Security at the Sharp End: Strategies to Repel Relentless Attackers
Targeting of corporate and consumer data and devices by criminals and rogue states is well-funded and likely to persist for some time. Hardened operating systems, firewalls, IDS, and secure application coding are leading attackers to target endpoints, defined as people with devices, not devices alone. Analyzing large amounts of endpoint data we map current and emerging threats, both digital and analog, to provide a set of best practices for defeating attackers.
RecordedFeb 8 201260 mins
Your place is confirmed, we'll send you email reminders
Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.
With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.
In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
•Account credential theft: What can be done to prevent employees from falling into a trap?
•How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
•The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.
In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.
Join this webinar to learn:
- Key considerations of enabling microservices within your enterprise
- How DevOps fits in the microservices lifecycle and how to align team culture
- How to use an API gateway for securing and governing your microservice architecture
Do you feel like the economics of security often favours the attacker? Are you spending more and more, yet still feel like you are not achieving anything? How can you deliver a return on investment (ROI) on what you have chosen to invest and prove that you have delivered a total economic impact from a security perspective?
No one expects a CFO or board to write a blank check for security, which is why explaining the savings that an organization can realize in terms of a more efficient security team, lower hardware costs, and minimized risk - is paramount to understanding its value. In this webinar, we will discuss how a full examination of the effect of technology on the entire organization can present clear opportunities to save critical funds and build a business case that the CFO can understand.
*How traditional ROI analysis to justify security investments is ineffective
*The importance of employing a Total Economic Framework
*How to win the attention of the CFO
*The four vital components to determine investment value
Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.
As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?
Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.
Learn the "must haves" for any digital wallet solution:
• Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
• Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
• Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60 percent of the time, the root cause of the problem lies outside of the Citrix environment.
In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.
Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.
Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? Listen to this webcast to learn more.
With the news Yahoo! was breached in 2014 and 500 million user accounts were potentially compromised, this breach became the biggest in history to date. However, the damage extends far beyond Yahoo! properties where the digital identities of users could be compromised on other sites, business documents leaked and other harm could come for users who don’t take immediate steps.
This talk will cover not only the breach, but the aftermath in what users and enterprises should do to protect themselves over breaches affecting other companies.