Hi [[ session.user.profile.firstName ]]

Securing databases like a boss: Five winning moves

As breaches of the network perimeter become more common, organisations that safeguard data where it lives - in the database - will prevail. Data stores are an enticing target for cybercriminals. This is only amplified by the common misconception many organisations have that their database assets - whether they are on premise, in a datacenter or in the cloud - are secure.

So, where do you start? What can you do right now to secure your databases with authority and finesse?

Join this webinar and learn:
• The top five threats to database security
• How a real-life database attack unfolds
• The five quickest, highest-impact actions you can take right now to harden your databases

BONUS: Attendees may be eligible for a 6-month database security assessment tool license at no cost.
Recorded Nov 11 2015 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Oliver Pinson-Roxburgh, EMEA Systems Engineering Manager at Trustwave
Presentation preview: Securing databases like a boss: Five winning moves
  • Channel
  • Channel profile
  • The Least Talked About Cybersecurity Threat Recorded: Aug 7 2019 24 mins
    Chris Schueler (Trustwave) & Frank Downs (ISACA)
    Most IT roles tend to involve long hours and high stress levels, but with breaks between projects. The reality of a cybersecurity professional, however, is that their job is never fully complete. Much like an air traffic controller or a law officer, just one oversight can result in detrimental consequences. The constant pressure of identifying new threats, contending with persistent adversaries around the clock, and assessing how third parties and introduction of new technologies may impact risk is psychologically taxing. Furthermore, it may weaken the enterprise cyber resiliency.

    Join this Q&A interview live from Black Hat to learn more about:

    - Burnout in cybersecurity
    - The effect of AI and behavioral analytics on burnout
    - Industry shortage of security expertise and how to address it
    - How to alleviate day-to-day cybersecurity stress

    Frank Downs, Director/SME Cybersecurity Practices, ISACA
    Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
  • Cyber Threats 2020: State of the Art & Emerging Defense Paradigms Recorded: Jul 15 2019 55 mins
    Sachin Deodhar, Technical Director of Threat Intelligence, APAC Region, Trustwave SpiderLabs Fusion Center
    From an incident responder perspective, the cyber threat landscape today, and in the coming years, appear forbidding and treacherous.

    With the rise in the adversaries’ use of sophisticated trojans to target organizations with techniques to bypass two-factor authentication, destructive malware to thwart forensics, and living off the land techniques to evade attack vendor and persist longer we are compelled to develop equally innovative means to combat such threats.

    In this webinar you will understand the emerging (attackers') tactics, techniques, and procedures (TTPs) that pose serious challenges to current defense paradigms; in particular:

    1. Examine ATMITCH campaign targeting financial institutions with a focus on subverting and compromising ATM terminals.
    2. Understand the complex and sophisticated Emotet Trojan wreaking havoc on the Financial Sector.
    3. Understand limitations of blocking PowerShell and how adversaries can run "PowerShell without PowerShell".
    4. Come to terms with the fact that two-factor authentication is broken. We will describe one technique using a reverse proxy as a man-in-the-middle for two-factor authentication bypass and account takeover.
  • Key Factors for CISO Success Recorded: Aug 8 2018 47 mins
    Mark Weatherford (vArmour), Azi Cohen(WhiteSource) | Mark Whitehead (Trustwave) | Joseph Kucic (Cavirin Systems)
    Tune in for this exclusive panel on the key factors for a successful security strategy. This is a Part 1 of 2 CISO panels during Black Hat exploring the ever-changing role of the CISO, the factors influencing their success and the elements needed to build a more cyber resilient enterprise.

    Join top cyber security executives for an interactive Q&A roundtable discussion on:
    - The changing role of CISO
    - Why cybersecurity should be a key priority
    - Key resources every CISO needs
    - How to recruit, develop and retain security talent
    - Why investing in your security culture matters
    - Biggest cyber security challenges and how to overcome them

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.
  • Mark Whitehead on Cyber Threats and Improving Security Recorded: Aug 8 2018 26 mins
    Mark Whitehead (Trustwave) & Mari Galloway (Women's Society of Cyberjutsu)
    Join Mark Whitehead, Director, Spider Labs Americas at Trustwave for an exclusive interview at Black Hat 2018 in Las Vegas on the latest cyber threats and trends in cybersecurity. Some of the topics up for discussion will include:
    - What are the 3-5 top cyber threats CISOs are worried about in 2018? What's new on the threatscape?
    - How to improve cybersecurity? Key areas to focus on. Top recommendations for CISOs.
    - Data breaches affecting millions of users are on the rise. What are the security controls / policy changes / tech solutions businesses should implement to prevent breaches and detect them faster?
    - What are the biggest threats to security coming from the IoT? Are you worried about cyberwarfare? How should we be protecting our critical infrastructure?
    - Cybercrime is on the rise. How can businesses defend against ransomware, phishing, social engineering, and other cyber-attacks? Is investing in technology enough, or should the focus also be on cyber awareness education for employees.
    - There is chronic shortage of skilled cyber security workforce in the US and worldwide. How are businesses coping with the lack of cyber talent in the age of cyber-attacks? Is AI/ML helping alleviate the problem? How does diversity (or lack thereof) play into all of this?
    - What career path will be most advantageous to people starting their cybersecurity career?
    - Can you explain testing maturity models as it relates to test organizations conduct to test their security posture?
    - How do you properly scope testing?
    - How do you test in cloud and hybrid environments?
    - Can you explain the compliance vs security mindset?
  • Operation Grand Mars: Defending Against Carbanak Cyber Attacks Recorded: Feb 28 2017 54 mins
    Thanassis Diogos, Managing Consultant, Incident Response EMEA at Trustwave
    Cybercriminals are setting their sights on hospitality businesses across the U.S. and Europe with unprecedented malware attacks known as Carbanak, as part of precise and difficult-to-stop APT-style operation that we code-named 'Grand Mars'.

    Our Trustwave SpiderLabs team of incident responders and researchers have spent months analyzing Grand Mars and its elements, and unlocking strategies that can be used to identify and mitigate this insidious campaign – which may soon spread to e-commerce and retail organizations as well.

    Join our webinar where the author of the report will be sharing the findings including:

    •How the attackers make initial entry and force infection
    •How they achieve persistence
    •How they perform lateral movements
    •Which malicious files they use
    •Which signs indicate you’ve been compromised
    •Which countermeasures you should apply immediately
  • Methodology Matters: Selecting the Right QSA-C for Your Organization’s Needs Recorded: Nov 2 2016 59 mins
    Michael Aminzade, VP of Global Compliance and Risk Services at Trustwave
    Your organization has its own unique IT infrastructure, business model, risk profile and tolerance. The best strategy for streamlining your annual Payment Card Industry (PCI) validation process is to make sure that your Qualified Security Assessor Company (QSA-C) employs a sound and forward-looking methodology for your assessments. A key first step is understanding the critical differences between risk acceptance and risk mitigation and the implications for your business.

    Tune in to learn best practices in PCI services methodology and how they apply to your specific requirements. Michael Aminzade, VP of Global Compliance and Risk Services at Trustwave, will discuss:

    -The impact on PCI assessments, including PCI Data Security Standard (DSS), Payment Applications DSS and P2PE (Point to Point Encryption).
    -How sound methodology helps you build a better foundation for security and compliance - whatever your starting point.
    -Top considerations for evaluating methodology.
  • Next Level Threats: Stopping Ransomware & CEO Email Fraud Recorded: Oct 19 2016 61 mins
    Chris Harget, Senior Product Marketing Manager at Trustwave
    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. These next level threats are so lucrative that they are accelerating hacking innovations and exploding attack frequencies. Ransomware damages user productivity, creates emergency work for IT and at least one CEO has been fired because of CEO email fraud. Security solutions and users have to be smarter than ever before.

    Our Trustwave SpiderLabs researchers, security experts and thought leaders have gathered valuable insights and examples on how to help prevent ransomware and CEO fraud. We will be sharing their findings with you during this webinar, including:

    • What these attacks look like to your users.
    • The essentials and limitations of user training.
    • Which automated techniques are most effective at stopping unknown attacks.
  • Insider Insights: PCI Europe Community Meeting Preview Recorded: Oct 5 2016 61 mins
    Alexander Norell, Director of Global Risk and Compliance Services at Trustwave
    Join Alexander Norell, Director of Global Risk and Compliance Services at Trustwave, as he shares his insider view of what you can expect at the upcoming 2016 Payment Card Industry Security Standards Council (PCI SSC) Europe Community Meeting in October.

    Alexander’s findings will be based on what he learns from his attendance at the North America Community Meeting and his insight as a subject matter expert on PCI compliance.

    During the webinar, Alexander will:

    • Alert you to trending topics and their implications
    • Share takeaways from participants as well as SSC leaders
    • Analyse the impact to the European community
  • Security Testing Report: Analyzing the Top Trends and Practices Recorded: Sep 28 2016 60 mins
    Michael Osterman, President of Osterman Research, Inc., and Kevin Overcash, Director of SpiderLabs North America at Trustwave
    One in five businesses don’t test for security vulnerabilities. A recent study by Osterman Research found that many businesses fail to conduct frequent security testing despite believing that it’s critically important to securing their systems and data.

    In this presentation Michael Osterman, President of Osterman Research, Inc., will discuss key findings from the “Security Testing Practices and Priorities: An Osterman Research Survey Report”, including:

    •Common types of security issues experienced in the past 12 months.
    •The extent to which organizations take a proactive approach to security testing.
    •Types of security testing conducted during the past 6 months.
    •How often organizations conduct detailed review of security tests.
    •Challenges faced by organizations in the context of security testing.
  • Entendiendo los Cambios de PCI DSS 3.2 Recorded: Aug 30 2016 55 mins
    Miguel Arévalo, Managing Consultant y Diana Elizabeth Rodriguez Sanchez, LAC Sales Manager
    La versión 3.2 del PCI DSS (Payment Card Industry Data Security Standard) ha sido anunciada - las organizaciones que deben cumplir precisan entender los cambios y sus implicaciones. Participe de nuestro webinar para entender más sobre por qué fue lanzado tan rápido y cómo puedes parar mejor a tu organización.

    Aprenda sobre:
    • El alcance de la nueva versión PCI DSS 3.2
    • ¿Qué significa para su negocio?
    • ¿Por qué deberías implementar los cambios, aunque no sean mandatorios?
    • ¿Qué puede venir en el futuro próximo?
  • Modern Cybercrime: Staying Ahead of the Perfect Storm Recorded: Jul 20 2016 63 mins
    Brian Hussey, Global Director of Incident Response & Readiness and John Ramsey, Senior Product Marketing Manager
    Trustwave offers advice for those looking to take back control of their cyber destinies. Cybercrime has become a world-wide epidemic as organized crime syndicates are literally making money hand over fist in extorting businesses or otherwise stealing valuable data and company assets. Combined with a global shortage of trained security professionals and you literally have "The Perfect Storm" of cybercriminal activity.

    Join Trustwave SpiderLabs cybersecurity expert, Brian Hussey, as he discusses how you can get ahead of today’s cybercrime ‘super storm’ with some simple steps and key solutions. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business. Join our webinar to help:

    -Understand who is targeting you.
    -Get a handle on just how they are doing it.
    -Learn some key tactics and solutions to combat today’s modern cybercriminal.
  • Nova versão PCI - mudanças e clarificações da norma Recorded: Jul 19 2016 63 mins
    José Roberto Giunti Lama, Managing Consultant and Isabel Silva, Business Development Director
    A versão 3.2 do PCI DSS (Payment Card Industry Data Security Standard) já foi anunciada – as organizações precisam entender as mudanças e suas implicações. Participe para aprender mais sobre o porquê foi lançado tão rápido e como você pode preparar a sua organização.

    Participe deste webinário para aprender sobre:
    • O escopo na nova versão PCI DSS 3.2
    • Que significa para o seu negócio?
    • Porque você deveria implementar essas mudanças, mesmo que não forem mandatórías?
    • O que pode vir no futuro próximo?
  • 6 Ways to Put "Secure" Back in Secure Web Gateways Recorded: Jul 14 2016 63 mins
    Chris Harget, Senior Product Marketing Manager at Trustwave and Stephen Brunetto, Director of Product Management at Trustwave
    More malware today is machine-generated and one-off. With advanced malware also employing obfuscation and anti-sandboxing techniques, just how "secure" are secure web gateways? The reality is - many are just not that secure anymore. Based on 2015 breach investigations, Trustwave found that 42% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content.

    Join our webinar where we will cover practical steps nearly any organization can take to optimize protection and policy control for your web users. We will be discussing real-world ideas on how to:
    -Ensure real-time blocking of encrypted new malware.
    -Easily keep policy optimized.
    -Virtually patch web browsers, and more.
  • ¿Cómo aliviar sus Presiones de Seguridad? Recorded: Jun 28 2016 62 mins
    Mario Cinco, Sales Engineering Director and Gabriel Sanders, Vice President Sales Latin America
    Las presiones de seguridad continúan aumentando – hoy más que nunca. Sabemos que probablemente usted esté bajo estrés, no satisfecho, y bajo ataques. Trustwave encuesto a 1.414 profesionales de seguridad informática para entender los factores emocionales que contribuyen a sus dolores de cabeza y desafíos. Súmate a aprender como aliviar esos puntos de dolor y escaparle a la presión.

    Durante este webinar compartiremos resultados del 2016 Security Pressures Report e incluiremos:
    • ¿Los profesionales de seguridad sienten que tienen suficientes habilidades y personal?
    • ¿Cómo han cambiado año a año las presiones de seguridad en general?
    • ¿Cuáles son algunas recomendaciones prácticas que puedes implementar en tu organización para reducir la presión?
  • Web Application Security: Developing an Effective, Efficient, Economical Program Recorded: Jun 8 2016 51 mins
    Victor Bonic, Global Security Architect at Trustwave
    Web application security differs significantly from other information security disciplines. In addition to encompassing other security disciplines such as encryption, authentication, network and operating system security, it requires specialized knowledge of web applications and coding techniques. Due to its abstract and multifaceted nature, it understandably may elude the grasp of executive management (“but we have a firewall . . .”) and, as a result, find itself at the bottom of the security budget totem pole.

    In this presentation we will discuss the role that application security plays within enterprise security and points to evaluate when developing an effective and efficient web application security program that meets your considerations. Join this webinar to learn more about:

    •The current state of web application security and its relationship to enterprise security.
    •Why web application security is more complex than other security disciplines.
    •The tasks that need to be performed in application security.
    •The different methods of web application testing and mitigation.
    •Available implementation options based on the in-house resource and budget constraints.

    We will conclude the session with a discussion of a web application security methodology that will utilize the specialized skills of different members of your IT organization.
  • Understanding PCI DSS 3.2: Minor Updates, Major Changes Recorded: May 25 2016 60 mins
    J. Andrew Brinkhorst, CISM, Director of Product Management at Trustwave, and Dixie Fisher, Product Marketing Manager
    Payment Card Industry Data Security Standard (PCI DSS) 3.2 has now been announced - organizations who must comply need to understand the implications. Join us to learn more about the drivers for the early release of the mandate and how you can best prepare your organization.

    Attend this webinar for helpful insights about:

    -The scope of the new PCI DSS 3.2
    -What the updates mean for your business?
    -Why you would want to make these changes even if they weren’t mandated?
    -What may be on the horizon?
  • Understand Cybercrime Trends and Tactics to Defend Against Them Recorded: May 18 2016 50 mins
    Lawrence Munro, Director of SpiderLabs EMEA and APAC at Trustwave
    The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

    Join this webinar as we highlight our major findings and offer you a chance to:
    • Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
    • Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
    • Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.
  • Understand Cybercrime Trends and Tactics to Defend Against Them Recorded: May 10 2016 59 mins
    John Randall, Director of Product Marketing at Trustwave
    The 2016 Trustwave Global Security Report has just been released. The report offers a glimpse into the secret world of cybercrime organizations and details methods used to maximize profits from malicious attacks. The report also highlights how adaptable, creative and relentless cybercriminals are when it comes to getting access to the information they want.

    Join this webinar as we highlight our major findings and offer you a chance to:
    • Learn how cybercriminals changed tactics in 2015 and started targeting a greater variety of data.
    • Hear an in-depth analysis of the top cybercrime, data breach and security threat trends from 2015.
    • Get key insights on how to best defend your business assets amidst the evolving threat landscape and varying tactics of cybercriminals.
  • How to Pacify Your Security Pressures Recorded: Apr 6 2016 62 mins
    Dan Kaplan, Editor at Trustwave, and John Ramsey, Strategic Partner Marketing Manager at Trustwave
    Security pressures are mounting - and there are more of them than ever before. We know you're under stress, understaffed, and likely, already under attack. Trustwave surveyed 1,414 information security professionals to understand the emotional factors that contribute to a security professional’s headaches and hardships. Join us to learn how to alleviate these pain points and escape the pressure.

    During this webinar we will break down the findings of the 2016 Security Pressures Report from Trustwave, including:

    • Do security pros feel they have enough skills and personnel?
    • How have overall security pressures changed year over year?
    • What are some practical recommendations you can implement in your organization to reduce the pressure?
  • Ask the Analyst: Breach Planning and Preparedness Recorded: Jan 27 2016 60 mins
    Eric Ogren, 451 Analyst; Brian Hussey, Trustwave SpiderLabs Global Director
    It is always a good idea to be prepared. A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Even more, in today’s risk environment you need to know what tools to have in place to flag potential indicators of a compromise, have a response team on the ready and have a digital evidence trail for legal protection.
    Join us for an interactive discussion with guest speaker, 451 Research Senior Analyst, Eric Ogren and Trustwave SpiderLabs Global Director of Incident Response and Digital Forensics, Brian Hussey, to learn more about what you should do before, during and after a breach. Help drive the conversation by submitting a question for Eric and Brian in advance so we can tackle your biggest security concerns such as:
    • What is the likelihood of getting breached?
    • Best practices around building an IR plan
    • If you’ve been breached, what is the first thing you should do?
Smart security on demand
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than 2.7 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing databases like a boss: Five winning moves
  • Live at: Nov 11 2015 12:00 pm
  • Presented by: Oliver Pinson-Roxburgh, EMEA Systems Engineering Manager at Trustwave
  • From:
Your email has been sent.
or close