Hi [[ session.user.profile.firstName ]]

From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.

From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats

Register Today
Recorded Apr 12 2018 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Orla Cox, Director Development Symantec
Presentation preview: From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.
  • Channel
  • Channel profile
  • Enabling Simple Move to Cloud Mar 29 2019 10:00 am UTC 1 min
    Mark Urban Symantec
    Enabling Simple Move to Cloud Video
  • Take Control of the Cloud Chaos Mar 27 2019 2:00 pm UTC 40 mins
    Gerry Grealish, Senior Director, Product Marketing, Symantec
    Securing Web Access & Protecting Data with Cloud-Delivered Enterprise Security

    Increased cloud adoption, mobile device use, and the dramatic growth in the number of remote and home workers is putting pressure on existing security infrastructures.

    In this environment, enterprise security teams are wrestling with questions like:

    - How can I consistently enforce policies governing the use of the web and cloud?
    - How can I effectively protect my users from web-based threats?
    - How can I secure my sensitive data and comply with legal regulations?

    Enterprises are turning to a comprehensive cloud-delivered security solution to tackle these challenges.

    Join us to learn how Symantec’s Cloud Security Services can be leveraged to protect users, data and devices, addressing the challenges of the cloud generation.
  • SEP Cloud Powerful, yet simple to use Mar 25 2019 10:00 am UTC 5 mins
    Symantec
    Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
    endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity Mar 22 2019 2:00 pm UTC 30 mins
    Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc.
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
  • Secure Web y Cloud Gateway Mar 15 2019 2:00 pm UTC 30 mins
    Ramses Gallego, Symantec Strategist
    Seguridad y Protección frente a amenazas para la Empresa
    Para los negocios, Internet es tanto esencial como peligrosa. En tiempos en los que los empleados utilizan cada vez más dispositivos móviles y más procesos se mueven a la nube, la dependencia -y el peligro- en Internet no va hacer más que aumentar. Se precisa visibilidad de todo el tráfico Internet para que se pueda proteger a las organizaciones y empleados de todas las amenazas que el modelo introduce.

    Secure web gateways (SWGs) aportan visibilidad y control necesarios para mitigar los riesgos de Internet. El punto de partida es donde los cortafuegos de próxima generación (NGFWs, Next-Generation Firewalls) acaban, aportando terminación sobre la capa 7 e inspección profunda del tráfico web (puertos 80 y 443) necesaria para descubrir y poder proteger de las constantes y sofisticadas amenazas para su negocio.

    En este webinar aprenderá cómo una arquitectura basada en proxy proporciona seguridad unificada y protección frente a amenazas para una entidad en esta época de usuarios remotos, oficinas móviles, aplicaciones en la nube, dispositivos móviles, etc.

    ● Una arquitectura basada en proxy es ESENCIAL para cubrir las necesidades de la Generación Cloud.
    ● Symantec BC Proxy SG es la mejor defensa de seguridad.
    ● Symantec Proxy SG mejora sustancialmente la protección frente a amenazas a la vez que reduce los costes de otra infraestructura de seguridad.
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Mar 12 2019 2:00 pm UTC 31 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.

    Register Today
  • Preventing Hackers with Single Agent Endpoint Security Mar 8 2019 10:00 am UTC 60 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà Mar 5 2019 9:00 am UTC 55 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :

    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • Delivering Complete Endpoint Security with Symantec Mar 4 2019 11:00 am UTC 61 mins
    Robert Arandjelovic, Product Marketing Director ; Gavin Fulton, Endpoint Security Expert
    Today’s threat landscape continues to evolve, with attackers using increasingly stealthy techniques that are difficult for traditional security controls to detect. New point solutions are emerging to stop one specific means of attack, but it’s impossible to deploy them all without incurring significant cost and complexity. Join us as we demonstrate how Symantec’s Complete Endpoint Security can enable you to deliver comprehensive endpoint security to your customers – featuring an array of state-of-the-art capabilities like the newly-introduced Deception as well as advanced detection and response – all within a single agent.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Feb 28 2019 2:00 pm UTC 34 mins
    Orla Cox, Director Development Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Wie CASB sich weiterentwickeln muss Feb 28 2019 10:00 am UTC 40 mins
    Martin Kroemer, Symantec
    Wie CASB sich weiterentwickeln muss, um sich in Ihre Security-Infrastruktur zu integrieren

    Die schnelle Akzeptanz von Cloud-Anwendungen und -Diensten erhöht die Notwendigkeit von Cloud Access Security Brokers (CASB)

    Es ist Zeit, dass CASB-Systeme sich in Ihre gesamte Security-Infrastruktur einfügen. Dabei müssen zahlreiche Schnittstellen berücksichtigt werden, u. a. DLP, Advanced Malware Protection, Web Security und Endpoint Security. Daher überlegen Unternehmen, wie sie cloudbasierte Security-Lösungen am besten in ihre Umgebung integrieren können, um die Sicherheit zu erhöhen und den operativen Aufwand zu reduzieren.

    Der Webcast sondiert diesen nächsten Schritt, den CASB-Lösungen machen müssen.

    Jetzt anmelden
  • Symantec Web Isolation – Ihre Vorteile durch unsere Fireglass-Übernahme Feb 26 2019 9:00 am UTC 50 mins
    Alexander Peters, Symantec (Deutschland) GmbH
    URL-Filter sind ein hervorragendes Tool, um Ihre Systeme vor webbasierte Threats zu schützen. Achtung! Sie stoßen aber an ihre Grenzen, wenn Mitarbeiter unkategorisierte Webseiten ansteuern.

    In den meisten Unternehmen werden Zugriffe auf diese Grauzone durch die Policy unterbunden – auch wenn man gelegentliche False Positives in Kauf nehmen muss. In anderen lässt man die Zugriffe zu, und riskiert lieber eine Infektion, als Mitarbeiter von potenziell wichtigen Informationen abzuschneiden.

    Beides ist nicht ideal – und ab sofort gibt es endlich eine bessere Alternative: Die Übernahme des amerikanischen Security-Anbieters Fireglass ermöglicht es uns, unser marktführendes Web-Security-Portfolio jetzt auch um eine leistungsstarke Web-Isolation-Lösung zu erweitern.


    Im Webinar erfahren Sie:

    >>Wie Sie mit Symantec Web Isolation allzu streng eingestellte URL-Filter vermeiden und Ihren Mitarbeitern Zugang zu mehr Webinhalten gewähren, ohne zusätzliche Risiken einzugehen

    >>Wie Sie die Lösung nutzen können, um Ihre Privilegierten Accounts und Anwender künftig noch besser vor webbasierten Attacken zu schützen

    >>Wie sich durch das Isolieren potenziell gefährlicher eingebetteter Links viele gängige Phishing-Attacken und Account-Übernehmen zuverlässig unterbinden lassen

    >>Wie Sie Symantec Web Isolation mit Ihren ProxySGs, Content Analysis Systemen und Malware Analysis Appliances kombinieren und zu einer nahtlos integrierten Komplettlösung bündeln lassen

    Darüber hinaus verraten wir Ihnen Sie, wie die weitere Roadmap zur Integration der Fireglass-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Wir freuen uns auf Sie!
  • Répondre aux enjeux de sécurité de la génération cloud Feb 25 2019 1:00 pm UTC 42 mins
    Hervé Doreau, Directeur Technique, Symantec France
    À l'ère de la génération cloud, les collaborateurs exigent une flexibilité à toute épreuve et un accès où qu'ils se trouvent, ce qui peut mettre vos données les plus sensibles en danger.
    Les environnements distribués, comme ceux mis en place pour les télétravailleurs et les employés mobiles, créent de nouvelles surfaces d’attaque qu’il est impératif de protéger. De même, le recours aux applications cloud SaaS rend encore plus nécessaires les contrôles de conformité et de sécurité.

    Résultat, les équipes IT et sécurité sont obligées de repenser la conception de leur réseau pour mieux répondre aux interrogations suivantes :
    - Comment encadrer efficacement l’accès aux données, aux applications et aux systèmes ?
    - Comment lutter contre les menaces avancées qui ciblent notre entreprise via le Web, le cloud et l’e-mail ?
    - Comment sécuriser les informations qui circulent entre notre réseau, les terminaux et le cloud ?
    Retrouvez nos experts pour ce webcast sur les grands défis de sécurité que les grands comptes clients de Symantec doivent relever avec la génération cloud. Vous découvrirez comment les solutions Cloud de sécurité de Symantec peuvent protéger les utilisateurs, les terminaux et les données d’entreprise, où qu’elles se trouvent.
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation Feb 22 2019 2:00 pm UTC 53 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Feb 22 2019 10:00 am UTC 62 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today:
    1) Use of cloud applications
    2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
    3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now!
  • How Secure is Your Hybrid Cloud? Feb 21 2019 12:00 pm UTC 60 mins
    Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
    Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.

    What is a hybrid cloud and how is it different from securing a traditional data center?

    Why is the development of applications for the cloud different and how does it impact security?

    What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
  • Key Insights: How PayPal is using Symantec Security to protect their endpoints Feb 20 2019 12:00 pm UTC 60 mins
    Joakim Lialias, Symantec | Sundeep Vijeswarapu, PayPal | Fernando Montenegro, 451 Research
    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    - How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
    - How PayPal is using Symantec Endpoint Security to protect their endpoints.
    - How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
    - Introducing never seen before innovation to deliver best-in-class prevention
    - Hardening Detection and Response to help customers achieve superior threat prevention,
    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information to simplify Endpoint Security for your organization.
  • „Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) 2018“ Feb 20 2019 9:00 am UTC 60 mins
    Candid Wuest and Alexander Peters
    Verpassen Sie die Möglichkeit nicht, sich mit den führenden Analysten von Symantec über die Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) aus dem Jahr 2018 auszutauschen.
    Erhalten Sie tiefe Einblicke in die Themen:

    - Der Goldrausch der Cryptominen
    - Der sich wandelnde Trend der Ransomware-Infektionen
    - Details über gezielte Cyber-Angriffe
    - Infektionsgefahren durch Softwareupdates
    - Die Welle der mobilen und IoT Bedrohungen setzt sich fort
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained.
  • Live at: Apr 12 2018 3:00 pm
  • Presented by: Orla Cox, Director Development Symantec
  • From:
Your email has been sent.
or close