Hi [[ session.user.profile.firstName ]]

2018 – The year in cyber crime

Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

• How targeted attacks are evolving to exploit new technologies like IoT.
• The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
• A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
Recorded Dec 10 2018 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Orla Cox, Director Security Response, Symantec
Presentation preview: 2018 – The year in cyber crime
  • Channel
  • Channel profile
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Feb 22 2019 10:00 am UTC 62 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today:
    1) Use of cloud applications
    2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
    3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now!
  • How Secure is Your Hybrid Cloud? Feb 21 2019 12:00 pm UTC 60 mins
    Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
    Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.

    What is a hybrid cloud and how is it different from securing a traditional data center?

    Why is the development of applications for the cloud different and how does it impact security?

    What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
  • Key Insights: How PayPal is using Symantec Security to protect their endpoints Recorded: Feb 20 2019 58 mins
    Joakim Lialias, Symantec | Sundeep Vijeswarapu, PayPal | Fernando Montenegro, 451 Research
    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    - How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.
    - How PayPal is using Symantec Endpoint Security to protect their endpoints.
    - How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:
    - Introducing never seen before innovation to deliver best-in-class prevention
    - Hardening Detection and Response to help customers achieve superior threat prevention,
    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation
    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information to simplify Endpoint Security for your organization.
  • Cyber menaces : du minage de cryptomonnaies aux attaques de la chaîne logicielle Recorded: Feb 19 2019 60 mins
    Laurent Heslault, Directeur des Stratégies Sécurité, Symantec France
    De la propagation des ransomwares WannaCry et Petya/NotPetya à l’essor fulgurant du minage de cryptomonnaies, l’année 2017 nous a rappelé que les menaces de sécurité peuvent provenir de sources aussi changeantes qu’inattendues. Outre la très forte augmentation du volume des attaques, le paysage des menaces s’est diversifié, les attaquants s’efforçant de découvrir de nouveaux vecteurs d’attaques tout en brouillant les pistes.

    Retrouvez nos experts Symantec pour en savoir plus sur les conclusions de l’Internet Security Threat Report (ISTR) 2018, notamment :
    - La ruée vers l’or numérique, avec le minage des cryptomonnaies
    - La réorientation des tendances liées au ransomware
    - Les derniers chiffres des attaques ciblées
    - Les infections visant la chaîne logistique logicielle
    - La flambée des menaces mobiles

    Inscrivez-vous dès aujourd’hui
  • Rôle crucial du proxy dans la protection de votre entreprise Recorded: Feb 19 2019 34 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
    Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.

    Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
    L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.

    Ce webcast vous explique :
    - Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
    - Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
    - En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget

    Inscrivez-vous dès aujourd'hui
  • Dal coin mining agli attacchi alle supply chain Recorded: Feb 18 2019 48 mins
    Giampiero Nanni and Antonio Forzieri
    Analisi delle ultime tendenze delle minacce

    Dal boom inaspettato di Wanna e Petya/NotPetya al veloce dilagare dei coin miner, il 2017 ci ha dimostrato ancora una volta che le minacce per la sicurezza digitale possono provenire da fonti inattese.
    Oltre all’impennata nel volume, le minacce si sono ulteriormente diversificate, con i criminali che si industriano pur di scoprire nuove strategie di attacco e, allo stesso tempo, coprire le proprie tracce.

    Segui l’esperta in minacce di Symantec che illustra i risultati dell’Internet Security Threat Report (ISTR) 2018, analizzando anche:

    La corsa all’oro digitale

    - Le attuali tendenze dei ransomware
    - Gli attacchi mirati, in cifre
    - Le infezioni della supply chain dei software
    - Il picco delle minacce per i dispositivi port atili

    Registrati subito
  • Maîtriser le chaos du cloud Recorded: Feb 18 2019 32 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.

    L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
    Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
    - Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
    - Comment protéger efficacement les utilisateurs des menaces web ?
    - Comment sécuriser les données sensibles et respecter les réglementations ?
    Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.

    Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
  • SEP Cloud – Potente y a la vez fácil de usar Recorded: Feb 17 2019 5 mins
    Los servicios de seguridad para endpoints proporcionados en la nube ofrecen una potente y eficaz protección frente a las amenazas empleando el personal de informática con el que ya cuenta dentro de su empresa. En este vídeo de 5 minutos le mostraremos cómo usar la solución Symantec Endpoint Protection Cloud y cómo poner en marcha y desplegar la seguridad en sus endpoints en tan solo 5 minutos utilizando la misma protección potente que usan las grandes empresas.
  • Comment faire évoluer le CASB pour l’intégrer à votre infrastructure Recorded: Feb 15 2019 39 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Face à l’adoption rapide des applications et services cloud, le recours au CASB (Cloud Access Security Broker) est indispensable
    Les systèmes CASB doivent aujourd’hui s’adapter à votre infrastructure de sécurité globale.
    De nombreux points d'interactions doivent être pris en compte : DLP, protection avancée contre les malwares, sécurité web et des terminaux. Dans chaque cas, les entreprises déterminent comment intégrer au mieux les solutions de sécurité cloud dans leur environnement afin de renforcer la sécurité et réduire les coûts opérationnels supplémentaires.
    Cette discussion explore donc le nouveau domaine que constituent les solutions CASB.

    Inscrivez-vous dès aujourd'hui
  • Simple et efficace : protection des terminaux avec un seul agent Recorded: Feb 14 2019 58 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Trois tendances majeures définissent le chaos auquel les entreprises doivent faire face aujourd’hui avec la génération cloud :
    le recours aux applications cloud, le nombre croissant de travailleurs mobiles qui accèdent à ces applications en dehors du périmètre de protection, et l’utilisation combinée d’équipements professionnels et personnels (PC, Mac et appareils mobiles).
    Dans le même temps, le paysage des menaces évolue en permanence. Les attaquants tirent parti de ces tendances pour cibler les entreprises avec des ransomwares, des attaques ciblées et des malwares mobiles.
    Les solutions actuellement proposées associent des produits ciblés spécifiques, trop souvent disparates, et s’attaquent au problème de manière morcelée.
    Tous ces facteurs ont abouti à une complexité opérationnelle dans des entreprises qui se heurtent à un manque cruel de personnel de sécurité IT qualifié.
    Assistez à ce webcast pour savoir comment la sécurité des terminaux peut résoudre ces problèmes tout en renforçant l’efficacité opérationnelle et en réduisant le coût total d’exploitation avec une architecture à un seul agent.
    Nos experts vous montreront comment la dernière évolution de Symantec Endpoint Security peut :
    - contrer les attaquants en mettant au jour leurs intentions et en ralentissant leurs actions grâce aux technologies de deception et de sécurité proactive ;
    - identifier, investiguer et résoudre les incidents, y compris les attaques sans fichiers, grâce à la technologie EDR (Endpoint Detection and Response) ;
    - renforcer les environnements contre les cyber attaques avec une totale visibilité de la surface d’attaque applicative et la capacité d’isoler les applications suspectes ;
    - étendre la sécurité avancée aux appareils mobiles afin de les protéger contre les attaques réseau et les vulnérabilités des systèmes d’exploitation et des applications.
  • How to protect against IoT security attacks and next generation cyber crimes Recorded: Feb 13 2019 42 mins
    Orla Cox, Director Security Response, Symantec
    Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.

    As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.

    In this webinar you will learn:

    • How cybercriminals are diversifying in order to remain profitable
    • The new methods of threat propagation causing headaches for organizations
    • The next generation of IoT threats
    • Recent targeted attack campaigns
  • Symantec Control Compliance Suite 12.5 Recorded: Feb 12 2019 61 mins
    Suresh Ramkumar, Principal Product Manager, Symantec
    Symantec Control Compliance Suite 12.5 is here!

    Please join us for a special webcast on Tuesday, February 12 to learn more about this exciting release.

    We will discuss and demo some of the cool new features such as

    •Support for REST APIs to enable integration and automation around commonly used functionality like assets, jobs and standards management

    •Support for offline data collection with CCS agents to enable usage in air-gapped networks

    •Integration with BMC Remedy for ticketing by leveraging CCS APIs and the Symantec Workflow Engine

    Don't miss this great opportunity to get the latest information on Control Compliance Suite 12.5!
  • Your Proxy Just Got Smarter with Web Isolation Recorded: Feb 12 2019 32 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Recorded: Feb 12 2019 36 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • Votre proxy gagne en agilité grâce à l’isolation web Recorded: Feb 11 2019 26 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Recorded: Feb 8 2019 45 mins
    Anand Visvanathan, Director of Product Management, and Linda Park, Senior Manager, IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    •Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    •Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    •How to migrate your legacy infrastructure to the cloud without compromising security and compliance
  • Security that Scales: Automating Security and Compliance for DevOps Recorded: Feb 8 2019 47 mins
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today
  • Integrated Cyber Response Recorded: Feb 8 2019 38 mins
    Darren Thompson, Vice President and CTO EMEA, Symantec
    Cloud computing has rendered the traditional security stack irrelevant, as traffic partners change, new devices are added, and cloud applications pop up virtually overnight. It’s time for the Cloud Generation to rethink requirements for enterprise security.

    Darren Thompson, Vice President and CTO, EMEA, walks customers through how changing usage models mandates a cloud generation architecture in enterprise security. He’ll walk you through the power of Symantec’s Integrated Cyber Defense platform—unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.
  • Top 5 Things to Consider When Securing AWS Recorded: Feb 8 2019 52 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure and loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
  • Keep sophisticated phishing and malicious websites at arm's length Recorded: Feb 7 2019 39 mins
    Sunil Choudrie, Sr Manager Product Marketing
    Many email attacks rely on users following links to websites that in time will host a phishing attack or malware. With the popularity of cloud email applications such as Office 365, how do you ensure you are protected? Simply scanning the email for malicious content will not detect or protect against such attacks, as the website becomes weaponised later. Defeating such sophisticated email attacks requires a layered approach. Symantec Email Threat Isolation is one such layer that allows users to safely follow links to websites that cannot yet be categorised as ‘good’ or ‘bad’.

    In this webinar, Sunil Choudrie (Email Security Strategist) discusses the challenges that these attacks present, and how Email Threat Isolation can be employed as part of your Office 365 email security to protects against web delivered malware and phishing attacks.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2018 – The year in cyber crime
  • Live at: Dec 10 2018 2:00 pm
  • Presented by: Orla Cox, Director Security Response, Symantec
  • From:
Your email has been sent.
or close