Hi [[ session.user.profile.firstName ]]

Capire e adeguarsi al nuovo regolamento europeo in materia di Data Protection

Il nuovo regolamento europeo in materia di Data Protection (General Data Protection Regulation) introduce nuovi requisiti ed obblighi circa la gestione dei dati personali imponendo livelli di garanzia più elevati.
Il regolamento rafforza l’importanza di sostenere la privacy come diritto fondamentale dell’individuo e porta con sé notevoli aspetti costruttivi per le aziende evitando, ad esempio, crisi reputazionali ed elevando la propria Security Posture complessiva.
Durante il webinar approfondiremo ambiti del regolamento, requisiti, ruoli, responsabilità e benefici.
Recorded Apr 18 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Giampiero Nanni - Government Affairs EMEA, Symantec
Presentation preview: Capire e adeguarsi al nuovo regolamento europeo in materia di Data Protection
  • Channel
  • Channel profile
  • Not All Endpoint Protection Platforms Are Created Equal Sep 12 2017 10:00 am UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Recorded: Aug 18 2017 28 mins
    Michael Mauch
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • Preparing for GDPR: Are identity management and authentication core to GDPR? Recorded: Aug 17 2017 48 mins
    Sian John, Symantec & Enza Iannopollo, Forrester
    You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.

    You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
    Other topics will include:

    •Identifying gaps in your strategy
    •How to prioritise remediation and investments
    •How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Recorded: Aug 17 2017 63 mins
    Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 1 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Defend Your Endpoints Against Ransomware Attacks Recorded: Jul 24 2017 16 mins
    Yvonne Dresser, Senior Manager Product Strategy, Symantec
    Small and medium-sized businesses are not immune to targeted attacks, such as ransomware and zero-day threats, and require a powerful yet simple solution to protect their endpoints against these advanced threats. Watch this short webinar to learn how Symantec Endpoint Protection Cloud (SEP Cloud) protects PC, Mac, and mobile endpoints and servers with its advanced multi-layered threat prevention solution.
  • Comparing Next Generation Firewalls to Proxy Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure.
  • Taking Proxy to the Cloud Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Protecting Sensitive Data in the Cloud Recorded: Jul 21 2017 2 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    In this short video learn how Proxy and DLP enables information security on prem or in the cloud
  • Proxy Essentials Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22 Recorded: Jul 19 2017 58 mins
    Candid Wueest
    Internet Security Threat Report ISTR
    Analyst: Candid Wueest

    Sprache: DEUTSCH


    Hintergrund:
    Die Malware-Angriffe im Finanzwesen waren doppelt so häufig wie Ransomware-Attacken:
    •Die Threat-Landschaft im Finanzwesen stand 2016 ganz im Zeichen dreier Trojaner.
    •Die Finanzabteilungen der Unternehmen rücken zunehmend in den Fokus der Angreifer.

    Wenn Medien aktuell über IT-Security berichten, steht fast immer Ransomware im Mittelpunkt. Andere Threats – etwa die Malware, mit der Cyberkriminelle Einrichtungen des Finanzwesens und deren Endkunden ins Visier nehmen – erhalten dafür so gut wie keine Beachtung. Dabei ist auch diese Bedrohung höchst real und höchst gefährlich, sowohl für die Einrichtungen selbst als auch für die Verbraucher: Wie der Internet Security Threat Report 2017 belegt, sind Angriffe auf Banken und Bankkunden wesentlich häufiger als Ransomware-Attacken. Jedes Jahr werden in diesem Bereich über 1,2 Millionen Threats entdeckt – mehr als doppelt so viele wie bei der Ransomware.

    Melden Sie sich noch heute zu unserem Webcast an:
    Internet Security Threat Report ISTR
    Zur Bedrohungslage im Finanzwesen

    Alle Teilnehmer erhalten eine Executive Summary, die wesentliche Erkenntnisse und Analysen beinhaltet:
    •Gezielte Angriffe auf Banken und Bankkunden
    •Infektionsvektoren, Häufigkeit und Ausbreitung
    •Taktiken, Technologien und Abläufe
    •Angriffe auf Geldautomaten, Point-of-Sale-Systeme und Mobilgeräte


    Melden Sie sich bitte noch heute an!
  • Year in Review: Financial Sector Threat Activity Recorded: Jul 13 2017 59 mins
    Candid Wueest, Threat Researcher, Symantec Security Response
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Integrating threat Isolation with SWG and SMG (4:00pm GMT) Recorded: Jul 11 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Symantec Information Centric Security Recorded: Jul 5 2017 2 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    One of the common problems facing a CIO is knowing where their data is! Symantec’s new Information Centric Security platform combines Symantec’s CASB, encryption, DLP and authentication technologies to track and follow data and impose a security regime on the data wherever it is.
  • Security Analytics Recorded: Jul 5 2017 24 mins
    Andy Shepherd, Senior Systems Engineer, Symantec
    Andy discusses Symantec Security Analytics, using full Packet Capture, and shows you how analysing system logs can help you to pinpoint and identity activity and incidents that require further investigation.
  • Life in the SOC Trenches Recorded: Jul 5 2017 10 mins
    Stefan Sarnblom Senior Principal Specialist Security Engineer & Andy Shepherd, Senior Systems Engineer, Symantec
    Andy and Stefan discuss what the day to day work for an analyst in a SOC looks like with David McClelland - what do they, how do they do it, and what they need to think about to review, analyse, and validate threats.
  • Securing your Workloads in the Cloud Recorded: Jul 5 2017 15 mins
    Steve Broadwell, Senior Systems Engineer, Symantec
    Steve shares his insights on protecting the cloud and demos Symantec Cloud Workload Protection. Moving your move workloads from the datacenter into the cloud and importantly how you protect your workloads in the cloud.
  • Customer Story: Williams Martini Racing Recorded: Jul 5 2017 13 mins
    Clive Finlay, Symantec
    Clive discusses how the Williams Martini Racing team use Symantec technologies to help secure their data across endpoints, the datacenter and in the cloud.
  • Symantec Information Centric Encryption Recorded: Jul 5 2017 18 mins
    Sunil Choudrie, Global Product Marketing Manager, Symantec
    Sunil introduces Information Centric Encryption and shows how Symantec is innovating to help organisations not just protect sensitive data, but also ensure that this protection follows the data wherever it goes, ensuring that only the intended user has access.
  • The Human Nature of Cyber Security Recorded: Jul 5 2017 21 mins
    Dr Jessica Barker, Independent Information Security Consultant
    How to understand the risk and human behavior in an Organisation, while engaging and educating people in cyber security to encourage the behaviours you want.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Capire e adeguarsi al nuovo regolamento europeo in materia di Data Protection
  • Live at: Apr 18 2016 1:00 pm
  • Presented by: Giampiero Nanni - Government Affairs EMEA, Symantec
  • From:
Your email has been sent.
or close