Hi [[ session.user.profile.firstName ]]

Best Practices for Protecting Your Business from Cybercrime

Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

Join this panel of security experts to learn more about:
- Trends in cybercrime and lessons learned in 2018
- The cost of data breaches
- Rise of cryptojacking and ransomware
- Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
- The CISO vs the cybercriminal
- Best practices for protecting your business

Speakers:
- Michelle Drolet, CEO, Towerwall
- Michael Thelander, Director of Product Marketing, Venafi
- William Peteroy, Security CTO, Gigamon
- Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
Recorded Feb 19 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
Presentation preview: Best Practices for Protecting Your Business from Cybercrime
  • Channel
  • Channel profile
  • Do You Really Know What's Running on Your Network? Recorded: Dec 2 2019 59 mins
    Martyn Crew, Director, Product Marketing Management, Gigamon and Dave Davis, ActualTech Media
    Everyone thinks they know what applications and data are on their network, but is that really the case?

    Join us for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from our industry-leading Gigamon expert:

    - How to identify and visualize what’s on your network
    - Beyond seeing what’s on your network, understand what it’s doing
    - How to use this knowledge to deliver optimal network availability, performance and user
    satisfaction

    Be sure to join and win in the visibility game. You’ll hear how to save time, increase overall tool efficiency and maximize your infrastructure investment.

    See how Gigamon delivers network visibility and analytics for digital apps and services enabling your organization to run fast, stay secure and innovate.
  • Dynamic Network Security Strategies Recorded: Nov 21 2019 40 mins
    Ricardo Font, Product Marketing Manager, Gigamon ThreatINSIGHT
    The need for dynamic network security has never been greater; however, the inability to pinpoint what is real within a myriad of alerts, coupled to the lack of resources required to continually defend against today's onslaught of attacks, degrades overall security and places organizations at risk.

    In this webinar, we will discuss strategies pertaining to the implementation of dynamic network security, specifically:
    - The Approach: Strategies used by leading organizations
    - Detection and Response: Analytics, visibility and key needs
    - Closing the loop: Measuring success

    Attend this webinar and you will be able to identify:
    - What is needed for implementing scalable dynamic network security
    - NDR, EDR and Logging: the best practices for each
    - How to measure improvements: MTTD and MTTR metrics
  • Encrypted Things - Network Detection and Response in an Encrypted World Recorded: Nov 13 2019 43 mins
    Justin Kohler, Sr Director, Customer Success and Sales Engineering, Gigamon Insight
    There has been tremendous growth in the percentage of network traffic that is encrypted over the last decade. With this comes many challenges for incident responders. Decrypting the traffic is often hard, if not impossible. The rise in encrypted traffic has undoubtedly increased privacy for users but we know that threat actors take advantage of it as well. As network defenders our visibility is impacted, and traditional network monitoring detection will not always work.

    In this talk we will discuss the problem of encrypted traffic as it pertains to network detection and response, educate you on new developments in SSL/TLS, and demonstrate how you can still hunt for and detect badness in encrypted traffic. This talk will be relevant to junior analysts all the way up to senior analysts at mature SOCs.
  • Unleash the Power of True Application Visibility Recorded: Oct 3 2019 52 mins
    John Gudmundson – Senior Product Marketing Manager, Gigamon
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization?

    Join Gigamon as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows so you’ll discover how to understand the performance and have control of hundreds of critical apps.
  • Strategic Solutions for Effective Network Security in the Cloud Recorded: Sep 26 2019 50 mins
    Rob Ayoub FireEye, Baseer Balazadeh Gigamon, Tom Adamski AWS
    Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.

    Join us on September 26 at 10 a.m. PT/1 p.m. ET, as experts from FireEye, Gigamon and AWS present a webinar on how to:

    •Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks

    •Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure

    •Apply intelligence to get actionable insights and speed detection and response

    •Fully integrate network forensics to accelerate alert investigation and breach mitigation
  • Incident Response: Make the First 24 Hours Count Recorded: Sep 24 2019 54 mins
    Ricardo Font, Product Marketing Manager, Gigamon Insight & Joe Goldberg, Cloud Practice Manager, CCSI
    Incident response teams are often hampered by an inability to see what is happening on their network, rendering them unable to confidently detect threats or respond quickly and effectively.
    So how can the top law firms accelerate threat detection and response? Join Ricardo Font, Product Marketing Manager for Gigamon Insight, and Matt Pascucci, Cybersecurity Practice Manager for CCSI, as we dive into metadata’s critical role in incident detection and response strategies. Attendees will learn:
    •What the key incident response needs are and how to meet them
    •How to dig deeper into key indicators of compromise using packet captures (PCAP)
    •How metadata can focus incident response efforts through data correlation and enrichment
    Find out how packets can either help or hinder response, all depending on how you use them – register today!
  • Getting to Yes: How to Justify your Network Packet Broker Purchase Recorded: Aug 21 2019 57 mins
    Zeus Kerravala, Principal Analyst at ZK Research & Gordon Beith, Sr. Product Marketing Director, Gigamon
    “Is it worth it?” is a question you must overcome when purchasing new equipment. Fortunately, when it comes to next-generation network packet brokers (NG-NPBs), getting to Yes is easier than you think.

    The latest data from ZK Research shows that next-generation NPBs have grown from simply a nice-to-have to a must-have technology, making it easy to green light your purchase:

    •Winning organizations deploy next-generation NPBs for a faster, more agile infrastructure with fewer disruptions during updates
    •Enables faster transition to hybrid, multi-cloud model without ever losing out on management and security
    •Eliminates blind spots, so fewer security tools are needed

    Arm yourself with the right information to justify your next-generation NPB purchase before you fall into the widening gap between winners and losers. You – and your infrastructure – deserve it.
  • Increase Network Resilience and Optimize Uptime with Inline Bypass Recorded: Aug 20 2019 37 mins
    John Lehane Senior Product Marketing Manager, Gigamon, Haider Jarral Technical Marketing Engineer, Gigamon
    Not again! Don’t be the one to deal with another outage, bottleneck or malfunction. You’re NetOps. Turn inline single points of failure into traffic continuity so you can drive your digital transformation without delays.

    The Paradox
    To drive digital transformation, you need a highly agile, resilient network infrastructure. Yet paradoxically, failing inline tools can end up disrupting the very applications they’re meant to protect. Maintaining maximum performance and the ability to add new tools is critical.

    The Fuel You Need
    Join Gigamon experts to learn how Gigamon’s Visibility Fabric™ with Inline Bypass gives you the fuel injection you need for bypass protection. Find out how to improve daily operations by:

    • Enhancing infrastructure resiliency and availability
    • Reducing operating and monitoring costs
    • Improving efficiencies and cooperation between IT teams
    • Step-by-step GUI configuration examples

    And,
    • Get a live demonstration of how Gigamon can enhance the day-to-day operations for NetOps teams to remove the single point of network failure.
  • Why Should I Care About SSL/TLS Decryption? Recorded: Jul 26 2019 52 mins
    Druce McFarlane, Director of Product Management, Security, Gigamon
    We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened.
    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption.
    During this webinar, we’ll talk about:
    -How TLS/SSL encryption has become a threat vector
    -Why decryption is essential to security and how to effectively perform detection
    -How to make sure your detection tools are working at their greatest capacity without the latency introduced by decryption
  • Get the Most Out of App-Aware Network Visibility Recorded: Jul 18 2019 59 mins
    Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, Gigamon
    Got apps? Most companies run hundreds. Application experience can make or break a digital enterprise. That’s why true application-level visibility is a must-have in today’s network operations. While achieving it with legacy solutions is difficult, the benefits of becoming app-aware are more than worth it.

    What the heck is application-aware networking? It’s a cool new way to boost network performance and get the most out of your tools. You can now instantly see all applications running in your network, and manage traffic flow not by packets, but by applications.

    Join EMA Research Director, Shamus McGillicuddy, and Gigamon VP, Product and Technical Marketing, Bassam Khan, for this interactive webinar where they will discuss key topics including:

    •Protect your operations from oversubscription
    •Interrogate and identify unknown apps
    •Protect critical applications from bandwidth hogs

    Best of all, you’ll see a live demo of how Gigamon, an application-aware network packet broker, delivers true application visibility to your organization.

    Register now to see it in action!
  • Don't Let Digital Transformation Wreak Havoc on Your Users! Recorded: Jul 9 2019 59 mins
    Sam Kumarsamy, Sr. Product Marketing Manager, Gigamon
    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience by:
    •Using tools efficiently by optimizing traffic and preventing packet duplication
    •Enhancing security by collecting and distributing NetFlow metadata to tools
    •Identifying, categorizing and visualizing more than 3,000 applications automatically

    See how pioneering technology Gigamon Application Intelligence helps increase visibility, improve security and, ultimately, exceed user expectations.
  • IT Modernization in the Public Sector: Troubleshoot Network Performance Issues Recorded: Jun 26 2019 39 mins
    John Lehane, Sr. Product Marketing Manager, Gigamon, and Bill Coon, Technical Director, Riverbed
    Join experts from Gigamon and Riverbed as we discuss how Application Intelligence can open up the network “black box” and show you exactly what’s running inside. Find out why the evolution of Network Performance Monitoring (NPM) demands a more integrated approach to Digital Experience Monitoring, and how you can achieve that by leveraging the perspectives of end users and their applications to extend the value of network visibility.
    Attendees will learn how to:
    • Get pervasive visibility of network traffic across geographically dispersed locations
    • Ensure only the right people have access to the network and data center, as well as guarantee optimal performance and availability
    • Receive near real-time actionable alerts based on Government Furnished Information, allowing for mitigation and remediation of incidents that could have gone unnoticed
    • Address issues quickly so that Department of Homeland Security requirements can be met
  • Best Practices for Healthcare Digital Transformation Recorded: Jun 18 2019 43 mins
    John Lehane, Product Marketing & Danny Akacki, Technical Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • Fuel Visibility and Automation in Today’s Hybrid Cloud Environments Recorded: Jun 5 2019 47 mins
    Brandon Butler, Sr. Research Analyst, IDC & Baseer Balazadeh, Sr. Technical Marketing Engineer - Cloud, Gigamon
    Today’s networks are changing with the rise of third-party platforms, including cloud, mobile, social, big data and IoT, causing organizations to implement new tools. What are you doing to keep up with the adoption of modern networks and the challenges they pose from an operational perspective?

    Join our webinar to hear the experts from IDC and Gigamon discuss how to:
    • Extract relevant data across multiple domains to provide insights all the way to the application layer through visibility and monitoring platforms
    • Gain centralized control, faster access to new features and functionality and rapid, dynamic scaling with cloud-based network management systems
    • Improve automated management platforms by integrating insights and analysis from multiple tools
    • Fuel pervasive visibility -- including TLS decryption -- and efficient and secure use of emerging technologies and faster network speeds

    Join us as we address the importance of high-fidelity visibility and monitoring as critical enablers for automation and security. We’ll also look at how the rise of advanced management platforms that integrate visibility, automation and assurance will create intent-based networks.
  • Gain Control of Complex Applications Central to Your Digital Transformation Recorded: May 29 2019 54 mins
    John Gudmundson, Sr. Product Marketing Manager Gigamon
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    • Identify and extract traffic from over 3,000 applications
    • Detect and manage shadow IT and rogue apps
    • Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • Driving Digital Transformation with Application Intelligence Recorded: May 1 2019 20 mins
    John LeHane, Product Marketing Gigamon
    Accelerate Your Organization’s Digital Transformation

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    Join us for our 20 minute interactive webcast to see how application-aware network visibility can accelerate your organization’s digital transformation.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and its tools.
  • Don’t Let Digital Transformation Wreak Havoc on Your Network! Recorded: Apr 30 2019 53 mins
    Sam Kumarsamy, Sr. Product Marketing Manager Gigamon
    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience?

    Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience by:

    •Using tools efficiently by optimizing traffic and preventing packet duplication
    •Enhancing security by collecting and distributing NetFlow metadata to tools
    •Identifying, categorizing and visualizing more than 3,000 applications automatically

    See how pioneering technology Gigamon Application Intelligence helps increase visibility, improve security and, ultimately, exceed user expectations.
  • 2019 Cyberthreat Defense Report Recorded: Apr 23 2019 59 mins
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Accelerating Enhanced Threat Identification and Incident Investigation Recorded: Mar 21 2019 60 mins
    David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon Insigh
    Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.

    Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.

    Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
    •The methodology behind the report
    •What to watch for in selecting a security analytics solution
    •How to identify threats faster, thus reducing dwell time
    •How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
    •How access to a broad array of network data reduces the attack surface
  • How to Optimize Network Performance During Infrastructure Transformation Recorded: Feb 27 2019 48 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon
    How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.

    Join Gigamon to get the latest best practices to:
    • Acquire and aggregate all network traffic for better visibility
    • Stop duplicate packets from overloading your tools
    • Filter traffic to provide the right data to the right tools
    • Optimize compliance and reduce risk across your entire IT environment

    If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Protecting Your Business from Cybercrime
  • Live at: Feb 19 2019 4:00 pm
  • Presented by: Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
  • From:
Your email has been sent.
or close