In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.
The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
RecordedMar 12 201528 mins
Your place is confirmed, we'll send you email reminders
Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify
A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense.
In this webinar, we will share results from our recent primary research study that reveals:
• The top five application security risks
• Where these risks originate
• How to remediate these risks
• Best practices to protect your business, protect your customers
Data is at the heart of most major businesses in the new data economy. But the exponential growth in data generation and usage across Hybrid IT, IoT and other platforms is rendering current data security methods obsolete. In addition, government regulations, such as GDPR, increase the risk of heavy penalties for any data breach. A new approach merging data security and governance is needed.
This webinar will discuss:
• The new data economy and the challenges to data security
• Why businesses need both security and information governance when facing data growth, privacy challenges, industry and government regulations
• How the integration of Structured Data Manager and SecureData gives customers a key solution for Data Security Governance
John Delk, Chief Product Officer and GM, Security Product Group and Travis Grandpre, Director, Product Marketing, Micro Focus
With the close of the spin-merge of HPE Software with Micro Focus, the two organizations have joined forces to become the seventh-largest pure-play software company in the world.
As one of the largest security providers in the world, both HPE and Micro Focus bring together a portfolio of security solutions that bridges IT and protects what matters most—users, apps, data, and the interactions between them.
Join us for this webinar to hear John Delk, Chief Product Officer, and Security GM, discuss how the new combined security business combines an open architecture to free up access to data and industry-leading analytics to detect known and unknown threats.
Tamer El Refaey, Senior Director, Security Monitoring and Operations, du Telecom and Arun George, Regional Sales Manager, HPE
As a rapidly growing mobile and fixed line service provider, du Telecom was faced with protecting its growing network and IT infrastructure while controlling costs and efficiently managing IT operations. Recognizing this need, du Telecom embarked on a journey to transform its security operations as it knew that a strong security foundation — one that can automate security and compliance monitoring to cost-effectively support corporate growth — would be critical to its success. To achieve these goals, du Telecom turned to ArcSight.
Join this webinar to participate in a candid conversation with Tamer El Bahey, Senior Director - Security Monitoring & Operations at du Telecom, as he shares how the company simplified its security operations across the enterprise and laid the groundwork for an award winning Security Operations Center (SOC) using ArcSight SIEM solution. Learn from du Telecom's approach and lessons learned which resulted in reduced security expenditures by 85% in 3 years.
Register now to see how the power of ArcSight SIEM solution can also transform your Security Operation Center to operate more efficiently and protect against cyber threats.
Hunt teams are relative newcomers within the security operations domain. Many companies say they are doing “hunt” but when we dig deeper, we find the capabilities are ad hoc, with no measurable indicators of success nor formal organizational support. That means hunt teams are growing in popularity and use, but there is no “gold standard” yet for how they work. With increasing scarcity of skilled resources in cyber security and lack of efficient tools, it is challenging to build successful hunt practices inside an organization.
Join this webcast to:
•Gain a clear understanding of the current challenges of hunt and investigation procedures
•Learn how to build “hunt” capabilities that search for security breaches
•Increase speed, simplicity and effectiveness across the entire workflow of hunt and investigation with ArcSight’s new solution
Mary Writz is a seasoned professional with more than 15 years of experience in cyber security and, under her services leadership role, her team filed 9 patents and built a successful hunt practice with a focus on Big Data, machine learning and visualization. Alona Nadler is a senior product manager for ArcSight with a background in Big Data analytics platform.
Mary Karnes Writz, Head of Applied Innovation, HPE Security Professional Services
Have you been planning on establishing hunting capabilities but just can’t seem to get it started? Check out this webinar to gain a clearer understanding on hunt teams and their effectiveness.
This webinar will deep dive into successes and most importantly lessons learned from Hewlett Packard Enterprise’s own journey with leveraging emerging capabilities and hunting techniques with customers. From solving data ingestion challenges to detecting bank heists, learn from HPE’s years of building hunt teams.
Get a broader view of the ecosystem of breach hunting technology so you can execute your own successful hunt strategy.
Barak Klinghofer, Co-Founder and CPO, Hexadite and Steven Forsyth, RnD Manager, HPE Security ArcSight
The effectiveness of a security system depends on how quickly it detects and responds to threats. Is your security system able to tackle security challenges in near real time, while reducing false positives so analysts can focus on critical events and Indicators of Compromise (IOCs)?
HPE Security ArcSight ingests large volumes of security events and correlates against IOCs in real time to identify potential threats. Hexadite Automated Incident Response Solution (AIRS) takes these security alerts in real time and performs investigation and remediation at scale.
Learn how the combination of these two systems gives you the ability to:
• Gain visibility across the entire IT footprint
• Detect security threats in real-time
• Automate incident investigation
• Perform automated or semi-automated remediation actions
Taking your Security Operations Center (SOC) to the next level has never been more critical. Organizations around the globe are investing heavily in cyber defense capabilities to protect their most critical assets. Don’t miss this webinar to explore key findings from the 2017 State of Security Operations report on cyber defense organizations’ capabilities and maturity.
Learn what the most successful SOCs in the world are doing right, regional trends in the maturity of cyber defense capabilities and best practices to apply within your organization. Get the latest information on:
• Opportunities in automation
• Threat hunt teams and whether they are working
• New compliance regulations impacting SOCs
Register now and gain insight on the next steps your business can take to mature security operations in 2017.
With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting open standards and architectures.
By embracing new, innovative and open standards, security organizations can look to solve complex problems in a modern new way. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.
This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Using the right approach and the right technologies are important to addressing requirements of log data storage, analysis, analytics and advanced security monitoring. Learn why integration is key and where ArcSight comes in.
Chip Mesec, Product Manager and Sam Pierre, Product Marketing Manager, Hewlett Packard Enterprise
The challenge with detecting malware is that it easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way before you even notice it’s there. Hear how DNS operates and malware utilizes the DNS protocol to communicate with outside threats and exfiltrate data from an enterprise.
This webinar is ideal for IT and security managers who have limited experience with DNS or malware but are interested in how threats use this often overlooked protocol.
Viewers will learn:
•Practical strategies to protect your enterprise from bad DNS traffic
•Best practices for securing your DNS infrastructure
Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight
As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.
Join this presentation to learn:
•What's needed to enable visibility into millions of events per second
•How to provide context to the collected data
•Role of machine learning in real-time correlation and analytics
•How to prioritize security analyst tasks, optimize resources and save time
Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
Scott Johnson, Director of Product Management, Fortify
Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.
Viewers will learn:
- How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain
- How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
Connectors sound like a simple way of getting data from point A to point B. But that understates the tremendous power built into and delivered by connectors. This technical webinar discusses innovations in connectors to help customers detect threats originating from their cloud apps such as Office365, AWS and Box. Get an introduction to Quick Flex, the next-generation parser creation tool that makes connector upgrades quick and easy. Learn about the separation of the parser from the framework and its availability on HPE Security ArcSight Marketplace.
Have you been planning on establishing hunting capabilities but just can’t seem to get it started? Check out this webinar to gain a clearer understanding on hunt teams and their effectiveness. This webinar will deep dive into successes and most importantly lessons learned from Hewlett Packard Enterprise’s own journey with leveraging emerging capabilities and hunting techniques with customers. From solving data ingestion challenges to detecting bank heists, learn from HPE’s years of building hunt teams. Get a broader view of the ecosystem of breach hunting technology so you can execute your own successful hunt strategy.
Sue Barsamian, SVP and GM, HPE Security Products and Chandra Rangan, Vice President, Marketing, HPE Security Products
Get your questions answered and hear how the Spin-Merge benefits our abilities to deliver software for your security needs.
On September 7, Hewlett Packard Enterprise announced plans for a spin-off and merger of our Software business unit with Micro Focus, a global software company dedicated to delivering and supporting enterprise software solutions. The combination of HPE’s software assets with Micro Focus will create one of the world’s largest pure-play enterprise software companies. We will remain focused on helping you get the most out of the software that runs your business.
Join two of our HPE Software Enterprise Security leaders to hear firsthand about the recently announced spin-merge. Gain direct insight into what it means for you. This is a big opportunity for us to deliver even more of the Application Security, Data Security & Encryption, and SIEM organizations depend on in our fast moving world. Hear about our security portfolio strategy. Bring your questions and join us on this accelerated journey to success.
Sue Barsamian, SVP and General Manager HPE Security Products
In today’s increasingly connected digital world, your organization needs to adapt to how employees and customers want to use IT to do business. But to embrace innovative IT with confidence, you must protect against the threats that target people, the applications they use, and the devices and data they access. In this session, we will share how building security into the fabric of your IT infrastructure, together with giving Security Operations the tools to address threats intelligently, will enable you to power your business forward with confidence.
The third annual SANS survey on incident response will look at the continuing evolution of incident response, how tactics and tools have changed in the last three years and how security professionals are dealing with increasing numbers and kinds of attacks. The survey report and webcast will also look at key takeaways and recommendations for practitioners and management.
In this session, we will look at emerging trends in addition to survey results. Attendees will learn:
How integrated incident response tools are in the typical organization
What impediments hamper effective incident response
How budget allocations are projected to change over the next 12 months
Improvements planned in the next 12 months
Kerry Matre, Senior Product Marketing Manager, HPE Security & Christian Christiansen, Vice President Security Products, IDC
Disrupt Business of Hacking
Enterprises spend millions protecting themselves from adversaries and attempting to reduce their risk. Are their investments paying off? Hear from industry expert Chris Christiansen what organizations are doing to effectively make themselves less of a target for cyber criminals and how some enterprises make themselves an easier target for their adversaries. Gain insights on how these tactics have evolved over time and get a glimpse of what the future holds.
Join Forrester and HPE Experts discussing why enterprise investments in security aren’t having the desired impact due to reliance on point solutions and treating security as a silo, overlay function. Find out more about how Converged Security can help overcome these challenges:
A use-case driven approach enhancing current security practices
Integrates with existing security methods, creating a ‘security-by-design’ solution
Uses end-to-end collaboration to embed security throughout the IT service value chain
Jewel Timpe, Senior Manager at HPE Security Research
In a world where all devices now have global reach, risk is no longer contained to just one organization. Breaches now have collateral damage and legislation threatens security practitioners in unintended ways. Just as attackers continue to evolve their techniques, defenders must accelerate their approach to detection, protection, response, and recovery as we move into the concept of the digital enterprise.
Jewel Timpe, Senior Manager at HPE Security Research, will highlight our unique perspective on the attack surface. Drawing from the latest findings from the 2016 Cyber Risk Report, this session will provide critical guidance on responding to changing technology, impending regulatory changes, and reducing security threats in an interconnected world.
Leading Security Intelligence & Risk Management Enterprise Platform
Micro Focus is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products, the Micro Focus Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and data security & encryption technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit Micro Focus Enterprise Security at: www.hpe.com/security