Hi [[ session.user.profile.firstName ]]

GDPR: Proteja la reputación de la empresa

Cuando se produce una vulneración, las áreas de la organización que sufren el daño más importante, son la reputación de la empresa, los ingresos y el discurrir del negocio. Para proteger estos aspectos, es necesario disponer de controles eficaces que puedan prevenir incidentes de seguridad, y un sistema de comunicación claro si - o cuando - se produce un incidente. El Reglamento General para la Protección de Datos requiere que las infracciones se comuniquen a la autoridad dentro de las 72 horas del descubrimiento : un proceso de protección permite a la empresa controlar lo que debe notificarse , a quién, y mitigar el potencial daño.
Recorded Jul 15 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Giampiero Nanni - Government Affairs EMEA, Symantec & Ramsés Gallego - Symantec Strategist
Presentation preview: GDPR: Proteja la reputación de la empresa
  • Channel
  • Channel profile
  • SEP Cloud Powerful, yet simple to use Mar 25 2019 10:00 am UTC 5 mins
    Symantec
    Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
    endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity Recorded: Mar 22 2019 30 mins
    Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc.
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
  • Cyber Security Brief: Japan to hack IoT devices, Facetime bug, and BEC scams Recorded: Mar 22 2019 25 mins
    Cyber Security Brief Podcast
    We discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.
  • Cyber Security Brief: Ukrainians indicted, Tesla hacks, and crypto breach Recorded: Mar 21 2019 24 mins
    Cyber Security Brief Podcast
    We discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage.
  • Cyber Security Brief: DE data leak, dodgy IoT devices, and PewDiePie hackers Recorded: Mar 20 2019 22 mins
    Cyber Security Brief Podcast
    We discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.
  • Cyber Security Brief: The Top 5 Cyber Security Stories of 2018 Recorded: Mar 19 2019 24 mins
    Cyber Security Brief Podcast
    We take a look back at the year that has gone by in cyber security, and count down the top 5 biggest cyber security stories of 2018. Listen to find out what we thought they were!
  • Die neue Threat-Landschaft – Internet Security Threat Report (ISTR) 2019 Recorded: Mar 19 2019 63 mins
    Candid Wüest (Sr. Threat Researcher at Symantec); Thomas Hemker (CISSP, CISM, CISA)
    Die Angriffe mit Ransomware gehen erstmals leicht zurück. Neue Angriffsformen schließen die Lücke. Angreifer tarnen ihre Attacken gegen Unternehmen zunehmend raffiniert, um unentdeckt zu bleiben. Sprechen Sie mit uns über diese und viele weitere Trends:

    •2018 war das Jahr des Formjackings, während Cryptojacking und Ransomware nachlassen. Gezielte Angriffe mit Ransomware sind für Unternehmen aber nach wie vor ein Problem.
    •Supply-Chain-Attacken und das Ausnutzen bekannter Schwachstellen sind auch 2018 auf dem Vormarsch.
    •Cloud-Anwendern droht von vielen Seiten Gefahr, etwa in Form von Datenverlusten durch ungesicherten Cloud-Storage oder über Schwachstellen der eingesetzten Chip-Hardware.
    •Die Zahl gezielter Angriffe auf Produktivsysteme in der Industrie steigt; viele Hacker-Gruppen setzten bei ihren Angriffen auf zerstörerische Malware.
    Jetzt anmelden
  • Secure Web y Cloud Gateway Recorded: Mar 15 2019 30 mins
    Ramses Gallego, Symantec Strategist
    Seguridad y Protección frente a amenazas para la Empresa
    Para los negocios, Internet es tanto esencial como peligrosa. En tiempos en los que los empleados utilizan cada vez más dispositivos móviles y más procesos se mueven a la nube, la dependencia -y el peligro- en Internet no va hacer más que aumentar. Se precisa visibilidad de todo el tráfico Internet para que se pueda proteger a las organizaciones y empleados de todas las amenazas que el modelo introduce.

    Secure web gateways (SWGs) aportan visibilidad y control necesarios para mitigar los riesgos de Internet. El punto de partida es donde los cortafuegos de próxima generación (NGFWs, Next-Generation Firewalls) acaban, aportando terminación sobre la capa 7 e inspección profunda del tráfico web (puertos 80 y 443) necesaria para descubrir y poder proteger de las constantes y sofisticadas amenazas para su negocio.

    En este webinar aprenderá cómo una arquitectura basada en proxy proporciona seguridad unificada y protección frente a amenazas para una entidad en esta época de usuarios remotos, oficinas móviles, aplicaciones en la nube, dispositivos móviles, etc.

    ● Una arquitectura basada en proxy es ESENCIAL para cubrir las necesidades de la Generación Cloud.
    ● Symantec BC Proxy SG es la mejor defensa de seguridad.
    ● Symantec Proxy SG mejora sustancialmente la protección frente a amenazas a la vez que reduce los costes de otra infraestructura de seguridad.
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Recorded: Mar 12 2019 31 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • The Future of Cloud: 2020 and Beyond Recorded: Mar 12 2019 45 mins
    Alex Hilton, Cloud Industry Forum | Sean Roberts, Ensono | Sunil Choudrie, Symantec | Andy Hardy, Nasuni
    Knowing how to remain agile, secure and scalable in today's ever-changing IT landscape is more important than ever. Tune in with experts live from the ExcEL, London, to discuss the latest trends, technologies and advancements in Cloud Computing, to 2020 and beyond.

    Topics will include:
    - DevOps: how-to's and why it's a must
    - Next-gen cloud security and data protection
    - Cloud and blockchain in the enterprise and what it means for your organization
    - Data Centers on-prem vs. in the cloud
    - AI and Cloud: is your infrastructure AI-ready?

    This live panel will be streamed directly from London. Join us from the comfort of your desk and get all your cloud questions answered!

    Moderator: Alex Hilton, CEO, Cloud Industry Forum
    Panelists: Sean Roberts, GM - Public Cloud Center of Excellence, Ensono
    Sunil Choudrie, Senior Product Marketing, Symantec
    Andy Hardy, VP EMEA, Nasuni
  • Cloud and Container Security in the Enterprise Recorded: Mar 12 2019 41 mins
    Simon Ratcliffe, Cloud Industry Forum | Pablo Martinez, Symantec | Mark Kropf, Pivotal
    When it comes to containers, security can often be an afterthought. As technologies become more advanced and workloads become more automated, so too does the threat of breaches and cyber threats. Join this live panel to discuss trends and best practices around cloud and container security.

    Topics include:
    - Securing your container orchestration (Kubernetes, Docker Swarm, etc.)
    - How to put security at the forefront of your cloud native journey
    - Where the biggest risks lie in containerized applications

    Discussion moderated by:
    Simon Ratcliffe, Cloud Industry Forum

    Confirmed panelists:
    Pablo Martinez, Cloud Security and Compliance Specialist, Symantec
    Mark Kropf, CTO, Financial Services, Pivotal
    Further panelist to be announced
  • Preventing Hackers with Single Agent Endpoint Security Recorded: Mar 8 2019 60 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • How to Prevent Data Exposure Recorded: Mar 6 2019 2 mins
    Symantec
    As businesses move to cloud services, such as Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, this leads to confidential data being at a greater risk of falling into the wrong hands.

    Learn how to prevent data exposure with Symantec.

    Viewers will be able to learn more about:
    - Ensuring the Security of Every User Account
    - Monitoring Users Actions
    - Integrating with DLP Cloud Service
  • Security in a Global Organisation – The Aetna Case Study Recorded: Mar 6 2019 4 mins
    Symantec
    Find out how Aetna, one of the largest global healthcare providers, connects, communicates and collaborates globally whilst keeping a secure perimeter.
  • Mobile Security in the Modern Workplace Recorded: Mar 6 2019 5 mins
    John Dickson, Director of IT Infrastructure and Cybersecurity, RNDC
    Find out how RNDC, the 2nd largest distributor of premium wine and spirits in the US, mitigated malicious activity on 5,000 devices simply by installing Symantec Endpoint Protection Mobile (formerly Skycure).

    John Dickson, Director of IT Infrastructure and Cybersecurity, RNDC will discuss why they chose SEP Mobile to:

    - Secure any mobile device on any network anywhere in the world
    - Protect mobile workforce against known and unknown threats
    - Deploy mobile threat defense quickly and easily on thousands of devices
  • How to Protect Your Data from Mobile Attacks Recorded: Mar 6 2019 5 mins
    Symantec
    "Mobile attacks are becoming increasingly common and new threats popping up every day. It’s important to ensure you aren’t falling into the traps of hackers and putting your private data at risk.

    Learn how easy it is for a hacker to gain access to a mobile devise by luring their victim to connect to a free Wi-Fi by installing a malicious profile.

    Join us for this informative webinar to learn how Symantec Endpoint Protection Mobile can keep you and your data safe."
  • Cloud Assurance – Managing Security Risk and Compliance Recorded: Mar 6 2019 2 mins
    Symantec
    Cloud computing has made it easy for developers to tap into an unlimited supply of servers and storage without having to wait on IT to deliver an App.

    However, this leaves IT in a difficult position to maintain visibility, security and compliance.

    Learn how Symantec Cloud Workload Assurance is a cloud security posture management (CSPM) solution manages your security risks and ensures compliance across your entire public cloud infrastructure environment.
  • See How Easy it is to Hack a Mobile Device (Video Demo) Recorded: Mar 6 2019 2 mins
    Symantec
    As we become increasingly reliant on mobile devices, its vital to ensure we are being safe and protecting ourselves from potential threats.

    During this video, we will demonstrate how easy it is for a hacker to take full control of a mobile device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure) protects the device and data from attacks.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà Recorded: Mar 5 2019 55 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :

    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR: Proteja la reputación de la empresa
  • Live at: Jul 15 2016 9:00 am
  • Presented by: Giampiero Nanni - Government Affairs EMEA, Symantec & Ramsés Gallego - Symantec Strategist
  • From:
Your email has been sent.
or close