Hi [[ session.user.profile.firstName ]]

Leveraging Peer-to-Peer Intelligence in the Age of High-Profile Hacking

In the age of Wikileaks, high-profile hackers, and increasing data breaches, the risks of unmonitored peer-to-peer (P2P) file-sharing use have evolved into a threat of unparalleled magnitude. In this webcast, you will learn how sensitive information is being exposed, harvested, and distributed acros
In the age of Wikileaks, high-profile hackers, and increasing data breaches, the risks of unmonitored peer-to-peer (P2P) file-sharing use have evolved into a threat of unparalleled magnitude. In this webcast, you will learn how sensitive information is being exposed, harvested, and distributed across multiple P2P networks commonly unbeknownst to large corporations, government, and law enforcement. Key takeaways include:

--Examples of recent P2P data breaches across all industries
--Explanation as to how P2P data breaches and other P2P security risks occur
--Evidence of cyber-criminal activity on P2P networks.
--An overview of Tiversa's unique P2P Breach Protection Services and how they can protect your organization
Recorded Mar 15 2012
39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and Tiversa
Presentation preview: Leveraging Peer-to-Peer Intelligence in the Age of High-Profile Hacking
Recommended for you:
  • Date
  • Rating
  • Views
  • Understanding PCI DSS 3.2: Minor Updates, Major Changes Understanding PCI DSS 3.2: Minor Updates, Major Changes J. Andrew Brinkhorst, CISM, Director of Product Management at Trustwave, and Dixie Fisher, Product Marketing Manager Live 60 mins
    Payment Card Industry Data Security Standard (PCI DSS) 3.2 has now been announced - organizations who must comply need to understand the implications. Join us to learn more about the drivers for the early release of the mandate and how you can best prepare your organization.

    Attend this webinar for helpful insights about:

    -The scope of the new PCI DSS 3.2
    -What the updates mean for your business?
    -Why you would want to make these changes even if they weren’t mandated?
    -What may be on the horizon?
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Application Security: 6 Myths of Open Source Management Application Security: 6 Myths of Open Source Management Chester Liu, Black Duck Software Recorded: May 25 2016 37 mins
    The recent high-profile “Panama Papers” exploit, which resulted in the theft of 2.6 terabytes of data from the Mossack Fonseca law firm, highlighted the firm’s failure to effectively secure and manage its open source software.
    Although the exploited component has yet to be pinpointed, the breach investigation has revealed that Mossack Fonseca was delinquent in patching known open source vulnerabilities in both Drupal and Wordpress. This lapse exposed sensitive client information.
    Open source software is an essential element in application development today and this breach raises the question: What are the best practices for securing and managing open source to avoid exploitation? This webcast will detail the processes organization can implement to secure and manage their open source to reduce risk from security vulnerabilities.
  • Closing Network Backdoors: Best Practices to Control Third-Party Risks Closing Network Backdoors: Best Practices to Control Third-Party Risks Dale Gardner, Director, CA Technologies Recorded: May 25 2016 60 mins
    In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.

    In this webcast, you’ll learn:

    - The identity, access, and security governance processes needed to protect your network
    - How to ensure positive user identification to prevent credential theft and misuse
    - Techniques to limit access to only those resources required to satisfy work or business requirements
    - Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    - Establishing monitoring procedures that flag violations and speed forensic investigations

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging Peer-to-Peer Intelligence in the Age of High-Profile Hacking
  • Live at: Mar 15 2012 5:00 pm
  • Presented by: McAfee and Tiversa
  • From:
Your email has been sent.
or close
You must be logged in to email this