Hi [[ session.user.profile.firstName ]]

Office 365 et enjeux de sécurité : un dilemme ?

Séduites par une vaste gamme d'applications de productivité, réunies sur une même plate-forme, de nombreuses entreprises s’intéressent à Office 365. Mais celles qui franchissent le pas se rendent compte que les enjeux de sécurité du cloud ne sont pas aussi simples à résoudre qu’elles le pensaient.
La plate-forme Office 365 réunit des outils de communication, de création de contenu et de partage au sein d’un environnement cloud ouvert à tous les utilisateurs et compatibles avec tous les appareils. Cette plate-forme unique concentre ainsi tous les enjeux de sécurité auxquelles l’entreprise doit faire face. Il est donc impératif de bien réfléchir à cette question.
Retrouvez Hervé Doreau en webcast pour en savoir plus sur les implications de sécurité et les éléments clés à prendre en considération pour toute entreprise ayant adopté ou prévoyant de passer à Office 365.
Recorded Apr 12 2019 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hervé Doreau, Directeur Technique, Symantec France
Presentation preview: Office 365 et enjeux de sécurité : un dilemme ?
  • Channel
  • Channel profile
  • How to Effectively Secure Hundreds of Thousands of Mobile Devices Jul 31 2019 5:00 pm UTC 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec and Jeff Louisma, Manager Cyber Risk Services,Deloitte & Touche LLP
    Join us as we cover ways to effectively and efficiently secure mobile devices across a broad range of industries.

    As more enterprises are recognizing the need for greater visibility into mobile threats and the desire to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify – malware, phishing, network attacks and much more.

    While this is a starting point, there are other elements, characteristics, and abilities that have a far greater impact on the protection of an organization’s sensitive assets, information, and data that are not discussed often enough.

    This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late.

    • Focus on high user acceptance rates - poor adoption rates can make a good solution worthless.

    • Provide security on managed & unmanaged devices - equally effective security should be available for mobile devices and use cases.

    • Protection of sensitive data and systems should take place in real time - relying on third-party solutions or human intervention could be too late.

    • Resource demand should be minimal - maintaining and updating the solution should be efficient and require minimal resources.

    Participants should leave this webinar with knowledge and considerations to help them evaluate mobile security solutions and plan an effective deployment and execution in their own environment.

    Register Today
  • 2019 Cloud Security Threat Report: Understand the Latest Cloud Security Trends Jul 26 2019 10:00 am UTC 60 mins
    Jim Reavis, Co-Founder and CEO, Cloud Security Alliance | Kevin Haley, Director, Security Technology and Response, Symantec
    Is your perception of cloud security matching the reality?

    We surveyed security decision makers worldwide to understand their perceptions of the cloud security landscape and compared this to empirical data sources monitored by Symantec.

    Join Cloud security experts, Jim Reavis, Co-Founder & CEO at Cloud Security Alliance, and Nico Popp, Senior Vice President of Engineering at Symantec as they discuss:

    • Key findings from the 2019 Cloud Security Threat Report

    • Real world examples of security threats and whether the perception of cloud security matched up to the evolving cloud threat.

    • Emerging trends in cloud security that can help you respond to the evolving attack surface.

    Register Today
  • Explore the Benefits of Endpoint Detection and Response Tools and Services Jul 18 2019 5:00 pm UTC 58 mins
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts.

    We'll cover:

    - Trends impacting threat detection efforts

    - How organizations are using EDR and MEDR solutions

    - The benefits of using an MEDR service

    Register Today
  • Travel Bookings & Privacy: How Booking Data Might Be Leaked Jul 17 2019 10:00 am UTC 45 mins
    Candid Wueest, Senior Principal Threat Researcher
    A year has passed since the General Data Protection Regulation (GDPR) came into effect in Europe, but new research has found users’ personal data and privacy is still at risk. Symantec found that 67% of hotel and travel websites are leaking guests’ booking and personal details, allowing third party services to log into reservations, view personal details (risk of identity fraud) and even cancel bookings.

    Join Candid Wueest, Principal Threat Researcher as he discusses the latest research, highlighting:

    •How Hospitality websites are compromising users personal data and steps to combat the attacks
    •What cyber criminals can do with stolen booking data
    •Ways in which Data Protection Officers (DPOs) are responding to these attacks

    Register Now »
  • Breached! Next Generation Network Forensics for the Cloud Jul 11 2019 5:00 pm UTC 60 mins
    Karl Vogel, Worldwide Solutions Architect, Symantec and Dennis Carpio, Sr. Director Business Development, Ixia
    The average cost of a breach is US$4 million. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?

    In this webinar learn:

    • Best practices around network and cloud forensics and breach response.

    • Hear real-life scenarios that were handled by Symantec’s Incident Response experts.

    • See a demo of how Symantec Security Analytics in the cloud provides the details that expose the full source and scope of any threat or attack targeting your information assets.

    • See how you can arm your Incident Response team to significantly speed the time to conduct and complete network and cloud forensic investigations.

    Please Join Us, Register Today
  • Implementing a Zero Trust framework to Secure Modern Workflows Jun 27 2019 5:00 pm UTC 60 mins
    Salah Nassar,Director Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cloud-based computing has erased the traditional network perimeter and created new attack surfaces.

    Join our cloud security experts to learn how new product enhancements within the Symantec Integrated Cyber Defense Platform are delivering on the promise of Zero Trust while reducing cost and complexity for network security professionals.

    Learn how new integrated tools can help you:

    • Simplify enforcement of Zero Trust security policies across Web, email, and cloud application access.

    • Implement real-time, in-line security controls over the use of any cloud application from any device, including unmanaged and bring-your-own devices.

    • Enforce granular security controls over IaaS, SaaS, email and web traffic - for both managed and unmanaged devices

    • Consistently apply DLP policies on information being sent to cloud and web destinations, and perform threat inspection for content downloads

    Register Today
  • Tackling the Critical Gap: The Skills Crisis: Recorded: Jun 20 2019 23 mins
    Darren Thomson, EMEA CTO, Symantec, Dr Chris Brauer Goldsmiths University and Richard Brinson, CEO Savanti
    How to handle the skills crisis: reduce complexity, increase automation

    The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their job and are committed to the mission but in
    the face of mounting alerts, new threats and a sprawling estate to defend, are they at breaking point? In our new High Alert Research a quarter say their team cannot manage their workload; over a third are too busy to keep up.

    Join Darren Thomson, EMEA CTO, Symantec, Dr Chris Brauer Goldsmiths University and Richard Brinson, CEO Savanti to find out more
    with the skills development they need.
  • Symantec Cloud & Web Access Security (Video: 2:47 mins) Recorded: Jun 13 2019 3 mins
    Symantec
    Symantec has an integrated set of cloud-delivered gateway services for securing modern enterprise cloud and web access.
  • Expert Guide to CASB Deployment Success Recorded: Jun 6 2019 30 mins
    Eric Andrews, Vice President of Cloud Security, Symantec and Steve Riley, Senior Director Analyst, Gartner
    There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying and getting the full value out of your Cloud Access Security Broker (CASB) from visibility to data security to threat protection.

    Join this webinar to learn:

    •. A guidance framework on CASB adoption

    •. Tips for deploying a CASB to secure services like Office 365, G Suite, and AWS

    •. How to secure the use of cloud apps and services even when users are going direct to apps from unmanaged devices

    • Key insights on CASB options including integrations with DLP and Secure Web Gateways

    Please Join Us, Register Today
  • Livestream Video - Proactive Data Privacy and Security Recorded: Jun 6 2019 45 mins
    Bill Mew, The Crisis Team | Ilias Chantzos, Symantec | Allan Boardman, ISACA
    How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Effect of GDPR: One year later
    - How are enterprises instituting changes to achieve and maintain compliance
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up

    Panellists
    Bill Mew, CEO,The Crisis Team
    Ilias Chantzos, Senior Director, Government Affairs, Symantec

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA
  • Livestream Video - CISO Challenges and How to Solve Them Recorded: Jun 5 2019 43 mins
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Symantec - Comprehensive about Security Recorded: May 31 2019 12 mins
    Darren Thomson, EMEA CTO Symantec
    What kind of company is Symantec as the leading secuirty vendor. Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
  • What Cyber Threats are Lurking in your Network ? Recorded: May 30 2019 45 mins
    Alan Hall, Director of Product Marketing and Andre Engel, Sr.Consultant Cyber Security–SOC and Incident Response SME
    Do you know what’s lurking in your network?

    How strong are your defenses against today’s attacks? Nothing gives you a better understanding of your security posture than a deep analysis of your historic traffic.

    Using your own data, Symantec Security Analytics will uncover what’s hiding in your network. Is encrypted traffic leaving you blind? Are malicious files getting through? Are you aware of high-risk traffic? Are you currently under attack?

    Join us on this webinar:

    • Gain insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment.

    • Review results from real assessments, from real customers.

    • Learn how to get a complete and accurate picture of hidden cyber threats that may be hiding in your network

    Register Today
  • Gartner Recommendations for Modern Endpoint Security Recorded: May 30 2019 20 mins
    Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec
    Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response for the dynamic, diverse endpoint environments they operate.

    Join Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec, as they discuss:

    •. Proactive tactics teams are using to improve their security posture

    •. Pain points and threat trends driving the rapid rise in Endpoint Detection and Response solutions

    •. Features and capabilities customers should look for in a modern endpoint solution

    View Now
  • Cyber Security Platform Shift Recorded: May 30 2019 19 mins
    Art Gilliland, Peter Doggart and Jon Oltsik, Symantec
    Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organizations adapt their cyber security technology strategies?

    There's a seismic shift happening in cyber security. Integrated platforms are the future. Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.

    In this webinar, you will learn about:

    •New customer research demonstrating the need for integrated platforms
    •Unprecedented industry collaboration around the platform shift in cyber security
    •Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)
    •How the ICD platform drives customer adoption and value
    •New innovations extending the value of the ICD platform

    Please Join Us, Register Today
  • GDPR Turns 1: Many Companies Still Not Ready: Ask the experts Recorded: May 28 2019 47 mins
    Ramses Gallego, Giampiero Nanni, Damase Tricart, Ilias Chantzos, Symantec
    Companies still working to get their digital houses in order to comply with rules that offer promise of better governance and more transparency. Join Symantec experts and ask the questions that matter.
  • Il GDPR, un anno dopo... Recorded: May 22 2019 64 mins
    Giampiero Nanni, Senior Strategist, Government Affairs, Symantec
    Temi del Webinar
    Il GDPR, il Regolamento Generale sulla Protezione dei Dati, è entrato in vigore un anno fa. Stabilisce una serie di obblighi di notifica che le aziende di tutta Europa devono rispettare in merito a sicurezza informatica e violazione dei dati, affidando un ruolo preminente alle varie autorità di controllo. Considerato l'attuale panorama delle minacce, la conformità al GDPR rimane più che mai una sfida, e il rischio di una violazione dei dati è sempre più elevato.

    In questo summit si discuterà di cosa è accaduto nel corso di quest'anno. Iscriviti subito per scoprire se hai adottato la giusta strategia di protezione dati e di sicurezza, e se il tuo piano d'investimento protegge realmente la tua azienda, assicurandone la conformità normativa.

    Discuteremo anche delle più recenti notizie in queste aree chiave:
    •Le ultime linee guida sul GDPR da parte delle autorità per la protezione dei dati sulle notifiche in caso di violazione.
    •Come avviene l'adeguamento alla legge e qual è il legame tra protezione dei dati e sicurezza operativa
    •Trattamento dei dati personali – Le sfide poste dalle diverse categorie di dati e i rischi della ‘Shadow IT’
    Registrati subito
  • RGPD: Panorama un año después Recorded: May 21 2019 61 mins
    Ramses Gallego, Senior Strategist, Symantec
    El Reglamento General de Protección de Datos (RGPD) ya lleva un año en vigor. La nueva normativa impuso una serie de onerosas obligaciones de notificación de filtraciones de datos y de seguridad para organizaciones en toda Europa, así como fuertes medidas de ejecución para las autoridades en materia de protección de datos. Considerando que el actual panorama de amenazas a la seguridad hace que el riesgo de sufrir una filtración de datos sea mayor que nunca, cumplir con el RGPD sigue siendo hoy un desafío crucial para las empresas.

    Esta cumbre reúne a diversos CISO de orden mundial que expondrán su balance sobre lo acontecido este año, desde que entrara en vigor el RGPD. Regístrese ahora y descubra si la estrategia de seguridad y el plan de inversión que siguen su empresa son adecuados de cara a proteger su organización y garantizar el cumplimiento normativo.

    También se expondrán los últimos avances en las siguientes áreas clave:
    •Últimos consejos sobre el RGPD por parte de las autoridades de protección de datos sobre las notificaciones de filtraciones de datos.
    •Cómo se está aplicando y qué relación existe entre la protección de datos y la seguridad operativa.
    •Procesamiento de datos personales: Desafíos derivados de las diferentes categorías de datos y riesgos planteados por la TI en la sombra.
    •Requisitos de la transferencia de datos y cómo se está configurando el marco normativo.
    Inscríbase ahora
  • GDPR : le point un an après Recorded: May 21 2019 40 mins
    Laurent Heslault, Directeur Stratégie Sécurité - Symantec France & Goran Gotev, Sr Manager Government Affairs - Symantec EMEA
    En vigueur depuis l’année dernière, le règlement général sur la protection des données (GDPR) impose aux entreprises opérant des données de membres de l’UE des obligations de signalement en cas de fuite et d’incidents de cyber sécurité. Il renforce également les pouvoirs des autorités de protection des données pour les faire respecter. Alors que le paysage des menaces accroît plus que jamais le risque d’incidents, la conformité au GDPR reste donc un enjeu majeur.
    Ce webcast propose de faire le bilan des 12 mois écoulés depuis l’entrée en vigueur du GDPR. Nos experts y aborderont les thèmes clés suivants :
    • Recommandations les plus récentes des autorités de protection des données concernant le signalement des incidents,
    • Modalités d’application du règlement, lien entre protection des données et sécurité opérationnelle
    • Traitement des données à caractère personnel : difficultés induites par les différentes catégories de données, risques liés au Shadow IT
    • Impératifs concernant le transfert de données et la mise en place de l’environnement réglementaire
    Inscrivez-vous dès maintenant pour savoir si votre stratégie de sécurité et votre plan d’investissement sont en mesure de protéger votre entreprise et de préserver votre conformité réglementaire.
  • Who is the enemy within? Recorded: May 20 2019 3 mins
    Symantec
    Client data shared to a personal cloud account. Financial data on a USB drive. An unknowingly hacked password. People don’t generally mean harm. But under GDPR it’s the security breach that matters, not the motivation. See how Symantec Data Loss Prevention and CloudSOC can inspect and protect your most sensitive data.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Office 365 et enjeux de sécurité : un dilemme ?
  • Live at: Apr 12 2019 9:00 am
  • Presented by: Hervé Doreau, Directeur Technique, Symantec France
  • From:
Your email has been sent.
or close