Hi [[ session.user.profile.firstName ]]

The cost of inaction—what cyber crime could cost your business

Cyber Crime cost US companies an average of $15 million in 2015 – a significant increase from a year earlier. It’s a troubling trend unearthed by the Ponemon Institute’s 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction. In this Webinar Dr. Larry Ponemon and

HP CISO Brett Wahlin will explain how to craft an effective preemptive security strategy. You’ll learn:


-What cyber crimes are most common and most costly
-The hidden internal and external costs you incur
-What security defenses are most effective in reducing losses
-How businesses with a strong security posture drive down costs
Recorded Oct 19 2015 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Larry Ponemon, Chairman of the Ponemon Institue & Brett Wahlin, VP and CISO of HP
Presentation preview: The cost of inaction—what cyber crime could cost your business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building Out your Cloud B2C in a Way that Scales May 23 2018 3:00 pm UTC 60 mins
    Jerry Combs, Principal Architect, Pointblue Technology and Kent Purdy, Micro Focus
    Implementing an access management system that provides services to the public presents many challenges that are not found in typical enterprise implementations. Chief among these are issues of scale as public facing systems typically serve many thousands or even millions of end users. Business-to-Consumer (B2C) and Government-to-Citizen (G2C) systems require processes, tools, and methodologies that allow a high degree of automation and self-service. Manual administration of such large numbers of user identities is simply not practical.

    In this webinar we will describe the challenges typical of public facing access management systems and an approach to solving them.
  • How Mobile Developer Mistakes Lead to Vulnerabilities May 10 2018 5:00 pm UTC 60 mins
    Ray Kelly, Practice Principal, Fortify on Demand, Micro Focus
    One of today’s hottest targets for hackers is mobile apps. Whether its inexperience, rush to market or poor coding techniques, hackers are exploiting mistakes made by mobile app developers and it can be quite costly for companies. In this Webinar, you will see attack vectors for mobile apps and see real examples of vulnerable applications and how they were exploited.
  • Top 5 Methods To Ensure Your Governance Project Succeeds May 9 2018 7:00 pm UTC 45 mins
    Kevin Beaver, CISSP, Independent Information Security Consultant & Author and Jamie Manuel, Micro Focus
    Governance is all about ensuring that your policies are being followed and the right people have the right access to do their jobs, at the right time. There are many compliance regulations that come into play here as well and a lot of different tools available to tackle these challenges.

    In this 30 minute webinar, we will be joined by independent Information Security expert and author Kevin Beaver, who will discuss his top 5 tips to ensuring success as you roll out your governance project. Whether you are just getting started, or deep into your project – these tips can help you to ensure that your time and investment is a success.
  • Avoiding the Top IAM Pitfalls of a Hybrid Environment Recorded: Apr 25 2018 60 mins
    Paul McKeith and Kent Purdy, Micro Focus
    If you’re still in the early stages of cloud migration, you’re probably still distilling the details of what it takes to create and manage identities across all your environments. No doubt hybrid cloud environments present new challenges to delivering convenient and secure access for all your users, both internal and consumer based.

    Come learn about some of the nuances of hybrid IAM that have the potential to be gotchas.
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity Recorded: Apr 17 2018 53 mins
    Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop)
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [Live Interview from RSA] Mary Writz on AI and Machine Learning Security Trends Recorded: Apr 17 2018 21 mins
    Mary Writz, Director of Product Management at Micro Focus
    Join Mary Writz, Director of Product Management at Micro Focus for a live interview with Jessica Gulick, Founder & CEO of KATZCY from RSA 2018 as they discuss everything from the conference, cybersecurity trends and AI and Machine Learning.
  • Creative Ways that Organizations are using Advanced Authentication Recorded: Apr 11 2018 58 mins
    Kent Purdy and Troy Drewry, Micro Focus
    As organizations realize that today's users expect their digital interactions to be convenient, seamless, and above all secure, demand for new types of authentication heightens.

    In this session we’ll talk about the new ways organizations are using the latest authentication technologies and how they’re preparing the future.
  • Gaining Insight With Identity Analytics Recorded: Mar 29 2018 39 mins
    Jamie Manuel and Patrick Gookin, Micro Focus
    Your identity governance and administration relies on your organization’s ability to make informed decisions about user access and entitlements. There’s an old adage in data quality management that states ‘garbage in, garbage out.’ If your administrators and approvers don’t have the necessary intel, how can they be sure they are making the appropriate decisions.

    This webcast will take a look at the importance of leveraging analytics to make informed decisions about identity and access. We will discuss the types of data that can be used, how it can be collected and how you can leverage this additional insight in order to better protect your organization.
  • Act: Breach Detection, Response & Reporting - Is Your SecOps Team Ready? Recorded: Mar 28 2018 32 mins
    Petr Hnevkovsky, Security Solutions Architect, Micro Focus
    Can I report a breach within the timeline required by the GDPR?

    Sweeping cybercrime related data breaches under the rug is no longer an option. In addition to the impact to your brand and reputation, failure to comply will come with sanctions and penalties.

    You need to enable Level 1 analysts to investigate alerts faster and with better insights using analytics-driven, guided investigation tools to accelerate both detection and remediation to comply with GDPR notification guidelines effectively.

    In this webinar, learn how you could use Micro Focus ArcSight to detect and investigate data breaches and identify areas of non-compliance.
  • Precision, speed and scalability with Instant Connector Deployment Recorded: Mar 6 2018 18 mins
    Viktor Doundakov and Madhura Chopda, Micro Focus
    Unleash the power to scale with ArcSight in a world of exponentially growing data and increasingly diversified sources. This webinar demonstrates how ArcSight’s new Instant Connector Deployment feature simplifies and improves efficiency of installation of Connectors. Onboarding new sources has never been easier!

    Learn how you can improve efficiency of connector installation and increase scalability of your security operations center.
  • ArcSight Event Broker – Above and Beyond Kafka Recorded: Feb 14 2018 44 mins
    Viktor Doundakov, Micro Focus
    Today’s attacks are more complex and advanced, and data volume, variety and velocity are increasing every day with new data coming from IoT, mobile, IT, and other sources. To stay ahead of these threats, the Security Operations Centre must re-architect itself to embrace big data and analytics. ArcSight’s intelligent Event Broker message bus provides an open architecture that allows the use of clean, enriched security data with the best of breed technologies to prepare the enterprise for today’s threat scenario and that of the future. Learn how ArcSight’s Event Broker goes above and beyond Kafka to offer an open, highly scalable, easy-to-use, out-of-box security data collection and distribution solution.
  • Accelerating business transformation through GDPR compliance Recorded: Feb 1 2018 16 mins
    Roundtable chaired by Doug Drinkwater, IDG, David Kemp, Micro Focus
    In this Micro Focus roundtable, leading experts discuss how CISOs can prepare for these pivotal changes, from the need for security monitoring tools to the importance of liaising closely with regulators in the event of a security incident.

    This new data protection legislation could actually help the business drive innovation, with the CISO at the forefront of this change.

    From the potential threat of huge fines for non-compliance and data breaches to mandatory data breach notifications and stricter rules around the use of personal data, CISOs face a tough job to ensure compliance by the regulation’s effective date of 25 May 2018.

    For more information visit https://www.gdprandbeyond.com/
  • Top 5 Application Security Risks Threatening Your Business Today Recorded: Jan 17 2018 38 mins
    Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify
    A single weak point in a line of code can create an open door for attackers. Threats originating from applications are now more pervasive than ever. We believe that the best defense against application vulnerabilities is a good offense.

    In this webinar, we will share results from our recent primary research study that reveals:
    • The top five application security risks
    • Where these risks originate
    • How to remediate these risks
    • Best practices to protect your business, protect your customers
  • Shift Left: 3 Steps to Get Your Developers Involved in Security Recorded: Jan 17 2018 35 mins
    Erdem Menges and James Rabon, Micro Focus
    Every business today uses data and many businesses now interact with their customers and partners through web and mobile applications. Securing the increasing number of applications needed to run the business while maintaining release deadlines and development budgets is only achievable when application security is a part of the software development process.

    Shifting application security to the left is a concept that integrates security testing into the early stages of development to improve effectiveness and minimize the effort and cost for development and security teams.
  • Mapping Encryption to GDPR requirements: Best practices on practical use cases Recorded: Dec 5 2017 62 mins
    Mark Bower, Global Director, Product Management - Data Security, Micro Focus
    The clock on GDPR is ticking with the May 2018 enforcement date looming. All businesses that handle EU citizen data will eventually be impacted. Compliance risks are material to many US and global firms, with fines and remediation costs potentially an order of magnitude larger than all other regulations combined. The challenge is to maintain legitimate data use for business opportunities, while deploying non-disruptive controls that lower risk of data breaches and exposure to whistleblowers.

    This session will take a practical view to illustrate how format-preserving encryption maps specifically to GDPR requirements. We’ll walk through practical customer use cases involving EU data in a large enterprise, with Big Data and hybrid enterprise IT examples. Attendees can learn how our advanced FPE technology solves complex regulatory issues quickly, while also enabling data-driven organizations to increase the use of data for decisions, even under aggressive regulatory controls.
  • Harnessing the Hadoop Ecosystem Recorded: Dec 5 2017 62 mins
    Reiner Kappenberger, Micro Focus, Rohit Sinha, Cask, Danil Zburivsky, Pythian
    With a stake at the center of how organizations are consuming and leveraging big data, Hadoop adoption in the enterprise is growing steadily. In fact, a recent survey conducted over the subscribers of Database Trends and Applications found 55% of respondents currently use the platform and 44% have four or more clusters. To understand key challenges and use cases, attend this roundtable webinar. You'll learn:

    • How real companies are using technologies shaping the future of data management
    • Key challenges to enabling data access, data sharing and data privacy
    • Critical success factors require best practices in governance and data security
  • Many Motivations to GDPR Compliance Recorded: Nov 21 2017 64 mins
    Louis Vieille-Cessay, Bus Dev Mgr, IM&G and Sudeep Venkatesh, Global Head of PreSales, Data Security, Micro Focus
    They say “risk has its rewards”. True enough. However, when it comes to the General Data Protection Regulation (GDPR), what’s your worst case scenario? A major data breach—with headlines stating there was no GDPR compliance program in place to protect the personal data privacy of your customers, employees and other EU residents…And, the potential litigation and damages that follow. The GDPR is actually telling you how to defend yourself properly, how to reduce your security risk exposure with best practices for information governance and security. If you have interest in becoming more agile with big data analytics and workloads in the cloud, in acquiring and processing high-value data in your business, or working in regulated industries, then GDPR compliance becomes a strategic investment. Find out how to get started with your GDPR compliance program to reduce your risks—and gain the rewards.

    What Attendees will learn:

    - Best practices for how organizations are discovering, classifying and protecting data as part of their GDPR compliance strategies.
    - Policy driven retention management
    - Key steps to get started
    - Best practices for a holistic governance and security approach
  • Data Security Governance: What it is and how can you achieve it Recorded: Oct 26 2017 34 mins
    Marcelo Delima and Ali ElKortobi, Micro Focus
    Data is at the heart of most major businesses in the new data economy. But the exponential growth in data generation and usage across Hybrid IT, IoT and other platforms is rendering current data security methods obsolete. In addition, government regulations, such as GDPR, increase the risk of heavy penalties for any data breach. A new approach merging data security and governance is needed.

    This webinar will discuss:

    • The new data economy and the challenges to data security
    • Why businesses need both security and information governance when facing data growth, privacy challenges, industry and government regulations
    • How the integration of Structured Data Manager and SecureData gives customers a key solution for Data Security Governance
  • Discover the New: Security Recorded: Oct 3 2017 30 mins
    John Delk, Chief Product Officer and GM, Security Product Group and Travis Grandpre, Director, Product Marketing, Micro Focus
    With the close of the spin-merge of HPE Software with Micro Focus, the two organizations have joined forces to become the seventh-largest pure-play software company in the world.

    As one of the largest security providers in the world, both HPE and Micro Focus bring together a portfolio of security solutions that bridges IT and protects what matters most—users, apps, data, and the interactions between them.

    Join us for this webinar to hear John Delk, Chief Product Officer, and Security GM, discuss how the new combined security business combines an open architecture to free up access to data and industry-leading analytics to detect known and unknown threats.

    Join us and Discover the New Security!
  • How Du Telecom Streamlined Its Security Ops with HPE ArcSight SIEM Solution Recorded: Jun 13 2017 51 mins
    Tamer El Refaey, Senior Director, Security Monitoring and Operations, du Telecom and Arun George, Regional Sales Manager, HPE
    As a rapidly growing mobile and fixed line service provider, du Telecom was faced with protecting its growing network and IT infrastructure while controlling costs and efficiently managing IT operations. Recognizing this need, du Telecom embarked on a journey to transform its security operations as it knew that a strong security foundation — one that can automate security and compliance monitoring to cost-effectively support corporate growth — would be critical to its success. To achieve these goals, du Telecom turned to ArcSight.

    Join this webinar to participate in a candid conversation with Tamer El Bahey, Senior Director - Security Monitoring & Operations at du Telecom, as he shares how the company simplified its security operations across the enterprise and laid the groundwork for an award winning Security Operations Center (SOC) using ArcSight SIEM solution. Learn from du Telecom's approach and lessons learned which resulted in reduced security expenditures by 85% in 3 years.

    Register now to see how the power of ArcSight SIEM solution can also transform your Security Operation Center to operate more efficiently and protect against cyber threats.
Leading Security Intelligence & Risk Management Enterprise Platform
Micro Focus is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products, the Micro Focus Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and data security & encryption technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit Micro Focus Enterprise Security at: www.hpe.com/security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The cost of inaction—what cyber crime could cost your business
  • Live at: Oct 19 2015 4:50 pm
  • Presented by: Dr. Larry Ponemon, Chairman of the Ponemon Institue & Brett Wahlin, VP and CISO of HP
  • From:
Your email has been sent.
or close