Hi [[ session.user.profile.firstName ]]

GDPR: La salvaguardia della reputazione aziendale

Quando si verifica una violazione, le aree dell’organizzazione che subiscono i danni maggiori, sono la reputazione aziendale, il fatturato e l’abilita` di reiterare i clienti. Per proteggere questi aspetti, occorre avere dei controlli efficaci per prevenire gli incidenti di sicurezza, e un sistema di comunicazione chiaro se – o quando – un incidente si verifica. Il Regolamento Generale per la Protezione dei Dati richiede che le violazioni vengano notificate all’autorità entro 72 ore dalla scoperta: un processo di protezione robusto consente all’azienda di controllare cosa va notificato e a chi, e di mitigare il danno potenziale.
Recorded Jul 14 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Symantec Strategist
Presentation preview: GDPR: La salvaguardia della reputazione aziendale
  • Channel
  • Channel profile
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Jan 9 2019 11:00 am UTC 31 mins
    Hugh Thompson, CTO, Symantec
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Jan 8 2019 1:00 pm UTC 35 mins
    Orla Cox, Director Development Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Preventing Ransomware Infections via Office 365 is New Territory. Now What? Recorded: Dec 12 2018 2 mins
    The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
  • You're concerned with Account Takeover on Office 365. Now What? Recorded: Dec 12 2018 2 mins
    You're Concerned with Account Takeover on O365 Now What? (1 min /52 seconds Video)
  • O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What? Recorded: Dec 12 2018 2 mins
    As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Dec 12 2018 62 mins
    Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.

    With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond Recorded: Dec 11 2018 48 mins
    Kevin Haley, Director Security Response, Symantec
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware
    • Capabilities you need to protect yourself from these threats
    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Delivering Complete Endpoint Security with Symantec Recorded: Dec 11 2018 62 mins
    Robert Arandjelovic, Product Marketing Director ; Gavin Fulton, Endpoint Security Expert
    Today’s threat landscape continues to evolve, with attackers using increasingly stealthy techniques that are difficult for traditional security controls to detect. New point solutions are emerging to stop one specific means of attack, but it’s impossible to deploy them all without incurring significant cost and complexity.

    Join us as we demonstrate how Symantec’s Complete Endpoint Security can enable you to deliver comprehensive endpoint security to your customers – featuring an array of state-of-the-art capabilities like the newly-introduced Deception as well as advanced detection and response – all within a single agent.
  • 2018 – The year in cyber crime Recorded: Dec 10 2018 49 mins
    Orla Cox, Director Security Response, Symantec
    Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

    From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

    Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

    • How targeted attacks are evolving to exploit new technologies like IoT.
    • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
    • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
  • Ask the Experts—Securing Data and Email in Office 365 Recorded: Dec 4 2018 63 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security
    - Understand what Microsoft offers and how Symantec compliments their security offering
    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • What’s new? The Broadest and Deepest Cloud Security for SaaS, PaaS & IaaS Recorded: Nov 29 2018 61 mins
    Deena Thomchick, Senior Director of Cloud Security, Symantec Linda Park, Senior Manager, IaaS Security & Compliance, Symantec
    Organizations are using more cloud services for more business-critical activities. At the same time organizations face growing privacy regulations, a high rate of data loss (accidental exposures and breaches), and ever-increasing attacks on their cloud assets.

    It is challenging to get the visibility and security you need to protect your Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) clouds as cloud security offerings have been both limited in scope and fragmented across point products.

    Let us show you what’s new and how our solutions will give you the most complete visibility, data security, threat protection and compliance management for your public cloud services with integrated cloud security.

    Learn more about our latest innovations in cloud security for SaaS, PaaS, and IaaS

    •.New Integrated Compliance Management for IaaS – the first Cloud Security Posture Management (CSPM) solution integrated with Cloud Access Security Broker (CASB) and Cloud Workload Protection Platform (CWPP) offering detailed compliance remediation.

    •. Fastest Acting Cloud App Security – the first API-based CASB that can remediate security issues in seconds, with new Fast APIs for Microsoft and Box.

    •. Broadest & Deepest Cloud App Coverage – CASB data security and threat protection for any cloud app, including custom apps.

    •. Best DLP and Threat Protection for IaaS Storage – Gartner Magic Quadrant leading Data Loss Prevention (DLP) and threat protection now integrated with Cloud Workload Protection(CWP) and Gartner Magic Quadrant leading CloudSOC CASB.

    Please Join Us, Register Today
  • Symantec Web and Cloud Security - Secure Web Gateway (SWG) Recorded: Nov 28 2018 36 mins
    Dr. Michael Teschner, Michael Straschydlo
    Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
    Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
  • How Secure is Your Hybrid Cloud? Recorded: Nov 27 2018 61 mins
    Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
    Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.

    What is a hybrid cloud and how is it different from securing a traditional data center?

    Why is the development of applications for the cloud different and how does it impact security?

    What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation Recorded: Nov 27 2018 54 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Recorded: Nov 21 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • So löst die ROYAL BANK of CANADA die Anforderungen an die Mobile Secuity Recorded: Nov 8 2018 29 mins
    Michael Mauch, CTO & Analyst Relations
    Dieser Webcast greift in deutscher Sprache den Inhalt auf, der von
    der Royal Bank of Canada mit dem Titel:
    "Ensuring that your Mobile Threat Management
    Platform fits your priorities" veröffentlicht wurde.

    -Im Original:

    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?
    - What is your advice to your peers who are starting their mobile security journey?
    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Get Visibility into AWS, Azure and Google Recorded: Oct 30 2018 2 mins
    How can you keep your cloud environment safe? Symantec Workload Assurance reports on overall security and compliance. Find out more
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Recorded: Oct 25 2018 46 mins
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    •Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    •Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    •How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Safeguarding the Nation’s Critical Infrastructure Recorded: Oct 23 2018 53 mins
    Curtis Barker, Product Portfolio Manager Cloud Security, Symantec
    Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)

    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.

    Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.

    Please Join Us, Register Today
  • Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ? Recorded: Oct 19 2018 27 mins
    Hervé Doreau, Directeur Technique, et Benjamin Ménard, Consultant Avant-Vente
    Les entreprises de toutes tailles doivent faire face aux nouveaux risques liés à l'utilisation grandissante des mobiles et il leur est difficile de définir la meilleure stratégie pour protéger leurs informations sensibles.
    Au travers de cas d'usages concrets, nos experts vous proposent lors de ce webcast d'en savoir plus sur :
    - Pourquoi est-ce si important de sécuriser les appareils mobiles ?
    - Quelles bonnes pratiques de vos pairs pouvez-vous appliquer dans l'adoption d'une stratégie de protection des terminaux ?
    - Quelles sont les fonctionnalités primordiales d'une solution de sécurité des mobiles ?
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR: La salvaguardia della reputazione aziendale
  • Live at: Jul 14 2016 8:00 am
  • Presented by: Giampiero Nanni - Government Affairs EMEA, Symantec & Antonio Forzieri - Symantec Strategist
  • From:
Your email has been sent.
or close