Adobe Acrobat X: Reduce Risk and Protect Documents

Manage webcast
Rick Borstein, Senior Solutions Consultant, Adobe
Control your work and help secure sensitive information. Attend this webinar to hear about best practices for implementing security policies and how Acrobat X and Reader X implement security standards.

In this presentation, you will learn how to:
- Protect information - use Adobe Acrobat Pro X to set permissions, limit access and control user interaction
- Save time and accelerate document workflows with electronic document signatures
- Permanently remove content and metadata from a document to expedite sharing
Jun 28 2012
60 mins
Adobe Acrobat X: Reduce Risk and Protect Documents
Join us for this summit:
  • Channel
  • Channel profile
  • DDOS Attack Classification and Protection Mechanisms Aug 19 2015 4:00 pm UTC 60 mins
    Predrag “Pez” Zivic
    It is very hard to develop signature protection for every single DDOS attack or every single new DDOS probe. All complex DDOS attacks made us all feel like we are chasing our tail. However, the DDOS attacks are conducted using few defined attack vectors. The intent of this presentation and research is to present DDOS attacks classification (together with attack examples). The DDOS attack classification would enable development of protection mechanisms for each type (class) of DDOS attack. This new approach will enable organization to define DDOS attack protection mechanisms with accompanying incident management process which can be very successful.
    This presentation will define categories of DDOS system exhaustion attack vectors with well defined protection mechanisms for each category of DDOS attack.
  • How post-mortems can close the loop on IT metrics Aug 19 2015 3:00 pm UTC 45 mins
    Jason Hand, DevOps evangelist at VictorOps
    In today’s modern infrastructure, it’s imperative to have situational knowledge about what’s going on...the good, the bad, everything. The DevOps movement has taught us that monitoring is a key component of adopting the best practices of highly efficient software delivery teams. These metrics are not only useful as context during incident management but also to analyze once an outage has been resolved.
  • Securing the Financial Services Network and Changing the Game Aug 18 2015 6:00 pm UTC 45 mins
    Araldo Menegon, Global Managing Director, Financial Services, Fortinet
    Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Learn how they provide high-performance protection against cyber-threats by hearing from security experts and key customers.
  • Cross-Site Scripting Crash Course Aug 18 2015 5:00 pm UTC 45 mins
    Kimberly Chung, Training Supervisor, WhiteHat Security
    With attackers gaining traction, we will take a deeper dive into how to defend against cross-site scripting (XSS) attacks. You will learn what the attack looks like and how to defend against them.

    In the webinar, it will cover:

    -HTML tricks for cross-site scripting
    -JavaScript tricks for cross-site scripting
    -Defensive tactics against cross-site scripting
  • Keeping Microsoft Secure Aug 18 2015 5:00 pm UTC 15 mins
    Bret Arsenault, VP and CISO, Microsoft
    Learn how Microsoft puts all the pieces together internally to keep its organization safe. Bret Arsenault, Microsoft Chief Information Security Officer, gives you a complete rundown, from products to policies, and explains how they are implemented to ensure security at Microsoft.
  • Building on the Secure Cloud Aug 13 2015 5:00 pm UTC 15 mins
    Patrick Wirtz, Innovation Manager, The Walsh Group
    Hear how Patrick Wirtz, Innovation Manager at The Walsh Group, has leveraged a secure Cloud environment to streamline IT processes, shift focus to key business priorities, and grow his business.
  • Black Hat Recap – Implications for the Enterprise Aug 12 2015 5:00 pm UTC 60 mins
    Cameron Camp, Security Researcher
    Join Security Researcher, Cameron Camp, as he reviews the latest in cyber security covered at this year's Black Hat Conference.
  • Security Transformation: The Current Evolution and How to Manage It Aug 12 2015 4:00 pm UTC 45 mins
    Justin Somaini, CTO, BOX
    The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years.
  • Why Security Starts with Identity in Today’s Mobile Enterprise Aug 12 2015 3:00 pm UTC 45 mins
    Richard Walters, GM and VP, IAM & Alex Smith, Director, IAM Products, both Intermedia
    With users expecting 24x7 access to web applications and data from all types of mobile devices and from any location, it’s not a surprise that data security is still a key focus for most enterprises. How do you reduce risk by bringing contextual information into the authentication process?

    Join us and learn how to:

    •Address the authentication and authorization management challenges in today’s mobile enterprise

    •Limit access to applications to approved or trusted devices

    •Automate changing of passwords to ensure they are complex and unique across all accounts

    Register now!
  • DNS Firewall: Securing Networks In a Rapidly Changing Landscape Aug 12 2015 2:00 pm UTC 45 mins
    Michael Kaczmarek Sr. Director, Product Management, Verisign
    Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.
  • Going Mobile? The Shifting Native SSO Landscape Aug 12 2015 1:00 pm UTC 45 mins
    Paul Madsen, Principal Technical Architect, Ping Identity
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • The New School of Cyber Defense Aug 12 2015 10:00 am UTC 45 mins
    Frank Mong, Vice President & General Manager of HP Security Solutions
    The old school of cyber defense emphasized securing infrastructure and restricting data flows, but data needs to run freely to power our organizations. The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications, and our data.

    The world has changed, and we must change the way we secure it. Join Frank Mong, VP & General Manager of Security Solutions, and hear why you need to secure your: Cloud services, data (wherever it is), and apps (wherever they run).
  • Top 10 Android Application Vulnerabilities Aug 12 2015 9:00 am UTC 45 mins
    Erez Metula, Founder & CEO of AppSec Labs
    Android apps handle our most sensitive data – private conversations, financial information, phone calls, SMS, geographic locations. You name it… the question is – can we really tell whether they’re secure? Who can assure us they are not spying on us? Can they be abused? Erez will answer those questions, focusing on Android mobile apps and their common vulnerabilities.

    This session will be all about the security of such applications, how they can be hacked, the common mistakes developers do, and how to avoid such mistakes.
  • Twelve Recommendations for Your Security Program in 2015 Aug 11 2015 7:00 pm UTC 45 mins
    Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
    In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • Quantum Random Number on a Smart Phone Aug 11 2015 3:00 pm UTC 45 mins
    Yuri Andersson, Tech Startup Entrepreneur, CryptaLabs
    Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.
  • Best Practices for Securing the Mobile Employee Aug 11 2015 3:00 pm UTC 45 mins
    Himanshu Verma, Director, Authentication-as-a-Service, Gemalto
    Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.
  • Challenges to Stay Secure in the Era of Digital Business Aug 11 2015 2:00 pm UTC 45 mins
    Marcelo Pereira, Product Marketing Manager, Secunia
    The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • The Microsoft Digital Crimes Unit Aug 5 2015 5:00 pm UTC 20 mins
    David Finn, Executive Director, Digital Crimes Unit, Microsoft
    Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world.
  • An Offensive Strategy for Today's Cyber Warzone: Winning With Cyber Campaigns Recorded: Aug 3 2015 63 mins
    Chris Inglis, former Deputy Director of the NSA and Al Corchuelo, President, Recruit Leaders LLC
    In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Adobe Acrobat X: Reduce Risk and Protect Documents
  • Live at: Jun 28 2012 5:00 pm
  • Presented by: Rick Borstein, Senior Solutions Consultant, Adobe
  • From:
Your email has been sent.
or close
You must be logged in to email this