner VBG - Edwin Determann, Sr Manager Solutions Architects VBG
    En réaction à la crise sanitaire et à ses conséquences notamment sur le plan économique, les entreprises doivent accélérer leur transformation. Comment ? En misant sur le potentiel de nouvelles technologies comme le Multi-access Edge Computing (MEC) et la 5G.
    • Quel est le réel potentiel transformatif de la 5G privée et du Edge Computing pour les entreprises ?
    • Quel en sera l’impact sur les collaborateurs ou la satisfaction des clients ?
    • Comment votre entreprise doit-elle préparer au mieux cette transformation digitale et quels sont les facteurs clés du succès ?
    • Quelle est la maturité des entreprises face à ces nouvelles perspectives ?
    Existe-t-il des secteurs d’activité en avance par rapport aux autres ?
    • Wifi contre 5G : quelle solution choisir ? Qu’en est-il de la sécurité ?
    Autant de questions auxquelles nous tenterons de répondre lors de ce webinaire.
  • Address Growing Cybersecurity Demands Recorded: Aug 3 2021 42 mins
    Dave Grady, Chief Security Evangelist at Verizon
    As our Digital Transformation Solution Series comes to a close, join Dave Grady, Chief Security Evangelist at Verizon, to learn more about the cybersecurity landscape, trends in breach behavior and how they affect your assets.

    Integrating the right end-to-end security program is a complex proposition. We help make it easier by working with you to identify your vulnerabilities, and to design a cybersecurity strategy that addresses them. Our cybersecurity expertise can support security program integration across your enterprise—from your network’s core to devices at the edge.
  • Demystifying Fixed Wireless Access Part 2 Recorded: Jul 30 2021 28 mins
    Keith Wellman, David Roten, Bruce Lancaster and Chad Foos
    Demystifying Fixed Wireless Access, Part 2: Moving Beyond Traditional Cable Internet

    Unreliable or overly complex networks can result in lower productivity, lost opportunities, poor customer experiences and unnecessary expenses. Fixed wireless access could be the solution your business needs.

    During our recent webinar with experts from three technology companies, we discussed how fixed wireless access can help replace aging connections and untangle complex configurations while working as a viable alternative to traditional broadband.
  • Verizon Cyber Risk Roundtable Series Ep. 3: Strengthening Security in the Cloud Recorded: Jul 29 2021 19 mins
    Dave Grady, Verizon Security Evangelist
    In the next installment of our four-part webinar series examining the state of cyber security, we’ll look at the impact of the cloud on cybersecurity. With businesses moving applications and infrastructure to the cloud, and with end-users increasingly connecting by mobile devices, it’s time to move to a new, cloud-native zero-trust approach to networking and security. During the roundtable, experts from Verizon and Zscaler will discuss:

    ● Accelerating digital transformation by enabling secure cloud connectivity
    ● Embracing a new architectural approach to networking and security
    ● Increasing user productivity and reducing costs while simplifying IT
    ● Examining the latest data from the 2021 Data Breach Investigations Report
  • Cybersecurity Innovation Showcase Ep. III SASE: How to secure today’s networks Recorded: Jul 28 2021 35 mins
    Dave Grady, Beth Cohen & Yin Johnson
    Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    New and emerging technologies are driving digital transformation across all industries, moving companies closer to becoming real-time enterprises capable of operating in ways once unimaginable. From Cloud and 5G to applications, next-generation technologies are enabling companies to run faster, smarter and better than ever before.
     
    This webinar explores some of the key cybersecurity implications of new and emerging technologies, with the goal of educating security program influencers about an emerging framework for meeting this challenge – SASE, a Secure Access Service Edge.
     
    There are varying degrees of SASE definitions, including various components that can be based on customer need and requirements. Even Gartner, the analyst firm who coined the term, has a very fluid definition of the evolving solution.
     
    Verizon believes SASE is merging the Network and Security together, in the cloud – without the added complexity. It’s the evolution of delivering networking and security from the cloud to protect users, applications and data. It is an extension of NaaS – including security without sacrificing performance.
     
    In this webcast from Verizon, you’ll hear from the front lines of SASE some best practices, strategies, and crucial considerations for securing today’s modern, rapidly evolving networks.
     
    During this webinar, you’ll learn:
    The networking solutions, applications, and devices that are key components in SASE
    SASE core capabilities
    How a SASE strategy fits into an overall security strategy
  • Verizon Threat Research Advisory Center MIB: NIST CSF - Protect Recorded: Jul 21 2021 72 mins
    Dave Kennedy
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    The process of executing a cybercriminal campaign has been simplified, automated, and democratized by the proliferation of very specialized services catering to every aspect of the underground economy.

    Join us to learn more about automation tactics such as:

    • Banking injects
    • Exploit kits
    • Spam and phishing services
    • Automated marketplaces
    • And more!


    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities
  • Cybersecurity Innovation Showcase Ep. II: What’s Lurking in Your Supply-Chain? Recorded: Jul 21 2021 53 mins
    John Grim, Tony St. Clair
    Cybersecurity Innovation Showcase Series: In this 3-part webinar series, Verizon will present the most innovative security solutions designed to align with your organization’s digital transformation.

    Threat actors targeting your supply-chain, however small, have the potential for outsized impact to your organization. And to make matters worse, many cybersecurity practitioners have limited visibility around who or what resides within their supply-chain, and at every point along the supply-chain from development to disposal. Organizations with inadequate Supply-Chain Risk Management practices create various opportunities for malicious actors to exploit the “fog of war” in cyber defense by clouding visibility and limiting cyber defender abilities to prevent, mitigate, detect, and respond.

    In this webinar, Verizon Threat Research Advisory Center (VTRAC) security practitioners will share their perspectives on supply-chain risks and provide recommendations on how organizations can reduce exposure in their supply-chain.

    This webinar will explore:
    Common shortcomings of Supply-Chain Risk Management practices, controls and countermeasures
    Elements of a robust Supply-Chain Risk Management and effective Incident Response program
    Verizon solutions to reduce the supply-chain risk and detection and response when the need arises
Delivering the connected world. Simply. Securely. Reliably.
We deliver the promise of the connected world.

In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity.

Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Keep Connected Episode 3: Enabling and Securing the Remote Workplace
  • Live at: Apr 23 2020 9:00 am
  • Presented by: Tony Judd, Verizon’s UK MD, and Stephen Keenan, Executive Director, Client Services – EMEA, Verizon Business Group.
  • From:
Your email has been sent.
or close