Hi [[ session.user.profile.firstName ]]

Tackling the Final Leg of your GDPR Journey

There are three recurring challenges we see our customers encountering in their GDPR journey. Find out what they are and how to tackle them. Watch the promo or register now.
Recorded Mar 30 2018 5 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Laurence Pitt, Steve Jacques
Presentation preview: Tackling the Final Leg of your GDPR Journey

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Dynamic, Adaptive Multicloud Security Recorded: Nov 21 2018 14 mins
    Prasad Raviraj Solutions Marketing SR Manager, Security
    Price, agility, scale, global footprint, and availability of emerging technologies (such as AI, Serverless, IOT, etc) within the cloud platforms have contributed to the rapid adoption of multicloud by businesses across the globe. However, helping business adopt these technologies and deployment models while keeping the network safe from attack is a major challenge for even the most seasoned of security professionals. In this session we will explore how a three-pronged approach using Juniper Networks Unified Cybersecurity Platform can help businesses get multicloud security right.
  • Les contre-mesures face aux nouvelles cyber menaces avec JATP Recorded: Oct 11 2018 45 mins
    Ramyan Selman Systems Engineer, spécialiste sécurité, Juniper Networks
    JATP, la nouvelle solution complète de détection des menaces et des malwares de Juniper Networks.

    Les outils standard de sécurité reposant sur les signatures ne parviennent pas à détecter toutes les attaques zero day. En tirant parti des technologies avancées d'analyse de comportement et de machine learning, la solution on-premise JATP identifie les menaces avancées inconnues et existantes quasiment en temps réel. Les mécanismes de JATP s’appuie sur une détection et une analyse continues du trafic local, des échanges Web et e-mails.
  • Sky Enterprise, solution de gestion d'actifs 100% Cloud Recorded: Aug 30 2018 34 mins
    Ramyan Selman Systems Engineer, spécialiste sécurité Juniper Networks
    Juniper Sky Enterprise apporte un nouveau moyen de gérer les équipements actifs de votre infrastructure tels que les commutateurs, les pare-feu et les solutions sans-fil AeroHive au travers d’un portail web centralisant l’ensemble des fonctions au moyen d'un tableau de bord unique.

    Les avantages de cette technologie en mode Saas sont nombreux :
    •simplification de l'installation grâce à la fonction Call Home en mode plug&play, il suffit juste d’installer et de connecter les équipements pour qu'ils se configurent automatiquement depuis le Cloud Sky Enterprise
    •possibilité de gérer son parc existant d’équipements Juniper (selon versions) une gestion centralisée accessible depuis un simple navigateur Internet
    •les mises à jour gérées directement par le constructeur et par le client prise en charge des solutions contrôleurs et bornes Wifi AeroHive
  • Juniper & IDC on Security - Advanced Persistent Threat (APT) Recorded: Aug 20 2018 9 mins
    Stephane Krawczyk, Research and Consulting Manager, IDC France;
    Juniper & IDC on Security - Advanced Persistent Threat (APT)
  • Rethinking Security Models Recorded: Jun 13 2018 23 mins
    Lee Fisher, Head of Security Business EMEA, Juniper Networks
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Stages to GDPR Compliance Stage 1 - Implementing a GDPR Program Recorded: May 15 2018 4 mins
    Gitte Bendzulla, General Counsel at Juniper
    Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA is back to discuss the first stage of Juniper’s compliance journey and covers constructing a GDPR program and team to identify the risk factors within the GDPR assessment process. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr

    Stage 2 - Design of Operational Controls: https://www.brighttalk.com/webcast/16375/321645
  • Stages to GDPR Compliance Stage 2 - Design of Operational Controls Recorded: May 15 2018 4 mins
    Gitte Bendzulla General Counsel at Juniper
    In this latest video, Gitte Bendzulla, Juniper Networks’ General Counsel for EMEA talks about the design of operational controls and how this can lead to a smoother and consistent road to GDPR compliance in the long term. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr


    Stage 1 - Implementing a GDPR program: https://www.brighttalk.com/webcast/16375/321639
  • Security - the Essential Component to Your GDPR Strategy Recorded: May 8 2018 3 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    Cybersecurity with data protection ensures an early warning of a breach and allows maximum time for remediation. Juniper Networks looks at how a Software Defined Secure Network can help change your thinking from network security to Security From Your Network. For further insight into Juniper’s journey to GDPR, visit the content hub at http://www.juniperemea.net/gdpr
  • Cryptocurrency Malware: Tips to Avoid Ransomware & Data Loss Recorded: Apr 24 2018 48 mins
    Asher Langton - Security Researcher - Juniper Networks
    With exponential growth in ransomware during the last two years, we're all asking how to stay safe. In this presentation you will learn more about the different types of attack which are used to extort money, along with guidance on how to avoid them.
  • Tackling the Final Leg of your GDPR Journey Recorded: Apr 10 2018 37 mins
    Laurence Pitt, Global Security Strategy Director & Steven Jacques Consulting Engineer
    At Juniper, we’re deep into our journey to GDPR compliance and we meet lots of enterprise customers working towards the same objective. So, how are their GDPR efforts shaping up?

    There are three recurring challenges we see our customers encountering:

    1. “GDPR defines best practices for data-governance, so how do we understand the data we hold and how it is being used?” You need robust data collection, analysis, correlation, and auditing capabilities. We’ll tell you how you can achieve this.

    2. “In the event of a data breach occurring, how can I quickly secure it and notify the regulator within 72 hours?” Having end-to-end visibility and security across your network is the start point. We’ll explain how.

    3. How do I keep my business protected from the sheer volume of threats? We’ll discuss how you can simplify your security strategy to free up resources.

    We’ll take you through a detailed discussion using real-life customer scenarios that bring to life actionable solutions to each scenario.

    If you are responsible for GDPR in your organization, this webinar is unmissable.
  • Tackling the Final Leg of your GDPR Journey Recorded: Mar 30 2018 5 mins
    Laurence Pitt, Steve Jacques
    There are three recurring challenges we see our customers encountering in their GDPR journey. Find out what they are and how to tackle them. Watch the promo or register now.
  • Data: Don't Let Your Greatest Asset Become a Liability Recorded: Mar 21 2018 42 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • How Juniper Supports i3D.net’s GDPR Journey Recorded: Mar 1 2018 2 mins
    Stefan Ideler, Chief Technology Officer at i3D.net
    Stefan Ideler, Chief Technology Officer at i3D.net, describes how important data security is in the GDPR climate and how their deployed Juniper SDSN solution provides robust network protection.
  • Juniper's Advanced Threat Prevention Recorded: Feb 27 2018 53 mins
    Franklyn Jones VP of Security Marketing Juniper Networks and Juan Perez Consulting Engineer Specialist Juniper Networks
    Juniper recently acquired Cyphort, a software security firm that offers advanced threat detection, analytics, and mitigation platform. This webinar will provide an introduction to the Cyphort Advanced Threat Detection Technology which will be rebranded to Juniper Advanced Threat Appliance allowing for both cloud-based and on premise-based advanced threat protection.

    All attendees will walk away with a high-level understanding of Cyphort, such as:
    - Components of the Cyphort solution
    - Understanding of deployment and operation in network
    - Security and productivity problems Cyphort solves for customers
    - Market opportunities for VARs
    - Market research validating the industry need for Cyphort

    What You Will Learn:
    - How Cyphort will strengthen Juniper’s security portfolio for the ultimate security platform for both on-premises and cloud
    - The seven questions to ask CISO's and Security Analysts
    - How combining Detection, Analytics and Automation gives CISO’s and Security teams exactly what they want
  • Security and the Changing Value of our Data Recorded: Jan 18 2018 43 mins
    Laurence Pitt, Global Security Strategy Director at Juniper Networks
    We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

    Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.

    Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
Juniper Networks (French)
Juniper Networks (French)

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tackling the Final Leg of your GDPR Journey
  • Live at: Mar 30 2018 3:30 pm
  • Presented by: Laurence Pitt, Steve Jacques
  • From:
Your email has been sent.
or close