ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.
Cyber attacks are becoming more complex, and it is becoming harder to determine what the best strategy is for vigilant cybersecurity. Companies feel like they are playing catchup, and there always seems to be another security hole to fill. Join this 30-min webcast to hear about the emerging security service segment, managed detection and response (MDR).
This webinar will explore another aspect of the CISO’s role as an essential business leader: guiding the organization through the crisis of a breach.
Featuring insights from CISOs and C-suite leaders who have been there and done that, the program will address incident response planning, setting C-suite and board expectations, and tips for providing the right information in a breach crisis situation to aid decision-making and public disclosures. Learn how to establish your role as part of the solution team, and how to avoid a reactionary response that too often leads to finger-pointing at the security team. You’ll take away actionable insights to apply to your own journey as an essential business leader.
Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.
Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.
Watch this webcast to understand:
•The beneficial impact of adopting container technology
•Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
•How container technology positively impacts operations
Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
The GuidePoint Virtual Security Operations Center (vSOC) was designed to address many of the common complaints and issues customers experience with other managed service providers. We use the cloud to provide dynamic scalability and cost savings. vSOC analysts provide validated security incidents that allow you to focus on what’s really important: remediation.
vSOC Detect now integrates with CrowdStrike Falcon by leveraging the Falcon Connect API to ingest Falcon host data in to the vSOC Detect monitoring platform. This integration enables vSOC Detect to leverage the CrowdStrike platform for endpoint monitoring and allows analysts to correlate endpoint data against SIEM security logs. This added correlation within our SIEM enables active hunting by vSOC Detect analysts to discover new and emerging threats in customer environments.
Join us to explore “Hunting with CrowdStrike”— and how our Integrations make CrowdStrike Falcon Versatile and Effective.
Topics will include:
- Using the CrowdStrike Integration vSOC Detect
- Learning how analysts can:
- Perform ad-hoc searches and queries
- Quickly Conduct comprehensive investigations
- Identify insider threat activity
- Create dashboards and reports
Rapidly evolving trends among digital financial services are driving fintech developers to create much more personalized customer experiences within their applications. By harnessing the power of consumer transaction data, these industry innovators can enhance customer engagement and drive more targeted cross-sell and upsell revenue opportunities.
Analyzing consumers’ financial data is quickly becoming the future of online banking and those in the fintech community that can leverage this information quickly and effectively will have the edge and be able to deliver the personalized services necessary to attract and retain the next generation of banking customers.
Join us on August 24 to hear from a panel of industry experts as we discuss the evolution of consumer transaction data analytics and how to leverage it to create a more contextualized and personalized user experience.
* The increasing demand for fintech apps to create an individualized digital banking experience
* The rapid advancement of gathering and analyzing consumer transactional data
* How fintech developers can leverage contextual data to improve customer products
* Alex Cram, Co-Founder and Chief Technology Officer, Track Technologies
* Robin Verderosa, Senior Director, Product Management, Envestnet | Yodlee
* Jim Del Favero, Chief Product Officer at Personal Capital
* Mani Fazeli, VP of Product, Wave
* Evan Schuman, Moderator, VentureBeat