Part 4: Breach Detection and Notification for the GDPR
The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:
• What the General Data Protection Regulation is
• What the GDPR breach notification requirements are
• How Imperva CounterBreach can help detect potential data breaches
RecordedJan 11 201839 mins
Your place is confirmed, we'll send you email reminders
Ziv Grinberg, Product Management and Sachi Sawamura, Product Marketing
Join us for a short discussion and demo, as we provide an overview of how our CounterBreach behavioral analytics uses machine learning and context rich algorithms to identify the proverbial needle in the alert haystack.
Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer
What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks and agile application development. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment to provide state of the art protections against application attacks.
Cheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva
The GDPR, which comes into effect on May 25, 2018, requires organizations report a data breach within 72 hours. In this webinar, we’ll provide an overview of:
• What the General Data Protection Regulation is
• What the GDPR breach notification requirements are
• How Imperva CounterBreach can help detect potential data breaches
Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager
One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
Cheryl Tang, Director of Product Marketing, Imperva and Steve Pomroy, Chief Technologist, Camouflage
This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.
We’ll provide an overview of:
- What the General Data Protection Regulation (GDPR) is
- What is pseudonymization and the benefits of pseudonymizing data
- How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities
Cheryl Tang - Product Marketing, Imperva .; Mark Pelkoski - Principal SE, Imperva
This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.
In this webinar we’ll provide:
- An overview of General Data Protection Regulation (GDPR)
- Who does it impact?
- What are the data protection principles
- What are the primary data security requirements
- An insight into Imperva’s data protection portfolio and a demo of its discover and classification capabilities
Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert
APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
Imperva CTO Terry Ray talks about machine learning and how a deep understanding of databases – user types, data types and database types – allows Imperva to go beyond traditional policy settings to accurately identify unpredictable data access and prevent breaches.
Drew Schuil, Vice President of Global Product Strategy
In today’s global information economy an ever-increasing amount of sensitive data is collected, used, exchanged, analyzed, and retained. And with that comes an ever-increasing number of accidental or intentional data breaches. Identifying inappropriate access to data is paramount in stopping a breach.
Watch the video about different approaches to User behavior analytics (UBA), the challenges of using traditional UBA solutions to detect and protect against inappropriate access to sensitive data, and a recommended best practice architecture we’ve seen work with customers around the world.
Drew Schuil, Vice President of Global Product Strategy at Imperva
Insider threat detection and containment of insider threats requires an expert understanding of both users and how they use and access enterprise data.
This video demonstrates the challenges of insider threat detection and approaches to protect sensitive data and large repositories of data from careless, compromised, and malicious users.
Drew Schuil, Vice President of Global Product Strategy
Multiple permissions and users, distributed environments, high volume, velocity and variety – leave big data wide-open for breaches. Find out the unique requirements of big data security and what you can do to protect it from threats. View the video to:
•Learn about the Big Data trends
•Get insight on the top 3 security challenges to Big Data
•Find out what requirements to use when evaluating security solutions
Steve Pomroy, Chief Technologist; Sara Pan, Sr. Product Marketing Manager
Working with sensitive data complicates security for testing, QA, and app development, not to mention introducing compliance concerns with a host of regulations. In this webinar, we address how to use data masking to help secure data in your test & dev environments, whether on-prem, in the cloud, or outsourced.
The new EU General Data Protection Regulation (GDPR) will go into effect in May. In this webinar, Randy Lee (VP of WW Professional Services) provides insight into how to jumpstart your data security compliance efforts for GDPR with data discovery and project planning.
In this webinar we’ll provide:
* A brief overview of the GDPR
* Key data security requirements
* How to use data discovery and planning services to jumpstart your compliance efforts
Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
Morgan Gerhart - VP Product Marketing; Jim Hanson - Sr. Sales Engineer
Our security experts walk through dynamic peer group analysis in CounterBreach 2.0. Tune in to see how to use machine learning to define dynamic peer groups, detect suspicious file access behavior, and dynamically manage access permissions.
Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This change in IT paradigm creates a need for CISO’s and their security teams to have solutions that protect applications wherever they reside as they move between on-premises and the cloud. Imperva offers a flexible, hybrid model to deliver DDoS and application protection augmented by crowd-sourced and curated threat intelligence. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.
Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:
-Alert exception for false positive reduction
-Profile maintenance for accuracy and efficiency (UBA)
-Plugins for Dynamic Applications and Profile Tuning
Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer
Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
Cheryl O'Neil - Dir. Prod. Mktg.; Kedar Dhuru - Sr. Prod. Mgr.; Ido Tzang - System Architect
Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.
Part 4: Breach Detection and Notification for the GDPRCheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Part 4: Breach Detection and Notification for the GDPRCheryl Tang, Director Data Security Products, Imperva and Brian McAuliffe, Sales Engineer, Imperva[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins