Hi [[ session.user.profile.firstName ]]

FBI Warning: Cyber Attacks on ATMs - Are you prepared?

A recent warning issued to banks by the FBI reads like the script for a Hollywood movie: cybercriminals are plotting a sophisticated, global “ATM cash-out” using cloned credit cards to fraudulently withdraw millions of dollars in just a few hours. A few days later, reports of a $13.5 million heist of 25 ATMs across the globe confirmed the reality that ATMs are a prime target for hackers.

Are you prepared for when an ATM breach occurs, or more importantly, when a hacker gains access to your network and confidential customer information through your ATM networks?

Join Unisys and Celent for this very critical, time sensitive topic that will help you understand this increasing threat and how to respond.

In this webinar we will cover:

•How global trends, such as open banking, will increase these threats
•How ATM security fits in your end to end security and risk posture
•We will be discussing Unisys Stealth®, which is a flexible software suite that leverages microsegmentation to secure critical assets
•And so much more!
Recorded Nov 7 2018 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys
Presentation preview: FBI Warning: Cyber Attacks on ATMs - Are you prepared?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protect your critical assets from Ransomware Recorded: Jul 24 2020 4 mins
    Unisys & Dell Technologies
    Ransomware is a fact of life. It’s getting worse and that’s not good for your business. Once the bad guys are in, what do you do? At this point it’s not about stopping attacks -- it’s about recovery……and getting your critical operations up and running as fast as possible… with data that is clean from ransomware. Watch this video from Unisys and Dell Technologies we have the solution - Unisys Stealth® and Dell EMC PowerProtect Cyber Recovery
  • Cloud Security for a New World of Work Recorded: Jul 21 2020 43 mins
    Sudhir Mehta Global VP Product Management Strategy, Unisys & Mark McIntyre, Chief Security Advisor (Federal), Microsoft
    Cloud Security is top of mind for many organizations in our current world situation. This joint webinar with Unisys and Microsoft is a discussion on “Cloud Security for a New World of Work.”
  • A Recipe for Success: Taking Charge of Your Cloud Security Compliance Recorded: Jun 24 2020 43 mins
    Anupriya Ramraj, VP Global Cloud Services, Unisys; JP Cavanna, Industry Dir. & Lead Cybersecurity Strategist (EMEA), Unisys
    Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best practices.

    With many cloud customers lacking the essential tools, knowledge and processes to implement compliance, this webinar will reflect on key industry challenges and set out clear goals that will enable you to start building an effective Cloud Security Posture Management (CSPM) program. We will cover the following steps as a 'recipe for success':

    •Understand the reasons behind unsecure cloud deployments from blind spots to multi-cloud use,
    •Review security compliance throughout cloud lifecycles and learn how to build a Cloud Security Posture Management (CSPM) program,
    •Identify security posture goals across all phases of cloud adoption, including new cloud designs, migrations and operations.
    •Embrace a Zero Trust strategy for cloud with adaptive security that protects your critical assets.

    No security management system can fully guarantee 100% cloud security; however, security compliance using Cloud Security Posture Management (CSPM) can dramatically reduce the risks associated with cloud misconfiguration, ensure better adherence to cloud security best practices, and alert security professionals of potential vulnerabilities.
  • Business Resilience: Defining a New Approach to Security Recorded: May 27 2020 46 mins
    JP Cavanna, Industry Director & Lead Cyber Security Strategist and Evangelist (UK/EMEA), Unisys
    Traditional perimeter defenses are dead and organizations are under greater pressure to embrace new approaches to cyber security that reduce costs, increase ROI and provide business resilience in light of the current climate with Covid-19.

    With 2020 being a year for safe bets only, this webinar will reflect on clear trends within the modern security landscape and enable you to define a new approach for security. This will focus on achieving business resilience with:

    •Zero-trust environments through software-defined perimeters that empower network visibility and control
    •Reduced Attack Surfaces (with micro-segmentation, cloaking and e2ee)
    •Real-time response to threats
    •Remote worker capabilities that are secured at scale.
  • Cyber Recovery in the Age of Ransomware Recorded: Apr 14 2020 39 mins
    Andrew Peters, Stealth Industry Director, Unisys; George Pradel, Senior Systems Engineer, Dell Technologies
    Many companies have already been hit by a ransomware attack- or will be. Technically astute hackers continue their ability to infiltrate ransomware so much, that Ransomware as a Service is now available on the darknet. In today's hyper connected world, it could be only a matter of time until 'something' happens. How are you modernizing your cyber resilience strategy? Have you made provisions with technology that adapts to the ever-changing approaches of modern attacks? What is your plan to recover when your catalogs, directories, AD, etc. are locked-down with ransomware?

    Whether it is phishing, ransomware or insider attacks, the sophistication and intensity of modern cyber threats can make it difficult to keep up. In fact, attacks are routinely targeting back-up systems -- even "secure" back-ups.

    In this webinar, you will learn how to:

    Evolve your security strategy (It is all about data management)
    Take the economic incentive away from cyberhackers
    Reduce your attack surface
  • Unisys CloudForte® for Microsoft Azure Recorded: Apr 13 2020 34 mins
    Jason Carter, Lead Solutions Architect, CloudForte; Julia Nathan, Senior Cloud Solution Architect, Microsoft
    Accelerate Your Secure Cloud Adoption

    As part of digital transformation, both large and small enterprise and government organizations are facing a variety of cloud adoption challenges.

    Join us as we explore the reality of secure cloud adoption – and learn the details about Unisys CloudForte® for Microsoft Azure – with Jason Carter, Lead Solutions Architect, CloudForte, Unisys, and Julia Nathan, Senior Cloud Solution Architect at Microsoft.
  • Disaster Recovery Recorded: Oct 1 2019 61 mins
    Jeff Gilmer
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • Cloud Done Right! 9 Critical Elements for Success Recorded: Aug 7 2019 63 mins
    Unisys - Raj Raman, Lakshmi Ashok, Allen McMichael, Lori Pierson, Lisa McLaine, Brenda Celeste
    Enterprises need to modernize their operations to grow and stay competitive. But changes to IT infrastructure can quickly get out of hand. This involves moving workloads from on-premises data centers to public-cloud, private-cloud and hybrid-cloud solutions. The process is challenging and time consuming, leaving many organizations struggling to meet their business initiatives. In this webinar we’ll describe the nine key attributes that enterprises must master to be successful.

    Please join us on July 24th to learn how Unisys CloudForte™ helps our clients accelerate their migration to the cloud, while mitigating their risk and managing their costs.


    Presenters
    •Lisa McLaine - Global Director - Cloud and Infrastructure Services
    •Raj R. Ramen - Chief Technology Officer - Cloud
    •Lori Pierson - Portfolio Head - Global Cloud, Infrastructure and Application Services
    •Lakshmi Ashok - Chief Technology Officer - Homeland Security and Critical Infrastructure
    •Allen McMichael - Head - Global Cloud Managed Service Operations
    •Brenda Celeste - Director - Analyst Relations, North America
  • Elevate - An Omnichannel Banking Solution for Anytime, Anywhere Recorded: Jul 31 2019 3 mins
    Unisys
    Elevate is a fully integrated omnichannel banking ecosystem that enables frictionless customer journeys regardless of touchpoint, anytime, anywhere.
  • Build the Bank Platform of the Future: Omnichannel & the Role of Open Banking Recorded: Jul 17 2019 55 mins
    Maria Allen, VP & Global Head Financial Services, Unisys and Stephen Greer, Senior Analyst, Celent
    New business models are emerging in banking, and these are underpinned by new principles of openness, flexibility and agility. For many, omnichannel is an aspiration, most banks are still in the early days of deployment. What are the keys to success? And what should you prioritize in your digital transformation? Get insights on global industry best practices and learn about the rise of platform banking including:

    -New customer acquisition
    -New products
    -New distributions channels
    -and more….

    Join industry experts Unisys’ Maria Allen, and Celent’s Stephen Greer’s webinar at 11am EST on 17 July 2019.



    Our Presenters

    Maria Allen, Unisys
    Maria L. Allen is Vice President and Global Head of Financial Services. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives. With more than 30 years' experience in business operations, technology and sales, she has worked both in and with large number of financial institutions across diverse geographies. Maria is an award winning, visionary experienced in the development of high performance products, mission critical and technology-enabled business services for complex and compliance driven industries.

    Stephen Greer, Celent
    Stephen is an expert on retail banking trends, with an emphasis on fintech startups, emerging technology, and digital transformation. He has worked with some of the largest banks in the US and globe to influence digital strategies and identify opportunities in the space. Stephen has been a frequent speaker at large conferences such as CARTES Paris, American Banker’s Retail Banking Conference, and Cumbre Financiera Panama, as well as at industry roundtables and vendor events. He has been quoted in publications such as Forbes, The San Francisco Chronicle, American Banker, Banking Exchange, and others.
  • From Telephone to Telepathy – The Evolution of Digital Support Recorded: Jun 26 2019 61 mins
    Weston Morris, Global Leader for Unisys Digital Workplace Services
    Today’s enterprises need capabilities that go beyond the “Service Desk” and “Desktop Support.” Enterprises need capabilities that:

    •Start with how users devices are provisioned and configured so they are ready to ‘phone home’ when a problem is detected.
    •Include Artificial Intelligence and machine learning as inherent components of the digital workplace ecosystem.
    •Go beyond the visualization of device data to proactive resolution response.
    •Use intelligent analytics to infer how the end-users feel about their service without the hassle of a formal survey.

    Please join us as we profile seven clients’ use of our Digital Support innovations to accelerate digital transformation.
  • Addressing Consumer Safety Concerns with Zero Trust Security Recorded: Jun 24 2019 27 mins
    Christopher Kloes, VP of Security, Unisys
    In this webinar, you’ll learn:

    •The leading security concerns for consumers worldwide
    •The benefits of a Zero Trust security model to protect critical customer information
    •Five steps for implementing Zero Trust
  • How SOC Superheroes Win Recorded: Jun 5 2019 59 mins
    Salvatore Sinno, Global Chief Security Architect, Unisys; Ismael Cervantes, Sales Engineer, LogRhythm
    Today's reality is that a security breach is not a matter of IF, but a matter of WHEN. According to research from Ponemon Institute, the mean time to detect (MTTD) a breach is 197 days, and the mean time to respond (MTTR) is 69 days. When a threat is detected, organizations have a difficult time responding quickly. The security operations center (SOC) contacts the network team, or the endpoint team, or both to figure out where the anomalous endpoint or user is, and then they determine how to contain it - an inefficient process that can consume days or weeks before remediation.

    Rapidly responding to threats require leveraging state of the art innovation that combines advanced security analytics, machine intelligence, Dynamic Isolation, and automation. In this webcast, you will gain insights on how smart CISOs are making incidents non-newsworthy by controlling and neutralizing security events. Learn how to

    Bring multiple essential capabilities together to quickly identify threats and neutralize them before they cause harm not in days or weeks but minutes.
    Employ advanced security analytics and machine intelligence to continuously monitor endpoints, networks and user behaviors for cohesive end-to-end threat visibility.
    Deploy Dynamic Isolation to restrict or block malicious users and devices from communicating over the network.
    See a live demo that will entail a real-life scenario of insider attack with simulated attack, detection, and response in Seconds not hours, days or months.
  • Building a Zero Trust Model in the Cloud with Microsegmentation Recorded: Apr 2 2019 55 mins
    Salvatore Sinno, Chief Security Architect, Unisys; John Kindervag, Chief Technology Officer, Palo Alto Networks
    The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter of a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous. The assumption that systems and traffic within a data centre can be trusted is flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming. These same principles are equally applicable to public cloud deployments.

    The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that organizations can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

    In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will introduce concepts associated with the Zero Trust model in the cloud and show how Unisys Stealth® and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.

    By the end of this session, attendees will

    1. Understand how Palo Alto Networks and Stealth enable the Zero Trust model within the cloud.

    2. Understand Palo Alto Networks and Stealth Zero Trust segmentation platform.

    3. Understand how this solution can accelerate cloud adoption.

    4. Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.
  • Playing Moneyball in Cybersecurity Recorded: Mar 25 2019 40 mins
    Matt Soderlund, Cybersecurity Leader, Unisys
    When giants like Equifax, Facebook, and Google are getting breached on a larger scale than ever before, setting security priorities based on headlines and gut instinct doesnt cut it. Finally, your board of directors understands the need to pay close attention to cybersecurity. Youre now being asked to demonstrate the business impact of your security investments, and you need objective, data-validated priorities to obtain budget approval. Find out how Unisys TrustCheck lets you play cybersecurity Moneyball.
  • Imagine an End to Identity Fraud Recorded: Mar 4 2019 4 mins
    Unisys
    Identification that relies on what an individual knows or has―such as passwords, PINs and documents―won’t stop identity fraud. Even biometric markers can be spoofed. As fraudsters become more sophisticated, stronger security with multi-modal biometric identification is required. See how Stealth(identity) can help put an end to identity fraud.

    Learn more about Stealth(identity)™: unisys.com/sid
  • The Future of Open Banking Recorded: Feb 6 2019 2 mins
    Eric Crabtree, Financial Services Executive, Unisys
    Learn about the key aspects of open banking - regulations, open APIs, and relevance.
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey Recorded: Jan 16 2019 44 mins
    Tom Patterson, Chief Trust Officer, Unisys
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security Recorded: Nov 14 2018 62 mins
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America
    Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
    Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
    Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
Securing Your Tomorrow
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets. Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: FBI Warning: Cyber Attacks on ATMs - Are you prepared?
  • Live at: Nov 7 2018 6:00 pm
  • Presented by: Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys
  • From:
Your email has been sent.
or close