Browse communities
Browse communities
Presenting a webinar?

Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία

Christos Ventouris, Information Security Specialist
Προσωπικά δεδομένα και πνευματική ιδιοκτησία στοχοποιούνται συνεχώς από εισβολείς προκειμένου να μετατρέψουν τις πληροφορίες σε κέρδος. Η νομοθεσία, στον Ευρωπαϊκό ορίζοντα, είναι κατακερματισμένη και καθόλου ομοιογενής. Σε αυτή την παρουσίαση θα περιγράψουμε την τρέχουσα κατάσταση στην Ευρώπη και στις ΗΠΑ καθώς και τι πρόκειται να συζητηθεί από τις Ευρωπαϊκές αρχές που θα καθοδηγήσουν τη μελλοντική ρύθμιση στην γεωγραφική περιοχή μας.EU and Data Protection: Future legislation outlook.
May 15 2012
32 mins
Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
security cloud
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Symantec Internet Security Threat Report (ISTR) 2015 May 6 2015 1:00 pm UTC 30 mins
    Antonio Forzieri, EMEA Cyber Security and ISS Lead – Technology Sales and Services, Symantec
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • Move security strategy forward - Internet Security Threat Report 15 is here! May 6 2015 10:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Security running your day-to-day? Internet Security Threat Report 15 is here! May 6 2015 9:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Securing Legacy systems in the Public Sector Recorded: Mar 19 2015 32 mins
    Mark Fox Senior Principal Consultant, Data Centre Security and Compliance
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Recorded: Mar 18 2015 46 mins
    Mike Smart - Symantec Security Strategist
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Sunil Choudrie, Symantec Security Specialist
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    James Hanlon CISM, CISSP Cyber Security Strategy & GTM Lead, EMEA - Mark Fox, Sr Principle Technical Specialist
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Tom Davison (Security Specialist) C.Baker (Senior Manager Gov Affairs), J.Fletcher (Head of IT Risk Swinton Group Ltd)
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Tom Davison Symantec and David Gillick HP
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    Evelyne Lescuyer, Consultante Information Security, Symantec
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Cédric Pottier, Consultant Information Security - CISSP, Symantec
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    Laurent Heslault - Directeur cyber stratégiesPaul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • L’actu cyber du mois, so what ? Recorded: Dec 12 2014 31 mins
    Laurent Heslault - Directeur cyber stratégies, Paul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques , nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.

    •Votre rendez vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • How to achieve a proactive approach to security Recorded: Dec 9 2014 53 mins
    James Hanlon Symantec and Marco Pereira HP
    Achieving a proactive approach to security: All organisations are looking to lower their risk when it comes to Cyber threats, but increasingly need to have faster incident response and containment. The question becomes one of how can you embrace technological change while minimising IT risks? Are you looking to meet compliance regulations and audit requirements, but also improve efficiency and productivity of your IT staff? Join us to understand how talking a different approach and shifting your investment may enable to you respond faster but importantly give you better awareness.
  • The future of Endpoints & Identities: Increases in Threats, Cloud & Mobility Recorded: Dec 3 2014 46 mins
    Mike Smart at Symantec and Charles Kolodgy (IDC), Research Vice President for Security Products Service
    Join Mike Smart at Symantec and Charles Kolodgy, Research Vice President for IDC's Security Products Service on this interview-style webinar to hear about how the industry needs to evolve endpoints and identities to embrace evolution and flexible working as well as defend off increasingly complex attacks. In this session there is a twist! – you, the audience will have control over the topics we’ll choose to discuss! To conclude this session, we’ll be hearing from Charles on his view of what the future holds!
  • Die Spionage-Software Regin | Einladung zum deutschen Webcast Recorded: Dec 3 2014 62 mins
    Candid Wüest (Principal Threat Researcher) Carsten Hoffmann (Director Technical Sales and Services)
    Am 23. November 2014 hat Symantec als erstes Unternehmen Informationen über Regin, ein hoch entwickeltes Tool für die Cyber-Spionage, veröffentlicht. In den Medien wurde ausführlich darüber berichtet und wir möchten Ihnen einige wichtige Informationen über diese Bedrohung sowie dazu, wie wir Sie davor schützen, geben.

    In unserem deutschspraching Webcast am 3.12.14 möchten wir näher erläutern, was Regin ist und warum diese Bedrohung ernst ist: Regin ist deshalb als Malware so bemerkenswert, da sie äußerst komplex ist und sich in ihrer Funktionalität für die verschiedensten Zwecke anpassen lässt. Regin basiert auf einem Framework, das sich bestens für die langfristige Informationsbeschaffung eignet, indem es die Malware vor einer Enttarnung schützt. Regin unternimmt erhebliche Anstrengungen, um sich und seine Aktivitäten auf infizierten Computern zu verbergen. Für seine Tarnung werden zahlreiche der raffiniertesten Techniken eingesetzt, die wir bisher beobachten konnten.
  • 2014 Cyber Attack Review & What Can We Learn for Better Cyber Defence in 2015? Recorded: Dec 3 2014 42 mins
    James Hanlon, Cyber Strategist Symantec
    The world has changed. The increasing digitization of our personal & business lives is driving an evolution in cyber threats never seen before while forcing our relentless focus on prevention to be modified to one of resilience. This webinar explores the evolution of cyber threats across the emerging spectrum of digital interactions for businesses, governments and consumers and highlights both the human and technology shifts we need to make to not only prevent threats but become more cyber resilient in our digitally connected worlds.
  • Archiving and Backup: Accelerate your business agility and innovation Recorded: Nov 13 2014 28 mins
    David Moseley, Information Intelligence and Governance Lead & Arjan Van Proosdij, Technical Evangelist, Symantec
    The data explosion is a given, but the increase in rules and regulation are driving compliance and governance requirements and the traditional view of archiving and backup need to be refined – just adding storage is not the solution; a better approach to information life cycle management is.

    Join David Moseley & Arjan Van Proosdij as they discuss methods and share top tips for accelerating your agility and innovation when dealing with your archiving and backup solutions.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
  • Live at: May 15 2012 8:00 am
  • Presented by: Christos Ventouris, Information Security Specialist
  • From:
Your email has been sent.
or close
You must be logged in to email this