Your VP just resigned and took a position at your biggest competitor. Did you remember to examine the Salesforce logs to see if he downloaded your entire customer database and history of purchases? Do you even have access to those logs? And if you did, and found the obvious, how would it help now? Catching Bradley Manning who stole sensitive government information, Ross Klein who took with him an entire hotel brand concept and Gary Min that copied chemical formulas was too late for the US government, DuPont and Starwood hotels respectively.
In this presentation we look into how to proactively monitor user activity to detect potential threats from employees before the damage occurs. Focusing on how to effectively collect activity logs and analyze them against user, role and entitlement information, to detect abnormal activity, predict which employees may pose more threat if not loyal and to reduce the associated risk.
RecordedApr 17 201349 mins
Your place is confirmed, we'll send you email reminders
David Harper, Fortify on Demand Practice Principal, EMEA
Static analysis vs. Binary analysis, binary vs. bytecode, debug vs. obfuscation… Confused about Static Application Security Testing? In this webinar, David Harper, Fortify on Demand Practice Principal will explain all these terms, dispel some of the rumors and clear up any confusion. Afterwards, you will be able to authoritatively select the best approach for your Static Application Security Testing needs that will address your requirements for both comprehensive vulnerability detection and actionable remediation advice.
David Anumudu, Software Security Solution Architect, HP Enterprise Security
While users are more mobile than ever, that flexibility has also come with increased risk. As business managers push for more mobile apps, faster development, newer features and broader distribution of these apps, the businesses’ risk exposure grows exponentially. Organizations are at risk of exposing their corporate data, losing brand equity, and ultimately suffering financial loss through breaches of their mobile applications. IT must ensure these apps are secure, even if they are developed by a third party, so understanding the mobile vulnerability landscape is critical and its tough to keep this expertise in-house.
HP Security Research leveraged HP Fortify on Demand (FoD) Mobile to scan more than 2,000 mobile applications from more than 600 companies, revealing alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
The presentation will discuss both the promises and challenges presented by big data analytics to information security. To help take advantage of the former without the penalty of the latter, we will learn about the building blocks of a big data security solution and explore the most cost-effective uses of big data analytics to enhance security.
While threat intelligence promises to help with the effective detection of advanced threats, it usually achieves the opposite: detecting the most predictable attackers. To be included as part of a vendor provided threat intelligence feed, an attacker must have tried attacking several potential victims before, and must have used the exact same method to be captured in the threat intelligence feed.
In this presentation we will see how to make threat intelligence valuable for detecting advanced targeted threats directly aimed at your organization. We will see how to create a threat intelligence feed close to the target, as a shared effort between departments, subsidiaries or organizations working closely together to ensure identification of targeted threats. In addition we will see how to extend the term intelligence into additional detection mechanisms such as behavioral patterns.
Web applications continue to represent a major source of risk to organizations. Not only is the number of web application growing but the associated risk is increasing as they are evolving from informational web-sites to interactive sites that capture customer data. The IT security teams are aware of the problem but all too often do not have then bandwidth to effectively assess these application or the budget to engage expensive penetration testers to do the work on their behalf. The problem is compounded as now it’s not only web-sites that need to be secured but Facebook and mobile applications too.
In this webinar, you will learn how Fortify on Demand, HP’s cloud based application security testing service, can provide a cost effective solution to all your application security testing requirements. With Fortify on Demand you can start testing within a day, scale rapidly to test all your applications, whether they are developed in-house or produced by third-parties, and importantly support the developers to fix any vulnerabilities that we find.
In today’s ever evolving threat landscape and with the increasing requirements by the business users for access to business information from various locations and from a multitude devices, the Information Security Professional is required to understand the threats and the mitigation techniques available to them. During this presentation we will explore the attackers motivation and understand their eco-system and then we will look at how users are being leveraged to gain access to our business information. Lastly we will look at ways we can mitigate the kill chain at various stages and provide better reporting to the business stake holders.
Rick Dunnam, Principal Consultant, HP Fortify EMEA
The rapid adoption of mobile devices has created significant security risks and challenges for IT organizations. In a recent study by HP of 120 mobile applications for a single enterprise customer found that 66% of applications contained vulnerabilities that could have led to the disclosure of personal data or the compromise of a back-end system.
In this webinar you will learn more about these vulnerabilities and how you can identify and remediate these risks.
Philippe Jouvellier - HP Enterprise Security Products
Depuis de nombreuses années déjà, le système d’information est devenu un support indispensable à la stratégie et aux activités des Entreprises et des Organisations. L’essor du Big Data confirme l’évolution du SI avec l’accès à des données hétérogènes et en grand nombre. Malheureusement, l’apparition de nouvelles menaces, ainsi que la pression règlementaire démontrent le caractère indispensable de la gouvernance du SI et de la gestion opérationnelle de la sécurité et impliquent l’adoption d’une posture de sécurité dynamique.
Face à ces enjeux,les entreprises doivent non seulement trouver les meilleurs experts et savoir les garder, mais elles doivent aussi s’organiser avec des équipes et des processus adaptés à leurs exigences et enfin, elles doivent s’appuyer sur technologies éprouvées qui leur permettent d’anticiper et de détecter les menaces.
Dans ce contexte d’enjeux toujours plus important, les technologies de SIEM sont devenues essentielles. La technologie HP ArcSight, solution leader dans le marché du SIEM, a contribué à améliorer de manière significative la posture de sécurité de milliers de clients à travers le monde. Ces clients sont des acteurs de secteurs industriels de l’aéronautique et de la défense, l’énergie, les services, la finance, la santé, les hautes technologies, l’assurance, la distribution et les technologies de communications.
Paul Brettle, Manager, HP ArcSight Specialist Team EMEA
With the modern and emerging threat landscape, it is clear that adding more and more layers isn’t going to provide the answers that it once did. Using a joined-up approach, it is possible to start to build a true solution that helps manage the risks and threats, and to provide visibility that wasn’t previously possible. Addressing security at the network and application layers and proving a real-time view of the risks and threats as they happen, it’s now possible to start to address these new emerging threats.
Importantly though, by using this approach, it is possible to be prepared today and tomorrow to provide pro-active identification and resolution to the threats.
David Anumudu, Solution Architect, HP Fortify EMEA
The business is demanding more apps and more channels for customer engagement. In turn you know this means more risk. The app development team is swamped just trying to keep up, and your security team is stuck in the middle, trying to secure what you already have - let alone all this new stuff. Sound familiar?
Join us for 45 minutes where you will learn:
- Why the developers are struggling to deliver secure applications
- Why the business doesn't seem to 'get' application security
- How you can start managing your application risk, today, for free
Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
2013 Cost of Cyber Crime Study: UK, Germany & France
Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for the United Kingdom and Germany. For the first time, the research was conducted in France. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 110 UK, German and French organizations participated. According to the findings, cyber attacks increased 16 percent in the UK and 21 percent in Germany. The costs associated with this increase in the UK and Germany were £904,886 and €830,169, respectively. For the first time, it was determined that the average cost of a cyber attack in France was €3.89 million. Findings from the report also show that each week UK and German organizations experienced on average 1.3 successful attacks per company. French organizations experienced an average of 1 cyber attack per company.
Dr. Jeremy Ward, HP Enterprise Security Consulting Services
Evidence is mounting that current IT security models are simply no longer sufficient to support the hybrid enterprise. The extensive flow of enterprise information, well beyond the traditional purview of IT, necessitates an expansion of security scope to identify and control vulnerabilities. Lack of focus can be putting your information at risk.
This session reviews findings from the HP Enterprise Security Services Security Assessment Report. The report utilizes data and survey responses on customer security maturity assessments.
While organizations continue to battle cyber criminals, it seems that security professions are always fighting a losing war. However, a new weapon has been building up within the domain of most organizations, one that can help tip the balance in favor of the good guys. Find out how we can take the massive amounts of information we are generating and turn it to help bring valuable intelligence that can stop cyber-attacks from compromising your enterprise
Rich Agar CISSP MSc, Senior Solutions Architect, HP Enterprise Security
The Enterprise Security Kill Chain concept describes the five steps of a security breach. This session will describe the steps that attackers use and suggestions that organisation can use to identify and mitigate these attempts and reduce risk.
About your speaker:
Rich Agar CISSP has been working in the IT industry since the late 1990’s. He has worked as a freelance consultant, at systems integrators and vendors with various customers across the UK and Europe. Rich holds a Master’s degree in Information Security from Royal Holloway, University of London, and is currently working as a Solutions Architect for Enterprise Security at Hewlett Packard.
Enterprises today have become highly extended environments with multiple users inside the network at any given time. That extended enterprise also includes multiple vendors and suppliers, but nearly half of reported breach incidents are the result of a mistake by a trusted supplier. Protecting the enterprise from both inadvertent and malicious errors requires extension of enterprise compliance requirements across the supply chain.
In this webinar, we will cover security compliance services that enhance budgeting and spending effectiveness, expand visibility, reduce complexity, and improve compliance reporting; resulting in better cost control, faster incident reaction, reduced risk exposure, and better audit response.
Distributed denial-of-service (DDoS) and web application attacks can be critical threats to your enterprise. Defending against them takes a comprehensive cloud-based managed service coupled with on-premise DDoS appliance solutions. Learn how to effectively maintain availability and defend your enterprise from denial-of-service attacks using HP’s new Distributed Denial of Service Protection Services.
Michi Kossowsky, Director of Product Management, HP Enterprise Security EMEA
In this webinar, Michi will discuss how an organization can take the requirements of their infrastructure around operational controls, compliance and security to extend and expand them into a Security Intelligence solution.
Using a use case approach, organizations can look to extend and build upon their existing systems and controls to provide real-time warnings and feedback that allows them to make informed decisions focused around their business needs. Rather than just having a "top 10 attacker" reports and dashboards, how about a system that focuses around application lines and how this impacts business is more useful.
Paul Brettle, EMEA HP Security Specialist Manager, HP Enterprise Security
Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.
What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?
Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.
Ofer Shezaf - HP Enterprise Security & Andreas Mertz, Founder & Managing Director of iT-CUBE SYSTEMS
“The new information security frontier is applications, and for many this means SAP, which is the backbone of IT in many organizations but is little understood by most. While the number of security notes and patches for SAP increases exponentially, solutions still focus on authorization and entitlement management, leaving a security gap in areas such as misconfiguration, patch management and application security and abuse of trust.
In the Webinar we will discuss AgileSI, an innovative solution which utilizes an approved SAP add-on and HP ArcSight to help protect your SAP systems.
iT-CUBE SYSTEMS is a privately held company headquartered at Munich, Germany. The company was awarded in December 2012 with the Deloitte Technology Fast 50 Award Germany.
Dr. Jeremy Ward, Security Consulting Offering Manager, HP
Enterprise is adapting to embrace new technologies and capture new opportunities. Cloud capabilities are attractive, but concerns for information security remain. In this webinar, Dr. Jeremy Ward will discuss how you can adapt and embrace change, while maintaining the security of your infrastructure and information. The key points discussed will include choosing a security service that helps you form better cloud security strategies that manage data risk, reduce complexity, identify vulnerabilities, and ease user access; resulting in improved security governance, enhanced visibility, increased cost control, and reduced risk exposure.
The days of locked down security are over. Today’s enterprise must be as fluid as the clients they serve, sharing information whenever, wherever and on whichever device they choose. This new fluidity requires a comprehensive approach to security to enable interaction while driving operational effectiveness and reducing business risk.
Getting to your secure enterprise is a journey and we have designed capabilities to help you get there.
Are you ready to begin the journey to your secure enterprise?
The only thing that is constant is change. As we face a change in the administration and possible changes in the SES framework, it is important to realize that change can bring about creativity and innovation. Join us for this viewcast as we explore some the potential changes that are unique to federal government agencies, and examine organizations that, despite the negative impacts of change, reinvented themselves or their processes to meeting increasing demands.
As organizations compete for the same consumers, many companies are turning to live-streaming video content to better engage their online audience. But to deliver the live streaming experience viewers expect, organizations need a technical plan that will support successful live-streaming to viewers around the globe on any device.
Whether you are delivering live-streaming events now or are looking to add them to your existing VOD workflow, join us for this live webinar where our expert will outline key considerations for delivering live-streaming video to ensure the highest Quality of Experience for viewers.
This webinar will cover:
• Advanced planning you must do before live-streaming events
• Execution pitfalls to avoid
• Designing an efficient workflow
• Delivering to a diversity of devices
• Protecting your content from unauthorized access or theft
In the borderless world of Cloud computing, everything changes from anywhere access to anything as-a-service. While organizations are keen to reap the benefits the cloud offers, many fall shy of adoption for two reasons: security and control. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do organizations maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world when the distribution of data may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role? Join HPE Security - Data Security and (ISC)2 on June 28, 2016 at 1:00PM Eastern for Part 1 of a 3 part Security Briefings series examining the key security challenges faced when moving to the Cloud.
Financial firms of all shapes and sizes are facing advanced threats on a daily basis – rarely a day goes by without seeing another headline about a cyberattack or data breach. Cybercriminals are going after the most sensitive data knowing how and where to find it.
With compliance standards and audit regulations becoming more stringent, and the rising prevalence of cyber threats, the need to protect vulnerable critical information has never been more important. During this webinar, CounterTack and Proficio will discuss the growing need for financial institutions to have next-generation endpoint security solutions combined with 24x7 security monitoring and alerting.
During this session you learn:
• Why endpoints have become the focus for attackers
• What you can do to secure endpoints in today’s threat landscape
• Best practices for meeting security regulation and compliance standards
• The role of security monitoring and alerting in keeping critical assets safe
Las presiones de seguridad continúan aumentando – hoy más que nunca. Sabemos que probablemente usted esté bajo estrés, no satisfecho, y bajo ataques. Trustwave encuesto a 1.414 profesionales de seguridad informática para entender los factores emocionales que contribuyen a sus dolores de cabeza y desafíos. Súmate a aprender como aliviar esos puntos de dolor y escaparle a la presión.
Durante este webinar compartiremos resultados del 2016 Security Pressures Report e incluiremos:
• ¿Los profesionales de seguridad sienten que tienen suficientes habilidades y personal?
• ¿Cómo han cambiado año a año las presiones de seguridad en general?
• ¿Cuáles son algunas recomendaciones prácticas que puedes implementar en tu organización para reducir la presión?
Random numbers are the lifeblood of crypto but are often taken for granted. Poor randomness makes keys more predictable and weakens security. Getting random number generation right is already a challenge, and in the virtualized world of cloud computing and constrained devices of the IoT, the situation is likely to get worse.
Join our live webinar to learn how you can easily upgrade your systems to take the uncertainty out of random number generation.
*Assess your current systems – learn why random numbers are so critical, how they are generated and if you can prove that everything is working
*Learn about ways to generate entropy, improve random numbers and test for compliance
*Deploy solutions to strengthen your data center and distributed applications without expensive changes or operational burden
Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.
In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.
Register for this webinar today. As usual, we’ll leave time for Q&A.
Your identity and governance practices are well established, but they might not be as comprehensive as they need to be. Going beyond the basics is critical to greatly reduce security risk and improve efficiencies.
Join CA Technologies security expert, John Hawley, to examine how to broaden the scope of governance to include privileged users, contractors, and business partners, as well as controlling access to physical assets. You’ll also learn the important role of identity performance analytics in a governance deployment.
Excited about the new Windows 10 features? We are, too! Join this session to learn about how Microsoft Intune and System Center Configuration Manager are going to support and enhance new features in Windows 10 that unlock new scenarios and management options which weren't previously possible. Plus, explore improvements for deployment and upgrade in System Center Configuration Manager, Microsoft Intune, and Windows 10. Learn how Microsoft is gearing up to make the deployment and upgrade of Windows 10 using Configuration Manager or Intune the easiest yet.
Discover the Anatomy of Multivendor Security Orchestration
Multivendor integration can improve operational efficiencies, accelerate threat response, boost security ROI and greatly improve a company’s network security and compliance posture. In this webinar, Ms. Geisler breaks down the anatomy of security orchestration. In addition, you’ll learn how ForeScout is extending the visibility and control capabilities of ForeScout CounterACT® to its partners’ security management products, as well as:
- The role ForeScout ControlFabric® Architecture and ForeScout Extended Modules play in achieving rapid security orchestration
- Real-world security orchestration use cases
- Specific examples of how ForeScout helps leading security management vendors share information and automate security workflows and response
Jennifer Geisler , Vice President of Marketing, ForeScout Technologies
With 20 years of industry experience, Jennifer drives ForeScout’s corporate branding, content marketing and sales enablement initiatives. Prior to joining ForeScout, Jennifer held senior marketing positions at Packeteer (acquired by Blue Coat Systems), Cisco and Intel Security. Jennifer holds a bachelor’s degree in business from Wright State University.