Hi [[ session.user.profile.firstName ]]

Como entender y adaptarse al nuevo reglamento EU para la protección de datos

La nueva legislación aplicada dentro del Reglamento General de Protección de Datos de la UE hara necesarios nuevos requisitos sobre cómo se procesa la información dentro de su negocio , quine es responsable, y lo que sucede si se pierde dicha información, incluyendo duras penas para las organizaciones que no cumplan con el reglamento.

Regístrese en nuestro webinar para comprender:

1. The scope of the EU GDPR regulations, and some history of how we got here El alcance de las regulaciones del RGPD de la UE y un poco de historia de cómo llegamos aquí
2. Los roles y responsabilidades para las empresas e individuos sobre el RGPD
3. ¿Qué es el RGPD y como afectará a su empresa y a sus clientes?
Recorded Apr 20 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Giampiero Nanni - Government Affairs EMEA, Symantec
Presentation preview: Como entender y adaptarse al nuevo reglamento EU para la protección de datos
  • Channel
  • Channel profile
  • EDR : une nouvelle approche face aux APT Jun 15 2017 9:00 am UTC 60 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Face aux APT de plus en plus intelligentes, quelles sont les méthodes à mettre en place pour minimiser les risques et adopter une stratégie plus efficace d'EDR (Endpoint Protection and Response) ?
    Assistez à ce webcast pour en savoir plus sur :
    - la protection supplémentaire apportée par l'EDR,
    - comment implémenter une solution EDR sans ajouter de complexité,
    - les critères d'évaluation de l'EDR.
  • A Step-By-Step Approach for Endpoint Detection & Response Jun 14 2017 10:00 am UTC 75 mins
    Scott Hardie & Gavin Fulton
    No question: Advanced Persistent Threats (APTs) are getting smarter. New question: what steps can you take to minimize the risks and create a more effective Endpoint Detection and Response (EDR) strategy?

    Register for our webinar series and learn a step–by–step method for eradicating endpoint threats. You’ll discover:
    •How EDR protects endpoints.
    •How to implement EDR without an extra agent.
    •Evaluation criteria for EDR solutions.
    Watch the webcast, then see our demo.
  • Block The Risk Of Ransomware Recorded: May 18 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection
  • Securing Financial Services: Authentication, Encryption & Data Protection Recorded: May 17 2017 62 mins
    Symantec
    Financial institutions are the number one target for cyber criminals. So you need industry-leading information security to make sure you’re protected.

    This webinar explores how authentication and encryption are leading the way in advanced data protection. You’ll hear the industry’s leading thinkers discuss topics like preventing ransomware and guarding against cyber attacks.

    And with the risk of GDPR penalties getting closer, you’ll hear about how best practice data governance and compliance can help you avoid heavy fines.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The Power of the Proxy Recorded: May 10 2017 17 mins
    Timothy Chiu is a Senior Director of Product Marketing for Symantec
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • A New Dawn of Data Privacy Recorded: May 10 2017 3 mins
    Symantec
    Everything changes in 2018

    Is your organisation ready for the GDPR implementation in 2018? Our GDPR video perspective sets out the task ahead.
  • The 2017 ISTR: A Review Of The Threat Landscape Recorded: May 4 2017 59 mins
    Orla Cox, Director Development
    Cyber criminals are exploiting a new trend in 2017: it's easier to trick your users than to exploit software. Get the latest Internet Security and Threat Report (ISTR), volume 22 and learn why subversion is now a bold new tactic.

    Get the facts in this highly respected research report and learn why:
    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    •One in 131 emails contained a malicious link or attachment – highest rate in five years
    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom
    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000
  • Cyber Attack Trends 2017 Recorded: Apr 27 2017 57 mins
    Thomas Hemker, Candid Wueest
    Cyber Attack Trends 2017
  • Easy Ways To Improve Your Security Posture Recorded: Apr 27 2017 36 mins
    Kirk Gibbons System Engineer, Symantec and Q&A with Gavin Fulton & Sunil Choudrie
    Imagine if you could respond to vulnerabilities, in real-time, and prevent the spread of infection through your network. It’s possible—if your network and endpoints are fully integrated.

    •Do you know what makes it possible for Symantec to instantly deploy protection and detection improvements at the endpoints?
    •Ever learn how new REST APIs effectively orchestrate automated, rapid response at the endpoint?
    •Are you aware of what new advancements are on the horizon to prevent new, unknown threats?

    Learn how Symantec Endpoint Protection 14 and Secure Web Gateway work together to detect, protect and provide rapid response to known and, most importantly, unknown threats.
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • Block The Risk Of Ransomware Recorded: Mar 30 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Mar 9 2017 44 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Comment protéger et surveiller vos données sensibles en tous lieux Recorded: Feb 24 2017 44 mins
    Hervé Doreau, Directeur Technique - Symantec France
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Cyberangriffe verhindern - sensible Daten schützen Recorded: Feb 23 2017 59 mins
    Thomas Hemker, Matthias Senft
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Recorded: Feb 23 2017 55 mins
    Sunil Choudrie
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Protection next-gen des terminaux et machine learning Recorded: Feb 22 2017 42 mins
    Herve Doreau, Directeur Technique - Symantec France
    Sur le marché de la sécurité des terminaux et des antivirus, pas moins de 37 nouveaux produits ont fait leur apparition au cours des 5 dernières années et chacun affirmait répondre à l’évolution des menaces. Mais peut-on vraiment s’y fier ?
    Découvrez la nouvelle technologie de machine learning, comment cela fonctionne et ce à quoi vous devez l’associer pour vous protéger sur chaque point d’attaque.

    Principaux thèmes abordés :

    • Quel est l’état de l'art des technologies de protection des terminaux

    • Pourquoi le machine learning ne suffit pas

    • Comment réduire le nombre d’agents sur les terminaux
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Recorded: Feb 22 2017 61 mins
    Robert Arandjelovic & Jose Carlos Cerezo
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
  • Die aktuelle Lage beim Endgeräteschutz - wie maschinelles Lernen Angriffe stoppt Recorded: Feb 22 2017 64 mins
    Sven von Kreyfeld & Thomas Hemker
    In der Welt von Endgerätesicherheit und Virenschutz sind in den letzten fünf Jahren sage und schreibe 37 neue Endpoint Security-Produkte auf den Markt gekommen, von denen jedes von sich behauptet, die Herausforderungen der sich wandelnden Sicherheitslandschaft anzugehen. Doch ist das alles nur Hype?

    Erfahren Sie mehr über maschinelles Lernen – was es ist, wie es funktioniert und was Sie sonst noch benötigen, um sich an allen Angriffspunkten schützen zu können.

    Wichtigste Lernziele:

    • Wie die aktuelle Lage in der Branche im Hinblick auf Endpoint Protection-Technologie ist

    • Warum maschinelles Lernen nicht ausreichend ist

    • Entdecken Sie, wie Sie die Anzahl der auf Endgeräten installierten Agenten reduzieren können – mit einem leistungsstarken, ressourcenschonenden Agenten, der Advanced Machine Learning, Exploit-Schutz, Anti-Malware und weitere Funktionen umfasst.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Como entender y adaptarse al nuevo reglamento EU para la protección de datos
  • Live at: Apr 20 2016 9:00 am
  • Presented by: Giampiero Nanni - Government Affairs EMEA, Symantec
  • From:
Your email has been sent.
or close