ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Test automation, continuous integration (CI), and reliable test data provisioning are all key elements to making DevOps work, as they provide the necessary capabilities to quickly and securely test and release software. Without these technologies, the DevOps promise of rapidly deploying new services and applications is only a dream.
Join this web seminar to learn how to execute an integrated data management approach that will deliver seamless automation, efficiency, and security to your DevOps and continuous integration efforts.
• How to release applications faster with confidence through improved collaboration, automation and visibility.
•How self-service test data powers DevOps and CI implementations
•Ways to manage test data to reduce risk when implementing CI and DevOps
• Common oversights when employing automation and DevOps
• How organizations have saved millions and slashed development cycles
• Seamless automation tools and processes
Protecting your enterprise data is often referred to as a technology issue, but most cyber attacks begin by fooling a user into doing something, such as unknowingly downloading malware or giving up security credentials. This “social engineering” is the most common way that an online attacker will gain access to your business – and the hardest to defend against, because it exploits everyday human weaknesses, rather than technical vulnerabilities.
How do attackers fool your employees via email, Web, phone, and onsite? What are some of the latest methods they use to trick users and employees into breaking security policy? And most importantly, what can your organization do to keep its employees from being taken in? In this informative Dark Reading webcast, top experts on social engineering will answer these questions and many more. You’ll learn about current social engineering methods and the “human” threats posed by online and physical attackers. You’ll also get insight on how your organization can train and test its users and employees to recognize and turn away these social engineering exploits – before they compromise your business.
Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.
Join us for this live webinar where you will learn:
• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Learn about the exciting new capabilities of the next generation security platform. New features can prevent attacks in more deployments, even faster than before, preventing breaches before they can occur, no matter the location.
We will cover:
•Securing Your Cloud: Lean about new capabilities of the VM-Series to protect your cloud workloads anywhere
•Securing Office 365: Understand how to safely enable Office 365 without fear of threats or data exposure
•Accelerated Threat Intelligence: Learn about the enhancements to the Next Generation Security Platform that makes threat prevention even better than before
•Prevent Breaches by Securing Credentials: Learn how the Next Generation Security Platform makes successful credential theft a thing of the past
FireEye’s Dynamic Threat Intelligence (DTI) has identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actors appear to be performing initial reconnaissance against would-be targets, and the attacks caught FireEye’s attention since they were using unique scripts not commonly seen in crimeware campaigns.
FireEye now invites you to learn more about what happened from its Director of Mandiant Services in the Middle East. Stuart will elaborate on these targeted attacks, detailing the tools, tactics, techniques and procedures used as well as to discuss the intelligence gained from them to help you better protect your organisation against similar natured attacks now and in the future.
Agile IT service delivery models and mixed infrastructure are presenting new security challenges for many organizations. Old approaches to security don’t work well with automated, on-demand infrastructure in mixed on-premise and cloud environments, all with high rates of change and shared resources.
The webinar, featuring 451 Group Senior Security Analyst, Adrian Sanabria and Chief Product Officer at CloudPassage, Ram Krishnan, will cover:
•A brief overview of the transformation of IT delivery models
•Conversation about why old tools don’t work in this new model
•Specific ways to prepare for securing agile IT delivery models and on-demand IT services
Join Catherine Roy, Director of PMO at HOSTING, and Kellen Amobi, Project Manager at HOSTING, on June 23 at 3 pm EST for Cloud Migration: Tales from the Trenches – an interactive webinar, in which they will discuss:
-Developing scopes and deadlines for complex projects
-Developing realistic schedules
-How to approach and define problems for c-level and team members
Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.
Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.
During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:
* Quickly identify your most important assets and critical vulnerabilities
* Prioritize remediation efforts so you know which vulnerabilities to tackle first
* Eliminate the guesswork with real-time correlation of active threats