Hi [[ session.user.profile.firstName ]]

Internet Threats Rising! How do you drive your security program with confidence?

Did you know a New Zero-Day vulnerability is discovered each week? This is twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities!

A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track.

Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 21st edition and invite you to join this webcast to develop company-wide security culture and the best ways to mitigate your most pressing risks; driving your security program.

Our webcast agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security

If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
Recorded May 11 2016 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Haider Pasha - Director, Security Strategy
Presentation preview: Internet Threats Rising! How do you drive your security program with confidence?
  • Channel
  • Channel profile
  • GDPR : plus que 2 mois Mar 16 2018 10:00 am UTC 60 mins
    Symantec
    Il ne vous reste que quelques mois avant l’entrée en vigueur du GDPR. Que pouvez-vous faire dès aujourd’hui pour mieux vous y préparer ? Animé par Laurent Heslault, Directeur des Stratégies de Sécurité, et Hervé Doreau, Directeur Technique, ce webcast a pour but de vous aider à évaluer votre degré de préparation et vous indiquer les mesures à prendre avant la date butoir du mois de mai.
  • Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR Feb 23 2018 2:00 pm UTC 60 mins
    Giampiero Nanni
    Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo
    momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 gior ni al GDPR” è
    ricco di suggerimenti e consigli essenziali.

    A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti
    da attuare prima della scadenza di maggio.

    Non affidarti al caso: registrati ora.

    Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR
    Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al
    GDPR.

    Completa la valutazione >>
    REGISTRATI SUBITO
  • Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung Feb 23 2018 12:00 pm UTC 60 mins
    Symantec
    Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung

    Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
    ‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.

    Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.

    Gehen Sie kein Risiko ein – melden Sie sich noch heute an.

    Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
    absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.

    Zum Assessment

    JETZT ANMELDEN
  • El tiempo corre: haga algo ahora mismo para hacer frente al RGPD Feb 23 2018 10:00 am UTC 60 mins
    Ramses Gallego, Strategist Symantec
    Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer
    desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días
    para el RGPD» incluye numerosos consejos y técnicas al respecto.

    Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará
    a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la
    fecha límite de mayo.

    No se la juegue e inscríbase ahora mismo.

    Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG
    preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.

    Realice la evaluación
    INSCRÍBASE YA
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey Feb 22 2018 3:00 pm UTC 45 mins
    Robert Arandjelovic and Sunil Choudrie, Symantec
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
  • Wie weit sind Sie bei der Umsetzung der DSGVO-Anforderungen? Feb 1 2018 9:00 am UTC 60 mins
    Alexander Peters
    Sicherheit & Datenschutz ist Chefsache!
    Wie weit sind Sie bei der Umsetzung der DSGVO-Anforderungen?


    Trotz der Informationsflut zum Thema EU Datenschutz-Grundverordnung und dem neuen Bundesdatenschutzgesetz -die am 25. Mai 2018 in Kraft treten- befinden sich viele Unternehmen weit hinter dem Zeitplan und meinen, dass sich nicht viel ändern wird. Das ist leider eine falsche Wahrnehmung.

    Bei der Digitalisierung Ihres Unternehmens geht es vor Allem um das Vertrauen Ihrer Kunden und Geschäftspartner – daher halten viele die neuen, hohen Geldstrafen für Versäumnisse im Datenschutz für durchaus angemessen. Wir zeigen Ihnen, in dem Webcast, wie sie in 10 Schritten sicherstellen, dass Sie die den neuen Anforderungen gerecht werden und welche Symantec Technologien Ihnen hierbei helfen können.

    Weitere Informationen zum Thema DSGVO: HIER öffnen
    https://www.symantec.com/de/de/campaigns/data-privacy


    Die Inhalte des Webcast:
    1.Übersicht der Rechtslage; Kernthemen der EU DSGVO; Mythen & wichtige Termine
    2.die wichtigsten Schritte zur Anpassung an die neuen Anforderungen
    3.Übersicht über die Möglichkeiten von Symantec, Sie zu unterstützen:
    •DSGVO-spezifisches Risiko-Assessment mittels Control Compliance Suite (CCS)
    •Erkennen, welche Daten sie wirklich besitzen, wo sie gespeichert sind, wer darauf zugreift und wie sie genutzt werden können
    •akkurat einschätzen, wo Datendiebstahl und Datenmissbrauch drohen
    •mittels Data Loss Prevention, komplexe, sensible Daten in strukturierten und unstrukturierten Umgebungen schützen
    •lückenlose Transparenz über Ihre Schatten-IT
    Bewertung Ihrer Schutz-Technologien: Sind diese auf dem Stand der Technik?
  • Erfolgreich – und sicher – auf Office 365 migrieren Jan 30 2018 9:00 am UTC 60 mins
    Alexander Peters
    Eine Migration auf Office 365 in der Cloud macht durchaus Sinn.
    Die Verantwortung für die Sicherheit lässt sich jedoch nicht auslagern.
    Leider sind vorhandene „Bordmitteln“ nicht ausreichend, um Sicherheitsmaßnahmen umsetzen zu können.

    Im Webcast werden wir Ihnen aufzeigen, wie Sie die Kontrolle über ihre Daten bewahren und -mittels einer Security-Checkliste für die Office 365 Migration- schrittweise vorgehen können.

    Weitere Informationen zum Thema Office 365: HIER öffnen
    https://www.symantec.com/solutions/office365

    Im Webcast gehen wir speziell auf folgende Office 365 Themen ein:

    -Einsatz des Symantec Cloud-SOC (CASB) zum Schutz von Cloud-Daten und -Anwendungen
    -automatisierter Schutz von Daten durch Data Loss Prevention und Information Centric Encryption
    -erweiterte Sicherheit beim Zugriff auf Office 365
    -verbesserter Schutz vor Advanced Threats und CEO Fraud via E-Mail
    -Optimierung der Nutzung von Office 365 via Proxy Dienste

    LIVE WEBCAST: 30.01.2018, 10:00 Uhr
    -im Anschluß: „on Demand“ verfügbar
  • Secrets Revealed: Effective Protection Against Ransomware Recorded: Jan 18 2018 62 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Recorded: Jan 18 2018 63 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • Frost & Sullivan Names Skycure (Now SEP Mobile) Company of the Year Recorded: Dec 21 2017 3 mins
    Jared Carleton, Principal Consultant Digital Transformation Practice, Frost & Sullivan
    Learn why Skycure (now part of Symantec) has been selected by Frost & Sullivan as their Global Company of the Year for Mobile Enterprise Security.
  • How RNDC Mitigated Malicious Activity on 5000 Mobile Devices Recorded: Dec 19 2017 5 mins
    John Dickson, Director of IT Infrastructure and Cybersecurity, RNDC
    Interested to see how one of the largest companies you have probably never heard of, mitigated malicious activity on 5,000 devices simply by installing Symantec Endpoint Protection Mobile (formerly Skycure)?

    View this video to learn why RNDC, the 2nd largest distributor of premium wine and spirits in the US, chose SEP Mobile to:

    - Secure any mobile device on any network anywhere in the world

    - Protect mobile workforce against known and unknown threats

    - Deploy mobile threat defense quickly and easily on thousands of devices

    View Now
  • How Aetna Mitigated 400 Malware Infections on Mobile Devices Recorded: Dec 19 2017 4 mins
    Brian Heemsoth, Director of Mobile Security, Aetna
    If you are looking for ways to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities, then you may relate to the challenges that Aetna was facing with their mobile workforce.

    Watch this short video to see how Aetna is now protecting itself against a wide variety of mobile threats.

    Learn how Symantec Endpoint Protection Mobile (formerly Skycure) helped Aetna to:

    - Assess 28 million networks and automatically protect devices from 250 risky networks that were found

    - Assess 3.4 million applications and mitigate 400 of them with high-risk malware

    - Receive enthusiastic feedback from end users

    View Now
  • Tools for Evaluating a Mobile Threat Defense Solution Recorded: Dec 18 2017 44 mins
    Mic McCully, Senior Solutions Consultant, Symantec
    Are you evaluating Mobile Threat Defense solutions?

    This webinar will give you tools and information to make your evaluation process easier and ensure your success.

    View this webinar to learn about:

    - RFP best practices and success criteria

    - What to look for during a trial

    - Questions to ask during a reference call

    View Today
  • CISO Panel: Managing and Mitigating Mobile Device Risk Recorded: Dec 18 2017 57 mins
    David Fairman CISO, Royal Bank of Canada, Ed Amoroso CEO, TAG Cyber and Yair Amit VP, Modern OS Security, Symantec
    The widespread use of smartphones and tablets has changed the risk model for many organizations that now enable workers to access corporate information on the go.

    View this dynamic webinar to learn how you can manage your mobile security risk by drawing on the expertise of the security industry leaders pictured above.

    Topics of discussion include:

    What are the biggest challenges that enterprises face today when it comes to mobile devices?

    What are some of the current approaches enterprises are taking to secure mobile devices? What are the pros and cons?

    How do you measure and report on mobile security risk?

    What is CISO's role when it comes to risk management and how it has evolved?

    View Today
  • SANS Research: A Holistic Approach to Securing Mobile Data and Devices Recorded: Dec 18 2017 63 mins
    Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, Symantec
    The ubiquitous use of mobile devices has radically changed the landscape of data protection, and the abundance of applications only complicates the situation.

    How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.

    View this on-demand webinar to learn:

    - What role security tools such as analytics can play in managing mobile devices

    - How mobile devices and data are currently protected and how effective those protections are

    - Common attack vectors and possible mitigation strategies

    - Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility

    View Today
  • Three Secrets to Becoming a Mobile Security Super Hero Recorded: Dec 18 2017 66 mins
    John Dickson, Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC)
    How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

    Learn how to become the mobile security superhero at your company by following these 3 steps:

    - Prove to your management that mobile security threats are real by showing real examples

    - Review the SANS Institute checklist to help choose the right mobile threat defense solution

    - Provide monthly reports to management to increase visibility and prove that the organization is secure

    View this recorded webinar to hear from a real mobile security superhero, John Dickson, who details his own hero journey as Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC), the second largest beverage alcohol distributer in the U.S.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà Recorded: Dec 15 2017 56 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • Votre proxy gagne en agilité grâce à l’isolation web Recorded: Dec 15 2017 27 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Your Proxy Just Got Smarter with Web Isolation Recorded: Dec 14 2017 33 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Defense Against a Ransomware Attack: Latest Research and Best Practices Recorded: Dec 12 2017 61 mins
    Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Internet Threats Rising! How do you drive your security program with confidence?
  • Live at: May 11 2016 10:00 am
  • Presented by: Haider Pasha - Director, Security Strategy
  • From:
Your email has been sent.
or close