Embracing the Cloud – 5 Key Ways to Reduce Risk

Manage webcast
Rafal Los, Chief Security Evangelist, HP Software
As organizations develop their strategy for cloud computing, maximizing business benefit while minimizing risk is key. This talk focuses on the 5 most critical considerations when adopting cloud as a business enabler. As IT complexity grows exponentially with choice, security is often an afterthought that places the business at a disadvantage. Learn the key considerations that can keep your security posture up, your risk down, and business benefit maximized.
Oct 18 2012
48 mins
Embracing the Cloud – 5 Key Ways to Reduce Risk
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5856)
  • Upcoming (125)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Get Results from Your Awareness Activities Using the Security Culture Framework Jul 7 2015 11:00 am UTC 45 mins
    Kai Roer, Founder The Roer Group, Security Culture Coach and Author
    For more than two decades organizations worldwide have failed at creating the security awareness we have aimed for. Instead of continuing doing things we already know are failing to give us the results we need, Mr. Roer and his team set out to analyse what the key elements in successful awareness programs are, and what the major reasons for failure are. The research project was the basis to create the Security Culture Framework, a free and open methodology on organizing successful awareness campaigns that creates lasting cultural change. Today, the framework is being used by a large number of organizations around the world, to build and maintain security culture. In this talk, Mr. Roer will walk you through the four basic principles of the Security Culture Framework, and explain how to be successful when building security culture.
  • Into the breach: Lessons learned from targeted attacks Jul 7 2015 10:00 am UTC 45 mins
    Stuart Davis, Director, Mandiant
    This presentation will highlight lessons learned from many years of responding to targeted attacks by nation state actors and other groups. We will highlight why adversaries continue to successfully compromise their targets at-will, and provide insight to the investigative techniques and security controls that can keep-pace with attacker methodologies. (Hint: there are no silver bullets, and buying more security widgets is not always the answer to these challenges!) We’ll discuss the benefits, and potential pitfalls, of the emerging market for “threat intelligence”. Finally, we'll take the risk of predicting the future and provide some thoughts on how targeted attacks and state-sponsored threats may continue to evolve.

    - Identify frequently-missed blind-spots and operational failures that help attackers persist in a compromise environment
    - Discover how to better utilise existing resources and technologies to reduce the time gaps between successful compromise, detection, and remediation
    - Identify which approaches to remediation have been most successful at driving attackers out of a compromised environment and limiting the likelihood of re-compromise
    - Understand how targeted and state-sponsored attackers are evolving their methodologies in response to increased exposure and analysis
    - Learn practical ways in which threat intelligence can be utilised to detect and respond to attackers
  • SIEM Detection & Response Cases Recorded: Jun 30 2015 32 mins
    Tom Clare, Director, Arctic Wolf
    Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.

    Learn from your peers about the following:
    - Before environment and issues
    - Transition effort, cost and impact
    - After environment and benefits
    - Best practices for managed SIEM
    - Your network and next steps
  • Risk Mitigation Services in Cyber Insurance Underwriting Recorded: Jun 30 2015 57 mins
    Tracie Grella, Advisen; Neeraj Sahni, FINEX; Ira Scharf, BitSight Technologies
    Cyber insurance is becoming an increasingly competitive market. In order to differentiate their offerings, underwriters are beginning to offer unique risk mitigation services to their insureds. But with all the noise in this space, how do risk managers find and choose the policy that is best for them?

    In this webinar hosted by Advisen, Tracie Grella, Global Head of Professional Liability at the world's largest insurer, AIG, Neeraj Sahni, Vice President, FINEX North America—Cyber and Technology Risks at Willis, and Ira Scharf, General Manager of Cyber Insurance at BitSight Technologies, to learn how underwriters, brokers and technology firms are working together to bring risk mitigation services to their clients

    Join this webinar to learn:

    - How cyber coverage has evolved
    - How the insurance market is bringing value related to cyber risks
    - How risk mitigation services lower expected costs and help insurers do a better job of underwriting
    - Why risk mitigation services and cyber insurance create a safer cyber ecosystem
  • DDoS Attacks: More Dangerous to You; Never Easier to Launch Recorded: Jun 30 2015 56 mins
    Christina Richmond, Program Director, IDC and Joe Loveless, Product Marketing, Neustar
    If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:

    · What the DDoS threat environment looks like today
    · Why “smokescreening” is a particular danger
    · Where attacks can have impact across your organization
    · How you can take steps to thwart DDoS threats
  • Modern Data Center High Performance Firewall: The Benefit of Hardware Innovation Recorded: Jun 30 2015 51 mins
    Jose Grandmougin, Fortinet Director of System Engineering
    Enterprise data centers are evolving to deliver higher performance and agility, driven by rapid adoption of mobility/BYOD, big data, cloud and SaaS. At the same time, data center security needs to guard against ever more sophisticated attacks, while keeping up with rapidly increasing bandwidth requirements.

    In this session Jose Grandmougin, Fortinet Director of System Engineering, will focus on the absolute need for high performance, hardware based firewalls in today’s data center and why yesterday’s data center firewalls cannot meet today’s challenges.
  • Panel: Information Security Policy Management for the IOT Recorded: Jun 26 2015 51 mins
    Expert Panel
    Our expert panel will discuss upcoming trends and best practices in infosec policy management for the IOT. The panel will include:

    Jennifer Bisceglie, CEO, Interos Solutions
    Robert Brese, Executive Partner, Gartner
    Ryan Gillis, VP of Cybersecurity and Global Policy, Palo Alto Networks
    Gary Hayslip, CISO, City of San Diego, Co-Chair, CyberTECH
    Paul Rosenzweig, Principal, Red Branch Consulting
  • Next Generation Firewalls Will Change How You Protect Your Organization Recorded: Jun 25 2015 41 mins
    John Kindervag, VP, Principal Analyst, Forrester
    Join Forrester Vice President, Principal Analyst, John Kindervag and Fortinet to learn about how next generation firewalls (NGFW) are changing the way organizations protect themselves. Get a look at the latest research on how IT professionals are using NGFWs to combat today’s threat environment and the requirements for an effective NGFW.
  • Extend enterprise application-level security to your AWS environment Recorded: Jun 25 2015 55 mins
    Chris Grove, Director of Solution Architecture, Imperva; Matt Yanchyshyn, Sr, Mgr of Solutions Architecture, AWS
    It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves.

    This webinar will:
    · Discuss inherent AWS security capabilities

    · Review attack types that target the applications and why traditional security approaches can’t stop them

    · Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud
  • “Triple-A” Security Approach to Network Security - Empowering Your Business Recorded: Jun 25 2015 37 mins
    Florian Malecki, International Director of Product Marketing
    Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. But, in the technology world, how can a chief information officer or IT decision maker rate the efficiency of an IT security implementation?

    A comprehensive security approach should encompass three factors. It should be adaptive to threats, business requirements and the ever-evolving use of the internet within the corporate network, have adapted to meet the specific requirements of an organization and have been adopted fully by end users.

    These factors can be summarized as a “Triple-A” security approach. If you achieve this, you can strengthen your overall security posture.

    Attend our webcast to see how your organization can have the best security possible, and use IT security to drive innovation – instead of blocking it.
  • Today's Mobile Threat Landscape Recorded: Jun 25 2015 33 mins
    Tyler Moffitt and Cameron Palan, Senior Threat Research Analysts at Webroot
    With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
  • Everything you need to know about Windows 2003 End of Support Recorded: Jun 25 2015 54 mins
    Sebastian Goodwin, Director of Product Marketing, Palo Alto Networks
    Microsoft has announced Windows Server 2003 End of Support (EOS) on July 14, 2015. Many businesses will be forced by circumstances to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In addition to various logistical issues, an out-of-support component is vulnerable to attack and may leave the business vulnerable to significant security and compliance risks.

    Learn how you can use Advanced Endpoint Protection as a compensating control, so that businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.
  • How Splunk + Digital Guardian Protect Data from Advanced Threats Recorded: Jun 25 2015 41 mins
    Tony Themelis, VP Product Strategy, Digital Guardian
    Attacks may be inevitable, but with Digital Guardian loss of sensitive data is not.

    This webinar will explore several customer use cases and show how Security Analysts and Incident Responders can harness the power of Splunk® Enterprise search across Digital Guardian event data to:

    - Detect threats
    - Prioritize threats
    - Respond to threats

    Examples include insider attacks and APTs, and will show how Digital Guardian data can provide valuable context for correlation with threat data from other security solutions in Splunk.
  • Cyber Security: The Millennium's Hot Career Recorded: Jun 24 2015 55 mins
    Christopher Simpson, National University
    Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
  • Protect Privileged Accounts with SIEM Recorded: Jun 24 2015 38 mins
    Troy Lehman, Technical Strategist, SolarWinds
    Both insider and external threats will attempt to exploit highly privileged administrative accounts to perform unauthorized tasks that could lead to data theft or sabotage. In this session we will demonstrate how a SIEM can enable organizations to adopt best practices for managing privileged user activity such as:

    Least Privilege
    Separation of Duties
    Audit Privileged Sessions
    Forbid All Access Accounts
    Real Time Response to Suspicious Privilege Escalation
  • An Inside Look at a Sophisticated, Multi-vector DDoS Attack Recorded: Jun 24 2015 45 mins
    Orion Cassetto, Director Product Marketing, Imperva Incapsula
    This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent trends from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault.This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.
  • Understanding - and Stopping - Data Breaches Recorded: Jun 24 2015 62 mins
    Ben Butler, John Suit
    Over a billion records were leaked last year in online cyberattacks. While the specifics of each breach vary, in-depth analysis of successful attacks reveals a common thread – the compromise of privileged users and the thousands of accounts and credentials they rely on to manage increasingly complex hybrid enterprises. In this webcast, we’ll examine several of the highest profile breaches of the last few years, reveal the steps attackers took to gain access – and how cybersecurity teams can leverage privileged identity management to defend their environment and stop breaches.

    Join us to learn:

    -Who are privileged users?
    -How attackers exploit and compromise privileged users to gain access to sensitive systems and data
    -How to prevent attacks from succeeding through privileged identity management

    Our Panelists:

    - Ben Butler, Vice President of Business Development and Solutions Architecture, Rean Cloud
    - John Suit, Chief Technology Officer, Xceedium
  • Move up to 802.11ac wireless. Just remember to keep it secure Recorded: Jun 23 2015 62 mins
    Scott Grebe, Product Marketing Manager, Wireless Security
    High-speed 802.11ac wireless has arrived, with up to 3X the speed of older standards. And while high-speed WiFi is vital to the productivity and success of today’s organizations, you need make sure it is secure against emerging threats.

    Attend this webcast to learn:
    • The benefits of the 802.11ac wireless standard
    • Why your wireless network security needs to be as strong as your wired network
    • What you need to consider when choosing a wireless security solution
  • A Payment Breach Prevention Plan Recorded: Jun 23 2015 59 mins
    Dr Branden Williams; Stuart Hince, HP Security Voltage; Chris Merritt, Lumension; Merritt Maxim, Forrester
    The total number of fraudulent payment card transactions has grown every year since 2006, and experts are calling 2014 "the year of the breach." The Ponemon Institute found that each breach cost the average retailer $8.6 million in related expenses, and the price tag connected with a data breach increased across the board, reaching $20.8 million for financial service firms, $14.5 million for technology companies and $12.7 for communications providers.

    With attacks continually on the rise, it's more important than ever that merchants protect themselves from the potentially huge financial losses and damages to their brand and customer loyalty associated with a data breach. Join this educational session to gain insights and some key steps to prevent payment card breaches across your organization.
  • Five Things Every CISO Should Know About Metadata Recorded: Jun 23 2015 31 mins
    Joon Choi, Vice President Product Management and Marketing and Rob W. Lundy, Director of Marketing
    Organizations today face a security awareness shortfall despite being awash in more data than ever before. The question, as always, is how to get actionable information without adding even more noise.

    In this presentation we look at the most efficient and reliable source of information available to network analysts - network metadata.  We will provide an overview of metadata, discuss its pros and cons versus full packet capture and log data, and finally provide examples of how network metadata can provide security insights relevant to APT. Attendees will walk away with a better understanding of the technical and financial tradeoffs related to this information source and will
    be better equipped to make business decisions going forward.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Embracing the Cloud – 5 Key Ways to Reduce Risk
  • Live at: Oct 18 2012 4:00 pm
  • Presented by: Rafal Los, Chief Security Evangelist, HP Software
  • From:
Your email has been sent.
or close
You must be logged in to email this