[PANEL] Ensuring Continued Compliance – Data Protection
Since the rollout of The General Data Protection Regulation (GDPR) in 2018, companies worldwide have had to implement new policies and procedures to protect data. Join leading compliances and security experts as they discuss why data protection is at the heart of GDPR compliance.
Join this interactive Q&A panel to learn more about:
- What GDPR means for data management
- GDPR requirements around data collection and governance
- Best Practices for achieving compliance
- Recommendations for improving Data Management and ensuring Data Protection
- Melanie Turek, Fellow & Vice President, Frost & Sullivan (Moderator)
- Christopher Pierson, CEO & Founder, BLACKCLOAK
- Michelle Drolet, CEO & Co-Founder, Towerwall
- Ilias Chantzos, Senior Director, Global Government Affairs & Cybersecurity, Symantec
RecordedMay 20 201953 mins
Your place is confirmed, we'll send you email reminders
Brian Duckering, Sr. Mobile Security Specialist, Symantec and Jeff Louisma, Manager Cyber Risk Services,Deloitte & Touche LLP
Join us as we cover ways to effectively and efficiently secure mobile devices across a broad range of industries.
As more enterprises are recognizing the need for greater visibility into mobile threats and the desire to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify – malware, phishing, network attacks and much more.
While this is a starting point, there are other elements, characteristics, and abilities that have a far greater impact on the protection of an organization’s sensitive assets, information, and data that are not discussed often enough.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late.
• Focus on high user acceptance rates - poor adoption rates can make a good solution worthless.
• Provide security on managed & unmanaged devices - equally effective security should be available for mobile devices and use cases.
• Protection of sensitive data and systems should take place in real time - relying on third-party solutions or human intervention could be too late.
• Resource demand should be minimal - maintaining and updating the solution should be efficient and require minimal resources.
Participants should leave this webinar with knowledge and considerations to help them evaluate mobile security solutions and plan an effective deployment and execution in their own environment.
Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec
Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.
Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts.
- Trends impacting threat detection efforts
- How organizations are using EDR and MEDR solutions
A year has passed since the General Data Protection Regulation (GDPR) came into effect in Europe, but new research has found users’ personal data and privacy is still at risk. Symantec found that 67% of hotel and travel websites are leaking guests’ booking and personal details, allowing third party services to log into reservations, view personal details (risk of identity fraud) and even cancel bookings.
Join Candid Wueest, Principal Threat Researcher as he discusses the latest research, highlighting:
•How Hospitality websites are compromising users personal data and steps to combat the attacks
•What cyber criminals can do with stolen booking data
•Ways in which Data Protection Officers (DPOs) are responding to these attacks
Karl Vogel, Worldwide Solutions Architect, Symantec and Dennis Carpio, Sr. Director Business Development, Ixia
The average cost of a breach is US$4 million. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?
In this webinar learn:
• Best practices around network and cloud forensics and breach response.
• Hear real-life scenarios that were handled by Symantec’s Incident Response experts.
• See a demo of how Symantec Security Analytics in the cloud provides the details that expose the full source and scope of any threat or attack targeting your information assets.
• See how you can arm your Incident Response team to significantly speed the time to conduct and complete network and cloud forensic investigations.
Salah Nassar,Director Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
Cloud-based computing has erased the traditional network perimeter and created new attack surfaces.
Join our cloud security experts to learn how new product enhancements within the Symantec Integrated Cyber Defense Platform are delivering on the promise of Zero Trust while reducing cost and complexity for network security professionals.
Learn how new integrated tools can help you:
• Simplify enforcement of Zero Trust security policies across Web, email, and cloud application access.
• Implement real-time, in-line security controls over the use of any cloud application from any device, including unmanaged and bring-your-own devices.
• Enforce granular security controls over IaaS, SaaS, email and web traffic - for both managed and unmanaged devices
• Consistently apply DLP policies on information being sent to cloud and web destinations, and perform threat inspection for content downloads
Darren Thomson, EMEA CTO, Symantec, Dr Chris Brauer Goldsmiths University and Richard Brinson, CEO Savanti
How to handle the skills crisis: reduce complexity, increase automation
The war for talent is on. Due to shortages in skilled security professionals, attracting and retaining security talent is paramount. CISOs and SPs love their job and are committed to the mission but in
the face of mounting alerts, new threats and a sprawling estate to defend, are they at breaking point? In our new High Alert Research a quarter say their team cannot manage their workload; over a third are too busy to keep up.
Join Darren Thomson, EMEA CTO, Symantec, Dr Chris Brauer Goldsmiths University and Richard Brinson, CEO Savanti to find out more
with the skills development they need.
Eric Andrews, Vice President of Cloud Security, Symantec and Steve Riley, Senior Director Analyst, Gartner
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying and getting the full value out of your Cloud Access Security Broker (CASB) from visibility to data security to threat protection.
Join this webinar to learn:
•. A guidance framework on CASB adoption
•. Tips for deploying a CASB to secure services like Office 365, G Suite, and AWS
•. How to secure the use of cloud apps and services even when users are going direct to apps from unmanaged devices
• Key insights on CASB options including integrations with DLP and Secure Web Gateways
Bill Mew, The Crisis Team | Ilias Chantzos, Symantec | Allan Boardman, ISACA
How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.
Viewers can learn more about:
- Effect of GDPR: One year later
- How are enterprises instituting changes to achieve and maintain compliance
- Challenges to achieving compliance in an IoT world
- How to bake privacy and security into your processes
- Best practices for data protection and privacy from the ground up
Bill Mew, CEO,The Crisis Team
Ilias Chantzos, Senior Director, Government Affairs, Symantec
Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA
Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint
Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.
Join security experts across the industry for an interactive discussion on:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technology and human talent
- Coping with analyst fatigue
- Threats on the horizon
- Recommendations for strengthening security
David Boda, CISO, Camelot Group
Darren Thomson, CTO - EMEA, Symantec
George Patsis, CEO, Obrela Security Industries
Martin Mackay, Senior Vice President - EMEA, Proofpoint
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Alan Hall, Director of Product Marketing and Andre Engel, Sr.Consultant Cyber Security–SOC and Incident Response SME
Do you know what’s lurking in your network?
How strong are your defenses against today’s attacks? Nothing gives you a better understanding of your security posture than a deep analysis of your historic traffic.
Using your own data, Symantec Security Analytics will uncover what’s hiding in your network. Is encrypted traffic leaving you blind? Are malicious files getting through? Are you aware of high-risk traffic? Are you currently under attack?
Join us on this webinar:
• Gain insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment.
• Review results from real assessments, from real customers.
• Learn how to get a complete and accurate picture of hidden cyber threats that may be hiding in your network
Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec
Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response for the dynamic, diverse endpoint environments they operate.
Join Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec, as they discuss:
•. Proactive tactics teams are using to improve their security posture
•. Pain points and threat trends driving the rapid rise in Endpoint Detection and Response solutions
•. Features and capabilities customers should look for in a modern endpoint solution
Art Gilliland, Peter Doggart and Jon Oltsik, Symantec
Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organizations adapt their cyber security technology strategies?
There's a seismic shift happening in cyber security. Integrated platforms are the future. Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.
In this webinar, you will learn about:
•New customer research demonstrating the need for integrated platforms
•Unprecedented industry collaboration around the platform shift in cyber security
•Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)
•How the ICD platform drives customer adoption and value
•New innovations extending the value of the ICD platform
Ramses Gallego, Giampiero Nanni, Damase Tricart, Ilias Chantzos, Symantec
Companies still working to get their digital houses in order to comply with rules that offer promise of better governance and more transparency. Join Symantec experts and ask the questions that matter.
Giampiero Nanni, Senior Strategist, Government Affairs, Symantec
Temi del Webinar
Il GDPR, il Regolamento Generale sulla Protezione dei Dati, è entrato in vigore un anno fa. Stabilisce una serie di obblighi di notifica che le aziende di tutta Europa devono rispettare in merito a sicurezza informatica e violazione dei dati, affidando un ruolo preminente alle varie autorità di controllo. Considerato l'attuale panorama delle minacce, la conformità al GDPR rimane più che mai una sfida, e il rischio di una violazione dei dati è sempre più elevato.
In questo summit si discuterà di cosa è accaduto nel corso di quest'anno. Iscriviti subito per scoprire se hai adottato la giusta strategia di protezione dati e di sicurezza, e se il tuo piano d'investimento protegge realmente la tua azienda, assicurandone la conformità normativa.
Discuteremo anche delle più recenti notizie in queste aree chiave:
•Le ultime linee guida sul GDPR da parte delle autorità per la protezione dei dati sulle notifiche in caso di violazione.
•Come avviene l'adeguamento alla legge e qual è il legame tra protezione dei dati e sicurezza operativa
•Trattamento dei dati personali – Le sfide poste dalle diverse categorie di dati e i rischi della ‘Shadow IT’
El Reglamento General de Protección de Datos (RGPD) ya lleva un año en vigor. La nueva normativa impuso una serie de onerosas obligaciones de notificación de filtraciones de datos y de seguridad para organizaciones en toda Europa, así como fuertes medidas de ejecución para las autoridades en materia de protección de datos. Considerando que el actual panorama de amenazas a la seguridad hace que el riesgo de sufrir una filtración de datos sea mayor que nunca, cumplir con el RGPD sigue siendo hoy un desafío crucial para las empresas.
Esta cumbre reúne a diversos CISO de orden mundial que expondrán su balance sobre lo acontecido este año, desde que entrara en vigor el RGPD. Regístrese ahora y descubra si la estrategia de seguridad y el plan de inversión que siguen su empresa son adecuados de cara a proteger su organización y garantizar el cumplimiento normativo.
También se expondrán los últimos avances en las siguientes áreas clave:
•Últimos consejos sobre el RGPD por parte de las autoridades de protección de datos sobre las notificaciones de filtraciones de datos.
•Cómo se está aplicando y qué relación existe entre la protección de datos y la seguridad operativa.
•Procesamiento de datos personales: Desafíos derivados de las diferentes categorías de datos y riesgos planteados por la TI en la sombra.
•Requisitos de la transferencia de datos y cómo se está configurando el marco normativo.
Laurent Heslault, Directeur Stratégie Sécurité - Symantec France & Goran Gotev, Sr Manager Government Affairs - Symantec EMEA
En vigueur depuis l’année dernière, le règlement général sur la protection des données (GDPR) impose aux entreprises opérant des données de membres de l’UE des obligations de signalement en cas de fuite et d’incidents de cyber sécurité. Il renforce également les pouvoirs des autorités de protection des données pour les faire respecter. Alors que le paysage des menaces accroît plus que jamais le risque d’incidents, la conformité au GDPR reste donc un enjeu majeur.
Ce webcast propose de faire le bilan des 12 mois écoulés depuis l’entrée en vigueur du GDPR. Nos experts y aborderont les thèmes clés suivants :
• Recommandations les plus récentes des autorités de protection des données concernant le signalement des incidents,
• Modalités d’application du règlement, lien entre protection des données et sécurité opérationnelle
• Traitement des données à caractère personnel : difficultés induites par les différentes catégories de données, risques liés au Shadow IT
• Impératifs concernant le transfert de données et la mise en place de l’environnement réglementaire
Inscrivez-vous dès maintenant pour savoir si votre stratégie de sécurité et votre plan d’investissement sont en mesure de protéger votre entreprise et de préserver votre conformité réglementaire.
Client data shared to a personal cloud account. Financial data on a USB drive. An unknowingly hacked password. People don’t generally mean harm. But under GDPR it’s the security breach that matters, not the motivation. See how Symantec Data Loss Prevention and CloudSOC can inspect and protect your most sensitive data.
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.
We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.