Hi [[ session.user.profile.firstName ]]

Do You "Really" Know What's On Your Network?

Can you secure your network without knowing what devices are on your network, or what applications run on them? Not really. McAfee and BDNA have teamed up to detect all invisible devices and applications on enterprise networks and to bring them under a policy driven security umbrella.

Can you secure your network without knowing what devices are on your network, or what applications run on them? Not really. McAfee and BDNA have teamed up to detect all invisible devices and applications on enterprise networks and to bring them under a policy driven security umbrella.

In this webinar, you’ll learn how to:

• Gain full visibility into all hardware and software on your network
• Complete this discovery in a matter of hours, without software agents
• Bring all devices under a centralized security management framework
Recorded Oct 11 2011
34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and BDNA
Presentation preview: Do You "Really" Know What's On Your Network?
Recommended for you:
  • Date
  • Rating
  • Views
  • GDPR Summary:  Why encryption and other measures are now a must? GDPR Summary: Why encryption and other measures are now a must? Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker Recorded: May 24 2016 62 mins
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • GDPR Summary:  Why encryption and other measures are now a must? GDPR Summary: Why encryption and other measures are now a must? Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker Recorded: May 24 2016 62 mins
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Social Engineering: Is that a Pwn Plug in Your Pocket? Peter Wood Recorded: May 24 2016 44 mins
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 影山正:シニア・マネジング・ディレクター、アジア太平洋地域統括責任者、坂出國雄:マネジング・ディレクター、ジャパンデスクヘッド、オットー マンフレッド 倉雄:ドウェイン・モリス・ベトナム法律事務所 Recorded: May 24 2016 89 mins
    ベトナムは、アジア太平洋地域のなかでも引き続き海外からの直接投資が多い国のひとつです。堅調なGDP増加、多くの自由貿易協定、インフラ改善、多い若年層、安価な労働力といったマクロ経済視点での好材料がビジネスを呼び込む要因となっています。一方で今年1月に開催された第12回共産党大会で選出された新指導部の動向は、投資家にとって不確定要素やリスクが残ります。また、南シナ海を巡る地政学的な状況についてもベトナムでビジネスを展開する際の懸念材料であり、さらに、政府による情報統制は、ディールの行使に際して大きな課題となっています。

    投資先としてのベトナムについて、クロールのシニア・マネジング・ディレクター、アジア太平洋地区統括責任者である影山正と、マネジング・ディレクター、東南アジアのジャパンデスク・ヘッドである坂出國雄がセミナーを開催し、クロールが過去にベトナムで行なった調査を踏まえながら、ベトナムでのビジネス上および政治上のリスク、新指導部の動向、自由貿易協定が海外からの投資に与える影響、事業運営する際の留意点やビジネスリスクについて紹介します。皆様のご参加を心よりお待ち申し上げております。
  • PWC and Palo Alto Networks Discuss Security Framework PWC and Palo Alto Networks Discuss Security Framework Chad Kinzelberg, SVP of Business Development at Palo Alto Networks and David Burg, Global Cybersecurity Leader at PWC Recorded: May 23 2016 59 mins
    Palo Alto Networks and PwC have established a strategic partnership to help customer organizations build security architectures, organizational structures, and computing processes optimized to prevent successful cyber breaches.

    At the core of this partnership is a jointly-developed state-of-the-art security framework, designed to assist corporate executives and boards of directors address the people, process, and technology elements of managing cybersecurity risk.

    To learn more about the framework and the value it can bring to your organization, register to attend this webinar with Chad Kinzelburg, SVP of Business and Corporate Development at Palo Alto Networks and David Burg, Principal and Global & US Cybersecurity Leader at PwC.
  • Cyber - Angriffe schneller erkennen und abwehren Cyber - Angriffe schneller erkennen und abwehren Pascal Cronauer Recorded: May 23 2016 49 mins
    Im Webcast zeigen wir Ihnen, was Unternehmen tun können, um das Risiko für einen Angriff auf ihr Netzwerk deutlich zu reduzieren. Dabei werden vielfältige Ereignisse mit Big-Data-Analysen ausgewertet, bei einer drohenden Gefahr starten sofort automatisiert intelligente Gegenmaßnahmen. Dank fortschrittlicher Techniken wie maschinellem Lernen lassen sich so Bedrohungen zum Vorschein bringen, die ansonsten unbemerkt geblieben wären.

    - Sie sollten sich diesen Webcast ansehen, wenn Sie
    - frühe Anzeichen für eine Bedrohung Ihres Unternehmens erkennen wollen;
    - in Ihrem Unternehmen auf eine Attacke schneller reagieren wollen;
    - automatisierte Möglichkeiten haben wollen, um den Angriff zu vereiteln;
    - merken, dass es Ihren derzeitigen Verteidigungsmaßnahmen an Automatisierung und Effizienz mangelt;
    - Sie bereits eine SIEM-Plattform der ersten Generation einsetzen, aber wegen ihrer Komplexität frustriert sind, oder wenn Sie merken, dass Sie noch an manchen Stellen verwundbar sind;
    - die Nadel im Heuhaufen der Security-Events nicht finden können

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Do You "Really" Know What's On Your Network?
  • Live at: Oct 11 2011 5:00 pm
  • Presented by: McAfee and BDNA
  • From:
Your email has been sent.
or close
You must be logged in to email this