Hi [[ session.user.profile.firstName ]]

Lessons Learned From Data Breaches to Better Protect Yourself

Cyberattacks occurs every 39 seconds globally and many are successful. Data breaches continue to affect hundreds of millions of customers causing them to lose trust in the businesses where personal information was compromised. It is vital for executives, managers, and line personnel to understand how data breaches occur and what can be done to prevent them.

In this webinar, we will revisit some of the most interesting recent data breaches and discuss lessons learned to better protect your organization from them happening to you.
Recorded Jun 15 2021 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eugene Yew
Presentation preview: Lessons Learned From Data Breaches to Better Protect Yourself

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Glimpse of Ransomware Resurgence: A Perspective From Incident Responders Aug 10 2021 8:00 am UTC 60 mins
    Desmond Ngu
    Ransomware has been an increasing threat for small to large organizations. Tune in to discover what our professional Incident Responders have seen over the past 24 months. We uncover a glimpse of ransomware attack trends, targeted APAC industries, malware types and infamous root causes that have lead to ransomware compromises. We will also show how our experienced IR team can help you be proactive instead of reactive against these notorious infections in the digital world.
  • Microservice, Container, Kubernetes & The Future of PaaS Recorded: Aug 3 2021 34 mins
    Cheney Hu
    Living in a digital world means information is always at your fingertips, residing in the applications on your phones, laptops and servers. As speed and availability of information access requirements get higher and more complex, applications must evolve to stay current.

    Rapid changes in application architecture have seen applications morph from more traditional, monolithic applications with functional modules built into a single installation, to modern microsevice-based applications, that break into multiple installations, that more easily serve a wider user base. The future surely belongs to microservice-based applications, as unlike monolithic applications that are designed to run on physical servers or VMs, micro-service applications can be run on containers, and are managed by Kubernetes (K8s in short). To build, run and manage container-based microservices, you will certainly deal with K8s.

    As the first graduated open-source project from CNCF, K8s are the core of the platform-as-a-service that provides automation and orchestration for micro-service applications. Many tools like Jenkins and Istio are built around K8s, to facilitate simple and faster modern application development and management.

    As a long-time IaaS (HCI & SCP) player in the market, Sangfor dedicated an increasing amount of resources to PaaS development several years ago. Why are K8s so popular? And what is Sangfor’s role in the PaaS world? Join our Sangfor expert-led webinar to learn more!
  • Uncovering Telltale Signs of Ransomware with Continuous Threat Detection Recorded: Jul 27 2021 42 mins
    William Phuah
    Ransomware is one of, if not the biggest blight in this digital age. Many organizations are concerned about the negative impact a single ransomware attack will have on them and are doing all they can to prepare and to protect themselves for the eventual attack. However, while there are many variants of ransomware being developed every day, there are always telltale signs that can give you early warning of a ransomware threat coming your way.

    Join us and learn how you can identify these early warning signs with Sangfor’s Network Detection and Response platform, Cyber Command.
  • Sangfor Thailand International Roadshow 2021 Recorded: Jul 23 2021 139 mins
    Ratsakan Srisawat, Winyou Adisaktrakoon, Kraiphol Kulsirivuttichai, Pongpisit Laosuwanwat, Thuchapon Intaphrome
    We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach.

    Cloudification and Network Optimization have simultaneously expanded, with more than 75% of organizations indicating they are employing a cloud-first strategy, as reported by Gartner, giving businesses the tools to operate at a higher level – and giving cyber criminals the tools to penetrate and manipulate faster and easier than ever before. It is time to stop looking back at the grim statistics of 2020 and look forward to the trends of 2021. The Gartner report "Top Strategic Technology Trends for 2021" tells us that COVID-19 has disrupted the way organizations are working and must transform to meet trends such as remote work.
  • Disaster Recovery: Choosing the Right DR Plan & Security Solution Recorded: Jul 20 2021 28 mins
    Lee YK, Sangfor Industry Solution Expert and Consultant.
    Data protection and operational up-time are of critical importance since the pandemic, yet a recent study of over 500 C-level executives discovered that almost 80% of small and medium sized businesses have no data backup or disaster recovery (DR) plan in place. These networks are incredibly vulnerable to hardware failure, human error and malicious attack.

    Failure to plan, is a plan to fail. There are several considerations you must take into account when choosing and deploying a disaster recovery plan. Plan for the future safety of your organization now.
  • Insider Threat: US Supreme Court Drives Need for Zero Trust Network Access Recorded: Jul 13 2021 42 mins
    Guy Rosefelt
    The US Supreme Court ruled that interpretation of the United States Computer Frauds and Abuses Act of 1986 (CFAA) related to anyone who "intentionally accesses a computer without authorization or exceeds authorized access," was too broad and overreaching. Thus, anyone who has authorized access to computers and data cannot be held criminally liable for misuse of those resources or data. This now makes it very difficult for organizations to prosecute insider threat attacks. Organizations now need to implement and enforce ZTNA to ensure no one has more access than they need to resources or data. ZTNA limits and audits authorized access making it easier to take action against inside attackers.

    In this webinar, we will discuss the US Supreme Court decision, how it affects you and how ZTNA can help you protect against insider threats.
  • Move to a Suited Cloud for Your Applications and Data Recorded: Jul 6 2021 23 mins
    Francis Tsang. Senior Managed Cloud Operations Manager.
    The pandemic has dramatically changed our lives, and the global business landscape. Customer behavior has also experienced an permanent shift. This means that organizations need an enhanced their approach to transformation, to ensure they have the agility to reinvent themselves in extraordinary times.

    Sangfor is here to show you how to break down silos and drive digital transformation with optimal TCO control, while debunking myths of the complexity of adoption of emerging technologies. Cloud Computing as-a-service suits application needs and secures data, making your network agile yet focused, and helping put strategies in place that can evolve quickly, and deliver growth in this post-pandemic era.
  • 3 Critical Steps in Your Distributed Enterprise Protection Strategy Recorded: Jun 29 2021 46 mins
    Allen Lim
    While traditional WAN topographies are still widely in use, they cause several issues to organizations focused on securing branch offices.
    • Multi-point solution increases O&M complexity & cost
    • Lack of end-to-end security visibility
    • Difficulty defending against advanced persistent threat targeting branch offices

    Branch offices are often the weakest link in your strategic cyber defense plan, yet vital to organizational level network security protection. An unexpected cyber-attack could launch your business, head-first, into the worst-case scenario, making the creation of an incident response plan a critical part of your business continuity plan.

    Join Sangfor experts for today's webinar covering:
    • Managing branch offices effectively & securely
    • Offload SecOps to a trusted managed service provider
    • Incident Response best practices
  • It’s Time to Upgrade Your IT Infrastructure!...What next? Recorded: Jun 22 2021 36 mins
    Tian Koon Lee. Manager, Global Business Solution Strategy
    IT infrastructure is a vital part of any size business, and has a huge impact on operations and company success. It’s vital to have a secure and efficient infrastructure to keep up with constant changes in business, technology and best practices. Upgrading your IT Infrastructure can be a daunting task. How do you know when it’s the right time to upgrade, and how to get started? Join Sangfor experts for a webinar, where we will conduct an in-depth discussion of warning signs that it’s time to consider upgrading your company IT. Sangfor HCI is the solution you need to effectively build a simple, secure, reliable and cost-efficient IT infrastructure for your business.
  • Lessons Learned From Data Breaches to Better Protect Yourself Recorded: Jun 15 2021 46 mins
    Eugene Yew
    Cyberattacks occurs every 39 seconds globally and many are successful. Data breaches continue to affect hundreds of millions of customers causing them to lose trust in the businesses where personal information was compromised. It is vital for executives, managers, and line personnel to understand how data breaches occur and what can be done to prevent them.

    In this webinar, we will revisit some of the most interesting recent data breaches and discuss lessons learned to better protect your organization from them happening to you.
  • Sangfor International Roadshow 2021 - Indonesia Recorded: Jun 15 2021 167 mins
    Indra Lesmana/Victor J. Ferdinandus, Senior Presales Manager. Steven Tanuwijaya, Deputy PreSales Director.
    Sangfor International Roadshow 2021 - Indonesia
  • Building Proactive Closed-Loop Defenses Recorded: Jun 8 2021 31 mins
    Steven Tsui
    Today’s cybersecurity landscape is dire: externally, innumerable attackers with sophisticated skills and weaponized AI, and internally our cyber assets growing rapidly while becoming more difficult to protect. Unfortunately, even though most organizations use traditional architectures with best-of-breed products to build their defenses, the results are often insufficient. As good as best-of-breed products are, they do not integrate well. Breaches happen constantly, ransomware still gets through, and worse the security team is often reactive and has difficulty identifying the root cause of an event, let alone develop a strategy to prevent it from happening again. A closed-loop system is need where security products are integrated directly to better identify new AI-based threats and coordinate response against them.

    Sangfor NGAF is the foundation for building a proactive closed-loop security solution. Sangfor not only offers world-class battle-tested security protection but provides a straightforward way to identify and manage the sprawl of cyber assets, detect account abuse, and discover malicious processes and connections on critical business assets. Preemptively eliminate threats before they do damage.

    Join this session to see how Sangfor NGAF works together with Endpoint Secure, and Platform-X to build a dynamic proactive closed-loop defense against today’s advanced cyberthreats.
  • Avoiding Malware Reinfection - Finding Asymptomatic Infection & Patient Zero Recorded: Jun 1 2021 19 mins
    Zoppo Chen
    In the governance of network security, we can isolate and deal with cyber threats with obvious symptoms, but it is hard for us to find the root cause of asymptomatic threats, so extermination cannot be guaranteed. If you lack the ability to hunt Patient Zero, the weaknesses in that system will always be the entry point for future threats. If you cannot detect an asymptomatic hidden threat, it can spread across the network and gradually open other breaches until your organization suffers the same kind of security incident again and again. According to the IBM 2020 Cost of a Data Breach Report, the average total cost of a data breach reached 3.86M USD, and the average time to identify and contain a breach increased globally from 197 to 280 days. If asymptomatic hidden threats are already inside your network, how do you stop them before they cause damage to your business? How do you avoid reinfection by same virus? Join us and find out how to locate asymptomatic infection and Patient Zero.
  • Sangfor International Roadshow 2021 - Malaysia Recorded: May 31 2021 111 mins
    Sean Wang - Sangfor Country Manager of Malaysia; Guy Rosefelt - Sangfor Security CMO
    We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach. Many organizations had to accelerate digital transformation strategies that were to take 3-5 years to virtually overnight in some cases to maintain business continuity but without the ability to do any real security planning. Remote work means unique operational challenges to provide a seamless experience for remote and local users while meeting the security needs of organizations. It is time to join Sangfor in the year 2021.

    Join Sangfor Technologies on the road, to learn about the most cutting-edge solutions for network security, cloud computing, and network optimization – and see how your organization can achieve truly inspired next-generation security and optimization.
  • [Bahasa] Temukan yang Belum Terdeteksi! Dengan Kecerdasan Artifical Intelligence Recorded: May 31 2021 99 mins
    Guy Rosefelt, Security Business CMO. Victor J. Ferdinandus, Pre-Sales Security.
    [Bahasa] Temukan yang Belum Terdeteksi! Dengan Kecerdasan Artifical Intelligence
  • US Colonial Pipeline attack: Everything you need to know Recorded: May 25 2021 38 mins
    Guy Rosefelt & Allen Lim
    Colonial Pipeline is the largest oil product pipeline operator in the United States, and the recent Ransomware attack forced shutdown of all their operations.

    This cyber attack is just the latest in a long series of serious ransomware and malware attacks, and we can’t help but envision a world in the not-too-distant future where ransomware attacks impact all our daily lives. Ransomware is booming and now targeting all kind of industries, including critical infrastructure, healthcare and government.

    Participate in this webinar to learn more about this recent attack, how it unfolded, its impact and what your organization can do to prevent such cyber-attacks.
  • Sangfor International Roadshow 2021 - Hong Kong Recorded: May 20 2021 62 mins
    Dennis Lau, Cloud Team Lead. Simon Tsang, Deputy Manager HK. Paul Tsang, Security Pre-Sales Lead.
    Sangfor International Roadshow 2021 - Hong Kong took place online on May 20th, 2021.
  • Sangfor International Roadshow 2021 - Philippines Recorded: May 20 2021 135 mins
    William Phuah, Security Planning Manager. Guy Rosefelt, Security Business CMO. Nerwin Pagulayan, Senior Pre-Sales Manager PH.
    Sangfor International Roadshow 2021 - Philippines took place online on May 19, 2021.
  • Trifecta Effect: Identification, Assessment and Enforcement for Asset Management Recorded: May 18 2021 38 mins
    Eugene Yew
    Network security is increasingly challenging with a steadily increasing volume of devices and data traversing networks. Many organisations have no proper incident response plan and inadequate threat identification solutions. Most lack a fully comprehensive, secure internet access solution designed to track user behaviour, notify administrators and remediate any potential risk. Organisations need a more holistic approach to network security, to improve their network visibility, identification, assessment and enforcement of policies and safeguards.
  • Sangfor International Roadshow 2021 - Singapore Recorded: May 13 2021 71 mins
    Raymond Tan - Country Manager of Sangfor Singapore; Liang Soon & Richard Zhao - Presales Manager of Sangfor Singapore
    We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach. Many organizations had to accelerate digital transformation strategies that were to take 3-5 year to virtually overnight in some cases to maintain business continuity but without the ability to do any real security planning. Remote work means unique operational challenges to provide a seamless experience for remote and local users, while meeting the security needs of organizations. It is time to join Sangfor in the year 2021.

    Join Sangfor Technologies on the road, to learn about the most cutting-edge solutions for network security, cloud computing and network optimization – and see how your organization can achieve truly inspired next-generation security and optimization.
Live & On-Demand Webinars Focus on Cyber Security & Cloud Computing.
Sangfor Technologies is a leading vendor of Network Security, Cloud Computing and Infrastructure solutions. Our Webinar Series are designed to educate current & new customers about the Latest Trends in Cyber Security & Cloud Computing. Stay tuned for more information about our upcoming webinars by visiting our website at www.sangfor.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Lessons Learned From Data Breaches to Better Protect Yourself
  • Live at: Jun 15 2021 8:00 am
  • Presented by: Eugene Yew
  • From:
Your email has been sent.
or close