Hi [[ session.user.profile.firstName ]]

A new breed of advanced threats requires a new approach...

As recent high profile reports have shown, advanced threats are high on the security agenda. These complex attacks are defeating traditional defences and organisations need a different approach. Advanced attacks are exploiting people, technology and system vulnerabilities and to defeat this, you need an integrated approach. Point security products are not providing the required visibility: Security needs to evolve.

In this webcast, we discuss using customer examples, the nature of the new advanced threats, how to mitigate the impact of these attack, using advanced intelligence and correlation. And, should the worst happen, how you can be prepared with effective detection and recovery plans.
Recorded Jun 15 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sunil Choudrie, Solution Marketing and Paul Murgatroyd, Solutions Expert - Symantec
Presentation preview: A new breed of advanced threats requires a new approach...
  • Channel
  • Channel profile
  • Not All Endpoint Protection Platforms Are Created Equal Sep 12 2017 10:00 am UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Preparing for GDPR Aug 17 2017 2:00 pm UTC 45 mins
    Identity, Data Protection & Securing the Modern Business

    Almost every successful cyber attack relies on a compromised identity. With cybercrime on the rise and attackers becoming more sophisticated, organizations worldwide need to remain vigilant in protecting their data assets and staying up to date on important regulation. Identity management, authentication and encryption, as well as compliance are essential to securing the modern business. The world's top security experts will discuss how technology, regulation and culture work together to build a robust cybersecurity posture.

    GDPR will be the word on every security professional's mind for the next 12 months; get the lowdown on the steps to take and the considerations to make to be ready for May 2018.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • Introducing Mobile Threat Defense for the Cloud Generation Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22 Recorded: Jul 19 2017 58 mins
    Candid Wueest
    Internet Security Threat Report ISTR
    Analyst: Candid Wueest

    Sprache: DEUTSCH

    Die Malware-Angriffe im Finanzwesen waren doppelt so häufig wie Ransomware-Attacken:
    •Die Threat-Landschaft im Finanzwesen stand 2016 ganz im Zeichen dreier Trojaner.
    •Die Finanzabteilungen der Unternehmen rücken zunehmend in den Fokus der Angreifer.

    Wenn Medien aktuell über IT-Security berichten, steht fast immer Ransomware im Mittelpunkt. Andere Threats – etwa die Malware, mit der Cyberkriminelle Einrichtungen des Finanzwesens und deren Endkunden ins Visier nehmen – erhalten dafür so gut wie keine Beachtung. Dabei ist auch diese Bedrohung höchst real und höchst gefährlich, sowohl für die Einrichtungen selbst als auch für die Verbraucher: Wie der Internet Security Threat Report 2017 belegt, sind Angriffe auf Banken und Bankkunden wesentlich häufiger als Ransomware-Attacken. Jedes Jahr werden in diesem Bereich über 1,2 Millionen Threats entdeckt – mehr als doppelt so viele wie bei der Ransomware.

    Melden Sie sich noch heute zu unserem Webcast an:
    Internet Security Threat Report ISTR
    Zur Bedrohungslage im Finanzwesen

    Alle Teilnehmer erhalten eine Executive Summary, die wesentliche Erkenntnisse und Analysen beinhaltet:
    •Gezielte Angriffe auf Banken und Bankkunden
    •Infektionsvektoren, Häufigkeit und Ausbreitung
    •Taktiken, Technologien und Abläufe
    •Angriffe auf Geldautomaten, Point-of-Sale-Systeme und Mobilgeräte

    Melden Sie sich bitte noch heute an!
  • Year in Review: Financial Sector Threat Activity Recorded: Jul 13 2017 59 mins
    Candid Wueest, Threat Researcher, Symantec Security Response
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Integrating threat Isolation with SWG and SMG (4:00pm GMT) Recorded: Jul 11 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Symantec Information Centric Security Recorded: Jul 5 2017 2 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    One of the common problems facing a CIO is knowing where their data is! Symantec’s new Information Centric Security platform combines Symantec’s CASB, encryption, DLP and authentication technologies to track and follow data and impose a security regime on the data wherever it is.
  • Security Analytics Recorded: Jul 5 2017 24 mins
    Andy Shepherd, Senior Systems Engineer, Symantec
    Andy discusses Symantec Security Analytics, using full Packet Capture, and shows you how analysing system logs can help you to pinpoint and identity activity and incidents that require further investigation.
  • Life in the SOC Trenches Recorded: Jul 5 2017 10 mins
    Stefan Sarnblom Senior Principal Specialist Security Engineer & Andy Shepherd, Senior Systems Engineer, Symantec
    Andy and Stefan discuss what the day to day work for an analyst in a SOC looks like with David McClelland - what do they, how do they do it, and what they need to think about to review, analyse, and validate threats.
  • Securing your Workloads in the Cloud Recorded: Jul 5 2017 15 mins
    Steve Broadwell, Senior Systems Engineer, Symantec
    Steve shares his insights on protecting the cloud and demos Symantec Cloud Workload Protection. Moving your move workloads from the datacenter into the cloud and importantly how you protect your workloads in the cloud.
  • Customer Story: Williams Martini Racing Recorded: Jul 5 2017 13 mins
    Clive Finlay, Symantec
    Clive discusses how the Williams Martini Racing team use Symantec technologies to help secure their data across endpoints, the datacenter and in the cloud.
  • Symantec Information Centric Encryption Recorded: Jul 5 2017 18 mins
    Sunil Choudrie, Global Product Marketing Manager, Symantec
    Sunil introduces Information Centric Encryption and shows how Symantec is innovating to help organisations not just protect sensitive data, but also ensure that this protection follows the data wherever it goes, ensuring that only the intended user has access.
  • The Human Nature of Cyber Security Recorded: Jul 5 2017 21 mins
    Dr Jessica Barker, Independent Information Security Consultant
    How to understand the risk and human behavior in an Organisation, while engaging and educating people in cyber security to encourage the behaviours you want.
  • Re-centering the value of security ((or The Law of Unintended Consequences) Recorded: Jul 5 2017 20 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    As more and more everyday items become connected, the gathering and correlation of their data will change our lives. Whilst enormously exciting, it is time that we started to focus on the question of "Should We?" as well as "Could We?" This session will consider the implications of current innovation in the "Internet of Things (IoT)" and how the security industry will need to evolve to protect us all in the years to come.
  • Malicious Network of Things Recorded: Jul 5 2017 23 mins
    Waylon Grange, Senior Security Researcher, Symantec
    The security of the Internet of Things has long been debated, with researchers showing the vulnerability of virtually any device to hacking. This year, cyber criminals and targeted attacks have regularly used "Things" to infiltrate, exfiltrate, and attack: Metasploit modules for light bulbs and DDoS attacks from web cameras (Mirai) are two examples. This presentation will provide unique insight into professional attack campaigns leveraging the IoT.
  • Systemhärtung: Schutz Ihrer Systeme auch wenn Patch Management keine Option ist! Recorded: Jul 4 2017 53 mins
    Olaf Mischkovsky; Alexander Peters
    Wie der jüngste WannaCry Cyber Angriff gezeigt hat sind nicht gepatchte Systeme ein beliebtes Einfalltor für Schadcode unterschiedlichster Art und ein aktives Patch Management ist unbestritten eine der kritischsten Maßnahmen zum Schutz ihrer IT-Landschaft und sollte somit auf keinen Fall vernachlässigt werden.

    Allerdings gibt es in der Praxis in unterschiedlichsten Umgebungen (Produktion, Embedded Systeme, ältere oder statische Applikationsumgebungen um nur einige wenige zu nennen) valide und vielfältige Gründe warum Systeme nicht auf dem aktuellen Stand gehalten werden können.
    An dieser Stelle gibt es auch immer wieder Schwachstellen für die keine oder zumindest zum Zeitpunkt des Bekanntwerdens noch keine Updates zur Verfügung stehen und wir möchten in diesem Webcast aufzeigen wie mit Hilfe einer aktiven Systemhärtung Ihre System trotzdem geschützt werden können.

    Des Weiteren werden wir Ihn aufzeigen wie mit Hilfe einer solchen Lösung auch aktuelle und gepatchte Systeme auf einen höheres Schutzniveau gebracht werden können.
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Recorded: Jun 30 2017 57 mins
    Heidi Shey (Senior Analyst at Forrester) and Nico Popp (SVP Engineering, Information Protection at Symantec)
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Methoden und Techniken bei gezielten Ransomware Attacken Recorded: Jun 28 2017 62 mins
    Candid Wueest, Andre Engel
    Aktuell werden gezielt Webserver, Cloud Datenbanken und IoT-Geräte durch ein professionelles Vorgehen kompromittiert

    Lernen Sie die technischen Details kennen, wie diese Angreifer vorgehen und wie Sie sich davor schützen können.
    Vor einiger Zeit hat die WannaCry Malware viele Unternehmen daran erinnert, wie verheerend ein erfolgreicher Ransomware Angriff sein kann. Glücklicherweise war WannaCry vergleichsweise einfach konzipiert. Es gibt jedoch wesentlich versiertere Angreifer, welche sich auf gezielte Ransomware Attacken gegen hochsensible Unternehmen-Daten spezialisiert haben.
    Mit APT-ähnlichen Methoden und Techniken werden die relevanten Unternehmensbereiche gezielt kompromittiert und per Lateral-Movement das interne Netz unterwandert. Webserver, Cloud-Datenbanken bis hin zu Industrieanlagen werden so gezielt angegriffen und von hochprofessionellen Erpressern blockiert bis zigtausende von Euros an Lösegeldzahlung geleistet werden. Selbst IoT Geräte wurden bereits „Opfer“ von Ransomware.

    In dem Webcast behandeln wir die Themen:

    •Infektionsvektoren von Ransomware (Email,Web und Exploits)
    •Rückblick WannaCry; Details über die Links zur Lazarus Gruppe und die Programmierfehler
    •TTP der SamSam Gruppe und anderen gezielten Ransomware-Attacken
    •Ransomware auf IoT (Unternehmen mit SmartTV und Mitarbeiter mit SmartWatch)
    •Einblick in den aktuellen Internet Security Threat-Report (ISTR) von Symantec
  • Countdown to GDPR with Symantec Recorded: Jun 22 2017 63 mins
    Keeping a handle on your organisation’s sensitive and personal information is a tough challenge. More data, more technology, more ways to communicate and more remote users. Start your journey to GDPR with the powerful integration of Symantec products and the join our webinar with our panel of experts to really understand how to navigate the technology to ensure your GDPR journey is a smooth one, and one that enhances your cyber and security processes at the same time.

    Now that the General Data Protection Regulation (GDPR) is almost here, you need better visibility over:

    1.Information risk – where it is, who uses it, and how much risk it’s at from breach, loss or misuse
    2.IT risk – so you can see how well protected information is within servers, networks, and the devices that house and transact it
    3.User risk – to know how much risk user behaviour poses to your information, systems, operations and brand reputation

    Join us for the first of our GDPR series, addressing technologies that help organisations determine data risk and protect data, devices, and networks against that risk.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • EDR : une nouvelle approche face aux APT Recorded: Jun 15 2017 39 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Face aux APT de plus en plus intelligentes, quelles sont les méthodes à mettre en place pour minimiser les risques et adopter une stratégie plus efficace d'EDR (Endpoint Protection and Response) ?
    Assistez à ce webcast pour en savoir plus sur :
    - la protection supplémentaire apportée par l'EDR,
    - comment implémenter une solution EDR sans ajouter de complexité,
    - les critères d'évaluation de l'EDR.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A new breed of advanced threats requires a new approach...
  • Live at: Jun 15 2016 10:00 am
  • Presented by: Sunil Choudrie, Solution Marketing and Paul Murgatroyd, Solutions Expert - Symantec
  • From:
Your email has been sent.
or close