Hi [[ session.user.profile.firstName ]]

2013 Trustwave Global Security Report: Threat Trends Webinar

Listen Up. Lock Down.

•The average time from breach to detection is 210 days.
•Mobile malware samples increased by 400%.
•E-commerce applications account for 48% of breach investigations.

Do you want the inside track on the threats you’ll be facing this year? Then sign up for this expert webcast covering the highlights of the 2013 Trustwave Global Security Report.

Hosted by Trustwave’s SpiderLabs elite research and threat intelligence team, what you see and hear in this session will help prepare your business and your teams for what’s ahead in 2013 and beyond.
Recorded Mar 19 2013 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nicholas J. Percoco, Trustwave SVP and Head of SpiderLabs
Presentation preview: 2013 Trustwave Global Security Report: Threat Trends Webinar
  • Channel
  • Channel profile
  • Looking beyond your perimeter - Supply Chain Risks Nov 18 2021 10:00 am UTC 60 mins
    Steve Bird (Trustwave), Luke Kenny (Trustwave), James Warriner (BitSight)
    It’s no longer enough to secure your own company’s infrastructure; you now must also evaluate the risk of third-party vendors, and plan as well as monitor for breaches there too.

    Recent supply chain breaches like the Colonial Pipeline breach, have shown security risks must be taken seriously. You should assume cybercriminals can navigate across the systems of your vendors and into your own environment. it is critical that you have a clear understanding of the inherent risks within your supply chain and the know-how to prioritize actions to reduce the risks of a breach.

    In this webinar we will explore:
    • The move to automation and outsourcing trends ‘It is estimated that there will be four times more supply chain attacks in 2021 than in 2020’ - European Union Agency for Cybersecurity (ENISA)– Jul 2021
    • Trends and analysis from BitSight (James Warriner)
    • Compliance and Regulation – President Bidens Executive Order and NIS-D – Its importance and impact on supply chain risk.
  • Panel: Preparing for The 2022 Threatscape Nov 9 2021 4:00 pm UTC 60 mins
    Griff James | Michael Yehoshua | Stan Davidson
    The threatscape is fast-changing and keeping up with transformation in the cybersecurity space is key to staying ahead of the evolving threats that lie ahead. In fact, according to Cyber Crime Magazine, cyber attacks are now the fastest growing crimes globally. But what will these threats look like in 2022? How will the threatscape have evolved from 2021, and how can we prepare for this change?

    From a rise in web application breaches, to an increase in ransomware and phishing attacks, it is clear that 2022 could represent severe disruption for business globally if steps are not taken preemptively to secure your business.

    Join us in this session as we discuss:

    - How the role of the CISO will evolve in 2022
    - The shifting threatscape
    - The key trends we expect to see in the year ahead
    - How to address these threats for a more secure enterprise

    Moderated by:
    Griff James, Director, Damrod Analysis

    Confirmed panelist(s):
    Michael Yehoshua, VP of Marketing, SCADAfence
    Stan Davidson, Principal Solutions Engineer, EMEA
  • Managing Cyber Risk during Mergers & Acquisitions Oct 28 2021 9:00 am UTC 60 mins
    Matt Dreze,Trustwave and Luke Kenny, Trustwave
    Post-COVID and Brexit, the number of Mergers and Acquisitions in the UK have increased at an exponential rate, reaching a 14 year high in the first 7 months of 2021. During the transformational process of complete a merger or acquisition, cybercriminals and Nation States often look for vulnerabilities and take advantage of any missed or poorly protected systems.

    In this webinar we will explore:
    • Why there is such an increase in Mergers and Acquisitions and look at some of the historical cyber security lessons that have been learned.
    • How to approach Mergers and Acquisitions, the due diligence you should apply on and how to work collaboratively to mitigate the risks
    • Trustwaves Mergers and Acquisitions playbook
    • Why we recommend workshops and baselining.
  • Securing Hybrid Environments Recorded: Oct 12 2021 59 mins
    David Broggy CISSP, GCIH, Senior Security Consultant, Trustwave
    In 2021, virtually all organizations (99%) use at least one public or private cloud. Half of all workloads and nearly half the data reside in public clouds, and almost 80% of organizations take a hybrid approach. Securing hybrid environments is no small task: teams are fatigued, resources limited, and the threat landscape is constantly evolving and becoming increasingly sophisticated. So, how do you protect your organization from tomorrow’s threats today? Listen in as Trustwave security expert, David Broggy, discusses tactics and techniques to help organizations effectively secure hybrid environments both now and in the future.
  • How to eradicate threats 24/7 with Cortex powered by Trustwave MDR Recorded: Sep 22 2021 58 mins
    Kyle Van Schalkwyk - Senior Systems Engineer - Palo Alto Networks, Joe Nelson, Senior Systems Engineer - Trustwave
    An introduction to 24/7 monitoring, proactive alert management, threat hunting, and incident response that spans network, endpoint, and cloud.
  • Secure Your Organization Like the Nation Depends On It Recorded: Sep 20 2021 53 mins
    Mark Trinidad, Trustwave Senior Product Manager, Trustwave and Joseph Malcolm, Trustwave Senior Sales Engineer
    On May 12th, President Biden issued an Executive Order (EO) on Cybersecurity. While most of the EO focused on improvements needed for modernizing the federal government, there are direct call outs to securing the supply chain. Additionally on June 2nd, a memo addressed to Corporate Executives and Business Leaders also stressed the critical responsibility for the private sector to protect against threats.

    In this webinar, we discuss what the Executive Order calls out and what it means for the private sector. We also discuss government requirements on cybersecurity and how it extends to the private sector
  • Mitigating increasingly serious and sophisticated Ransomware threats Recorded: Aug 19 2021 48 mins
    Ed Williams, David Bacon, Matt Hmoud, Shawn Kanady
    Trustwave subject matter experts discuss the increasing ransomware threat, how you can improve your security governance and or compliance? What strategies you can employ operationally? Which are the best technologies for you to implement to protect yourself? What do you need to test and assure yourself of effective controls and how do you proactively or re-actively mitigate the impact of an incident?

    Attend this webinar if you would like to explore solutions to the risks posed and want to be informed on some of the latest responses. We will provide you with advice and guidance on how you can improve your Security Governance and or Compliance, alongside operational changes, or technology you can implement to protect yourself. We will answer questions such as what you need to do to test and assure yourself of effective controls and share ideas on how you can proactively or re-actively mitigate the impact of a ransomware incident.

    Ed Williams, Director, SpiderLabs - EMEA
    Matt Hmoud, Principal Security Consultant, Trustwave
    Shawn Kanady, Director Spiderlabs Threat Hunt, Trustwave
    David Bacon - Director Digital Forensics and Incident Response - EMEA, Spiderlabs
  • Is SIEM Heading for Extinction? Recorded: Jul 20 2021 62 mins
    Jesse Emerson, VP of Managed Security Services, Trustwave
    Extended Detection and Response (XDR) collects information from disparate security platforms to enable quicker, easier threat detection and response. XDR is often marketed as a replacement for Security Information and Event Management (SIEM) solutions, but is SIEM truly heading for extinction?

    In this session, Trustwave Vice President of Managed Security Solutions, Jesse Emerson, discusses:

    The differences between XDR and SIEM
    Achieving the best outcomes from XDR and SIEM investments
    Amplifying the ROI of XDR and SIEM with your Managed Detection and Response (MDR) partner
    Listen to this session, to learn more about the future of SIEM, optimizing your existing security solutions, and choosing the right MDR partner.
  • Panel Discussion: Getting Ahead of the Breach Recorded: Jun 23 2021 62 mins
    Panelists from: Dept. of Children & Family Services, NatWest Markets, Nyotron, and Trustwave
    2020 was the worst year on record for breaches. E.g. there were 2,935 publicly reported breaches in the first three quarters of 2020. According to a recent report from Risk Based Security, the number of records exposed in 2020 was up to 36 billion. 

    What can enterprises learn from this and do to better protect their data? Is breach prevention even possible?

    Hear from the experts on what the new normal for organizations looks like, the cybersecurity best practices to adopt and what's in store for the rest of 2021.

    The topics up for discussion will include:
    - Cybersecurity in the new normal
    - How attackers have take advantage of the pandemic
    - Critical steps to take on the path to preventing data breaches 
    - Why data protection and cybersecurity should not be separate functions
    - Best practices and solutions for breach detection and response
    - Lessons from the field and recommendations for CISOs

    Ashton D'Cruz, Director, CAO, CGO, CISO & Head - CC&S Governance, NatWest Markets Plc, INDIA

    Allen Ohanian, CISO, Department of Children & Family Services
    Nir Shafrir, VP, Global Field Engineering and Customer success at Nyotron
    Andrew Kempster, Principal Consultant Incident Response/Digital Forensics at Trustwave
  • 3 Perspectives on the Evolving Threat Landscape Recorded: Jun 22 2021 61 mins
    Ed Williams, David Bacon & Damian Hicklin - Directors at Trustwave
    In 2020 we saw a huge leap forward in digital transformation, with digital transformation comes risk, with risk comes opportunity for malicious users.

    Join us as we discuss the ever-evolving threat landscape from three different perspectives: Pen Testing, Digital Forensics (DFIR) and Threat Detection (TDRC).

    We discuss security trends, what to do and where to focus on during these fast paced and difficult times.

    This will be a live panel discussion and Q&A.

    Featuring insights from:
    Ed Williams – Director, Trustwave’s SpiderLabs, EMEA
    David Bacon – Director, Director Digital Forensics and Incident Response, Trustwave’s SpiderLabs EMEA
    Damian Hicklin - UK&I Practice Director, Consulting & Professional Services
  • Slow is the New Broken: Accelerating your Cloud Security Recorded: Jun 17 2021 63 mins
    Darren Van Booven, Lead Principal Consultant, Trustwave SpiderLabs and Joseph Davis, Chief Security Advisor, Microsoft
    Today, “slow” is the new broken. Slow, outdated systems and tools can significantly inhibit business continuity and security, impeding your organization’s productivity and it’s cloud migration. With modern paradigms, solutions, and integrations, “slow” is not only inefficient, but also, no longer an acceptable standard.

    In this session, we’ll discuss the necessity of re-evaluating productivity, integration, and visibility to ensure your security is not hindered by sluggish or outdated solutions. Bad actors are increasingly sophisticated and bold and now is a crucial time to tighten your perimeters and strengthen protocols to mitigate your cloud and cyber risks.

    Together with Microsoft, join Trustwave on June 17th at 1pm PDT for more information on:
    • Achieving visibility
    • Evaluating integration standards
    • Identifying inefficient or slow security processes
  • Evolving to XDR from EDR: How to do it and why it matters Recorded: Jun 7 2021 53 mins
    Jesse Emerson, VP of Managed Security Services, Trustwave & Richard Diver, Sr. Technical Business Development Mgr., Microsoft
    Extended Detection & Response (XDR) has been one of the most impactful technologies in the past year. The rapid acceleration of digital transformation initiatives requires the continued evolution and growth of security postures in organizations of all sizes and industries, regardless of resources. In this webinar, Microsoft and Trustwave tackle the evolution of EDR to XDR and how MDR is symbiotic.
  • The Attackers Already Know Your "Assume Breach" Strategy Recorded: May 11 2021 51 mins
    Mark Trinidad, Senior Product Manager, Trustwave
    It seems every 3-5 years, the industry has new terms to discuss the state of security and guide security investments. The "Assume Breach" strategy caused us to think “Well, if I can’t stop attackers coming in, I have to assume they are already inside my network.” This led the market to change security focus on more detection and response, but the hackers already know what to do to hide. The "Assume Breach" strategy alone is a losing one. It must be combined with a Proactive Data Breach Prevention strategy.
    In this webinar, we will discuss the balance needed between the two strategies and focus on the strengths of a proactive one. 

    We will look at:
    -Security Hygiene
    -Thinking like the Attacker
    -Securing Data Where It Lives
  • Red Team Rules: The Importance of Human-Led Testing Recorded: Apr 13 2021 55 mins
    John Cartrett, Director, Trustwave SpiderLabs Americas
    With a 67% increase in security breaches over the last five years, and an average cost of a data breach clocking in at $3.86 million, you can never be too careful in your approach to security. - Per Accenture

    A strong security posture is a careful blend of the right people, processes, and technology aligning to ensure you remain one step ahead of the ever-evolving threat landscape, increasing attack surfaces and potential vulnerabilities resulting from digitization initiatives.

    From remote employees connecting to an unsecured Wi-Fi network or unintentional violations of security policies to unpatched software or a previously undetected malware file, seemingly innocuous risks can maneuver their way around your existing tools--no matter how robust.

    Amplifying your current security tech stack with human-led testing and simulated attacks provides heightened visibility into your environment, identifying these gaps before a bad actor can exploit them.

    In this session, we'll be discussing:

    Using red teaming engagements to confirm security efficacy

    Employing blue and purple team exercises to amplify existing security protocols

    How human-led testing differs from penetration testing and automated tools

    Join the Trustwave SpiderLabs team to better understand the vital role human-led testing and adversarial-simulation (red, blue and purple teaming) plays in maintaining a mature, layered security posture.
  • To SOAR or not to SOAR – Trustwave XSOAR is the Answer Recorded: Mar 30 2021 24 mins
    Muktadir Khan - EMEA Engineer Director, Patrick Bayle - Cortex Systems Engineer Manager, Matthew Rhodes - EMEA Cortex Manager
    Join Palo Alto Networks and Trustwave SOAR SME’s in a roundtable discussion as they explore the current market for SOAR, the challenge facing businesses and how together, their collaboration to enable a unique XSOAR offering.
    • Why SOAR?
    • How can Trustwave help?
    • Solving the perpetual effort
    • Cyber vs. Operational Use Cases
  • Trustwave Webinar: Evolving Your Posture for Emerging Ransomware Trends Recorded: Dec 9 2020 63 mins
    John Cartrett Director of Trustwave SpiderLabs North America and Ed Williams Director of Trustwave SpiderLabs EMEA
    There is nothing like having first-hand access to what our experts learned through a combined total of more than 30 years in the field. Watch now to witness a live simulation that will cover ransomware installation, forcing reboots through group policy preferences, and how encryption technology works.
  • Did threat actors get in when you went remote? Time to hunt. Recorded: Aug 20 2020 61 mins
    Shawn Kanady, Lead Threat Architect at Trustwave
    As the Covid19 pandemic ripped across the globe impacting our health, politics and our ability to continue to work, companies have been forced to shut down or otherwise present an opportunity for remote work. For some companies, that impact may have seemed minimal, due to already having a remote workforce. For others, the task of enabling remote work came with a lot of technical problems, support issues, and quite a few mistakes along the way. This type of chaotic situation, is exactly what the predatory threat actors of today are looking for. The mass confusion can lend itself to unauthorized bypass, internal reconnaissance and eventually, exfiltration of critical data.

    During these critical moments it is absolutely vital to assess your critical assets, understand how your threat landscape has changed and perform routine threat hunts to identify anomalous behavior or unauthorized changes introduced to the environment.
  • No Fluff, No Hot Air: Securely Migrating to the Cloud Recorded: Jun 18 2020 43 mins
    Ed Williams, EMEA Director of SpiderLabs; Elliot Dellys, Director of Strategic Consulting for Trustwave EMEA
    Join Ed and Elliot for a lively discussion covering common issues in cloud migration planning and execution, misconfiguration of sensitive repositories, managing an increased attack surface area, and tips for ensuring your migration journey is built for success – with security as a foundation, not an extension.

    Ed Williams and Elliot Dellys have very different backgrounds, but regularly encounter the same phenomenon: organisations want to migrate to the cloud (or already have!) but are unsure of the risks it poses to their organisation. Drawing on over 20 years of collective experience, Ed provides deep technical insight into the most common issues his penetration testers exploit in the cloud while Elliot provides commentary on the oft-overlooked human, governance and regulatory considerations.
  • 3 Strategies for Assessing and Reducing Data Risks Recorded: May 13 2020 54 mins
    Travis Lee, Director Product Management & Mark Trinidad, Senior Product Manager
    Your most critical and sensitive data lives in databases. Your customers, users or consumers not only expect you to protect it, you are required to by law

    Data privacy cannot be met without proper data security. Long gone are the days when you could simply monitor database activity and react tactically to threats. Today’s security leaders realize that risks are constantly changing and evolving, therefore data security controls must be able to continuously assess risk posture and remediate against evolving threats. Attend this webinar to learn three critical strategies for getting ahead of data risks:

    -Developing a continuous database risk assessment process
    -Reducing access to data
    -Using focused database monitoring to continuously harden your attack surface
  • The Rising Tide: Regulation and Cybersecurity Recorded: Feb 26 2020 23 mins
    Mark Whitehead, Vice President, SpiderLabs NA, Trustwave & Ulf Mattsson, Head of Innovation, TokenEx
    New regulations are consistently coming to market that will have an impact on how we consume cybersecurity solutions.

    Join Mark Whitehead, Director, SpiderLabs NA, Trustwave for an exclusive and informative video interview to learn more about:

    - The challenges, risks and security gaps of the new regulations
    - The hurdles that each new regulation and framework will present
    - What the U.S. Department of Defense’s Cyber Maturity Model Certification (CMMC) is exactly
    - What steps should companies be taking to prepare for CMMC
    - What companies can do to succeed given the changing landscape

    This video interview will be broadcast LIVE from San Francisco during the 2020 RSA Conference.
Smart security on demand
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than 2.7 million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2013 Trustwave Global Security Report: Threat Trends Webinar
  • Live at: Mar 19 2013 6:00 pm
  • Presented by: Nicholas J. Percoco, Trustwave SVP and Head of SpiderLabs
  • From:
Your email has been sent.
or close