Hi [[ session.user.profile.firstName ]]

5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA

Explore cyber crime in Europe

For its 2014 Cost of Cyber Crime study, the Ponemon Institute expanded its focus in Europe to encompass the Russian Federation, as well as France, Germany, and the United Kingdom. Collectively, the institute surveyed 137 companies in Europe in a study that found broad differences in the reported costs of cyber crime across the region. The per-company average ranged from $3.3 million in the Russian Federation to $8.1 million in Germany.

The study results indicate that over the course of the year, cyber crime rose 20.5% in France, 17.4% in the U.K., and 7.2% in Germany. For a closer look at these and other findings from the institute’ European research, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, for our EMEA Security webinar.
Recorded Oct 8 2014 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
Presentation preview: 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for managing privileged identities in a hybrid world Nov 14 2018 6:00 pm UTC 60 mins
    Lacy Gruen and Tim Sedlack, Micro Focus
    One of the biggest challenges organizations with hybrid infrastructures face today is managing access across their complex and disparate systems – specifically privileged access. In the name of productivity, privileged access is provisioned to identities who need to perform administrative tasks. Those identities with elevated rights bring the most risk to an organization because they have the ability to do the most harm if their credentials are stolen or misused. This is why organizations must seek out solutions to get their privileged identities under control before they face a major data breach, network incident or, at the very least, a failed audit. However, employing the principle of least-privilege, where identities only have the correct level of access (no more, no less) can be difficult. This session will discuss best practices for privilege management in a hybrid world and how to reduce risk with a comprehensive, identity-based approach.

    Why attend this webinar?
    • Understand the amount of risk privileged identities pose to your organization
    • Hear best practices for managing privileged access across your hybrid infrastructure
    • Learn how Micro Focus can help you implement an identity-powered strategy
  • Five Steps to Efficient and Secure Office 365 Management Oct 24 2018 5:00 pm UTC 60 mins
    Lacy Gruen and Dennis Powell, Micro Focus
    Whether you have already implemented Office 365 or are considering the move, this is a session you don’t want to miss. Organizations who transition to Office 365 as part of a hybrid strategy experience a common set of management challenges. Many struggle to effectively manage privileges in both their Azure AD and on-premises Active Directory. The fact is that challenges around user provisioning, policy enforcement, and governance can prevent you from realizing the full value of your hybrid approach – and open your organization up to unnecessary risk. This session will describe five ways that you can more efficiently and securely manage your cloud and on-premises environment to get more return on your investment.

    Why attend this session?
    • Discover the most common challenges that accompany Office 365 implementations
    • Learn five steps that you can take to improve efficiency, security, and governance
    • Hear how Micro Focus can help you automate Office 365 and Azure AD management
  • Live Webinar: Enabling complete privacy protection from legacy to modern IT Recorded: Sep 20 2018 27 mins
    Simon Wilkinson, Anna Russell, Daniel Clift, Brendan Rizzo
    During this session, we’ll introduce you to modern-day data security challenges.

    You’ll learn how Micro Focus Voltage can help you to overcome these challenges, while also improving operational efficiency, compliance, and revenue generation.

    We’ll also share real-world examples of how Voltage has enabled the world’s leading organisations to:

    •Scale big data security, by protecting big data streaming into and beyond the data lake, allowing secure analytics to be enabled on protected data at massive scale

    •Reduce high cost of compliance for data protection regulations, by protecting card data immediately after capture and minimising PCI audit scope

    •Secure workloads to the cloud, by seamlessly protecting data consistently across hybrid IT infrastructure, accelerating new business models

    This live webinar will be presented by:

    - Simon Wilkinson, EMEA Cyber & Security Strategist, Micro Focus
    - Anna Russell, Head of Data Security Consulting, Micro Focus
    - Daniel Clift, Senior Sales Engineer, Micro Focus
    - Brendan Rizzo, Senior Sales Engineer, Micro Focus
  • Deploying multi-factor authentication on mobile platforms Recorded: Aug 29 2018 47 mins
    Brent Kynaston, TriVir LLC and Kent Purdy, Micro Focus
    Do you have mobile platforms in your organization? Are you interested in eliminating usernames and passwords on iOS, Android and Windows mobile devices and tablets?

    In this webinar you’ll learn:

    • How multi-factor credential enrollment and usage can be provisioned along with enterprise identity into the VMWare AirWatch, IBM MaaS360 and MobileIron environments as well as others
    • How to enable convenient access with tighter security and an improved experience for users and mobile developers alike
    • How easy it is to escape inefficient password processes, get away from resetting forgotten passwords, and enforcing strong passwords that are easily forgotten

    Register today to hear from Brent Kynaston, Principal Solutions Architect at TriVir LLC, a Virginia-based Identity and Access Management (IAM) integrator, and Kent Purdy of Micro Focus.
  • Key trends and application security risks from the 2018 AppSec Risk Report Recorded: Aug 28 2018 49 mins
    Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify
    Fortify on Demand analysis shows broad vulnerability in apps. The majority of web or mobile applications we analyzed had at least one critical or high severity issue. Furthermore, 1 out of 2 apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    The biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer. That’s why it is important that organizations take a holistic view and include application security and vulnerability assessment as part of their software development program.

    In this webinar, we will share results from our recent primary research study that reveals:
    • The top application security risks
    • Where these risks originate
    • How to remediate these risks
    • Best practices to protect your business
  • How to manage and protect privacy throughout the data lifecycle Recorded: Jul 26 2018 39 mins
    Marcelo Delima, Product Marketing Manager-Security and Ali ElKortobi, Director, Product Management-IM&G, Micro Focus
    It has been said that 2018 is the year we lost our privacy. But regulators are enacting new legislation--or enforcing existing laws--to ensure that we gain our privacy back. This raises the stakes for enterprises around the world to improve data governance and protection throughout its lifecycle. Strategies for risk mitigation include an interlock of tools and techniques to improve information governance and protect data.

    The Micro Focus Data Privacy Manager is a comprehensive solution to address the privacy governance needs of enterprises. The solution enables customers with the ability to manage and protect sensitive structured data throughout its lifecycle, from discovery and classification to protection and reporting from a single pane of glass.
  • Code with Speed…and Security: Gamified Developer AppSec Training (2018) Recorded: Jul 16 2018 38 mins
    Matias Madou, Ph.D., Co-Founder and CTO, Secure Code Warrior and Dylan Thomas, Sr. Product Manager, Micro Focus Fortify
    Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.

    Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
  • How to Secure Email Communications and Improve Compliance Recorded: Jun 14 2018 36 mins
    Marcelo Delima, Micro Focus and Michael Osterman, Osterman Research
    The consequences of compliance violations are becoming more severe. GDPR, HIPPA, state laws and other privacy legislation are increasing the cost of data breaches and making the protection of personal data an issue of the highest importance. Email encryption is a key part of tool set required to protect sensitive personal data and comply with legislation. Learn about the challenges of complying with legislation and what characteristics an email encryption solution must have to provide the best possible protection for your most valuable data.
  • Endpoint Management Roadmap Review Recorded: Jun 13 2018 64 mins
    Jason Blackett, Micro Focus
    Come and find out what’s happening in Endpoint Management at Micro Focus. This session will be presented by Jason Blackett and other members of the Product Management team. They will discuss the upcoming product roadmap for products including ZENworks, Service Desk, Desktop Containers and ZENworks Mobile Workspace.
  • Switching from ZENworks Linux Based Imaging to WinPE Based Imaging Recorded: Jun 12 2018 59 mins
    Jason Blackett, Micro Focus
    Join us as we take a deep dive into the Windows PE Based Imaging capabilities introduced in ZENworks 2017 Update 2. Learn how to use this new imaging solution to avoid common problems such as imaging unsupported hardware.
  • Accelerate Data Protection Time-to-Value in Hybrid IT Recorded: May 31 2018 27 mins
    Carole Murphy, Global Product Marketing, Data Security (Voltage)
    The rapid adoption of cloud applications creates new risks, as data is constantly flowing to and from on-premises systems and cloud services. Strict privacy regulations such as GDPR, PCI DSS, and HIPAA, along with limited trust in hosted environments, could expose valuable data. Find out how to simplify and accelerate data-centric security deployment in cloud, commercial, and in-house applications, without critical application changes or integration required.
  • Building Out your B2C Cloud in a Way that Scales Recorded: May 23 2018 42 mins
    Jerry Combs, Principal Architect, Pointblue Technology and Kent Purdy, Micro Focus
    Implementing an access management system that provides services to the public presents many challenges that are not found in typical enterprise implementations. Chief among these are issues of scale as public facing systems typically serve many thousands or even millions of end users. Business-to-Consumer (B2C) and Government-to-Citizen (G2C) systems require processes, tools, and methodologies that allow a high degree of automation and self-service. Manual administration of such large numbers of user identities is simply not practical.

    In this webinar we will describe the challenges typical of public facing access management systems and an approach to solving them.
  • How Mobile Developer Mistakes Lead to Vulnerabilities Recorded: May 10 2018 41 mins
    Ray Kelly, Practice Principal, Fortify on Demand, Micro Focus
    One of today’s hottest targets for hackers is mobile apps. Whether it's inexperience, rush to market or poor coding techniques, hackers are exploiting mistakes made by mobile app developers and it can be quite costly for companies. In this Webinar, you will see attack vectors for mobile apps and see real examples of vulnerable applications and how they were exploited.
  • Top 5 Methods To Ensure Your Governance Project Succeeds Recorded: May 9 2018 43 mins
    Kevin Beaver, CISSP, Independent Information Security Consultant & Author and Jamie Manuel, Micro Focus
    Governance is all about ensuring that your policies are being followed and the right people have the right access to do their jobs, at the right time. There are many compliance regulations that come into play here as well and a lot of different tools available to tackle these challenges.

    In this 30 minute webinar, we will be joined by independent Information Security expert and author Kevin Beaver, who will discuss his top 5 tips to ensuring success as you roll out your governance project. Whether you are just getting started, or deep into your project – these tips can help you to ensure that your time and investment is a success.
  • SIEM Use Cases & ArcSight Content Brain Demo Recorded: May 3 2018 31 mins
    Charles Clawson, ArcSight ESM Product Marketing Manager, Micro Focus
    In this webinar, we discuss the importance of establishing a formal use case program to systematically onboard more data feeds, and use them to drive more security use cases. We also demo the exciting free web-based ArcSight Content Brain tool which provides you with many of the best practice use cases and ESM content to help your team find and plan out the deployment of our marketplace ESM packages.
  • Avoiding the Top IAM Pitfalls of a Hybrid Environment Recorded: Apr 25 2018 60 mins
    Paul McKeith and Kent Purdy, Micro Focus
    If you’re still in the early stages of cloud migration, you’re probably still distilling the details of what it takes to create and manage identities across all your environments. No doubt hybrid cloud environments present new challenges to delivering convenient and secure access for all your users, both internal and consumer based.

    Come learn about some of the nuances of hybrid IAM that have the potential to be gotchas.
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity Recorded: Apr 17 2018 53 mins
    Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop)
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [Live Interview from RSA] Mary Writz on AI and Machine Learning Security Trends Recorded: Apr 17 2018 21 mins
    Mary Writz, Director of Product Management at Micro Focus
    Join Mary Writz, Director of Product Management at Micro Focus for a live interview with Jessica Gulick, Founder & CEO of KATZCY from RSA 2018 as they discuss everything from the conference, cybersecurity trends and AI and Machine Learning.
  • Creative Ways that Organizations are using Advanced Authentication Recorded: Apr 11 2018 58 mins
    Kent Purdy and Troy Drewry, Micro Focus
    As organizations realize that today's users expect their digital interactions to be convenient, seamless, and above all secure, demand for new types of authentication heightens.

    In this session we’ll talk about the new ways organizations are using the latest authentication technologies and how they’re preparing the future.
  • Gaining Insight With Identity Analytics Recorded: Mar 29 2018 39 mins
    Jamie Manuel and Patrick Gookin, Micro Focus
    Your identity governance and administration relies on your organization’s ability to make informed decisions about user access and entitlements. There’s an old adage in data quality management that states ‘garbage in, garbage out.’ If your administrators and approvers don’t have the necessary intel, how can they be sure they are making the appropriate decisions?

    This webcast will take a look at the importance of leveraging analytics to make informed decisions about identity and access. We will discuss the types of data that can be used, how it can be collected and how you can leverage this additional insight in order to better protect your organization.
Leading Security Intelligence & Risk Management Enterprise Platform
Micro Focus is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products, the Micro Focus Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and data security & encryption technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit Micro Focus Enterprise Security at: www.hpe.com/security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5th Annual Ponemon Cost of Cyber Crime Study Results: EMEA
  • Live at: Oct 8 2014 2:00 pm
  • Presented by: Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
  • From:
Your email has been sent.
or close