Every year Secunia releases a review of the vulnerability landscape, based on its vulnerability research and data from its Personal Software Inspector (PSI) user base.
The data in this research helps security professionals around the globe make sense of the evolution of the threat landscape and the trends throughout the year.
In this webinar, Secunia’s CTO, Morten Stengaard and Head of Research, Kasper Lindgaard, will interpret the data presented in the Secunia Vulnerability Review 2014 and answer questions. The review will be released on 26th February at 20:00 CET.
Before 26th February, you can pre-register to receive a copy of the review as soon as it is released, at:
-The number of vulnerabilities and zero-days detected in 2013
-The security state of browsers and PDF readers
-How quick vendors are to respond to vulnerabilities
-Which programs are more vulnerable
RecordedMar 20 201439 mins
Your place is confirmed, we'll send you email reminders
Kelley Mak, Analyst, Forrester Research and Marcelo Pereira, Product Marketing Manager, Flexera Software
Vulnerability management is a necessary instrument for threat and risk reduction in enterprise environments. Yet, many organizations struggle to put a program in place that provides value to the enterprise beyond baseline compliance requirements. This is often due to challenges in three key areas of vulnerability management: discovery, prioritization, and remediation.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how enterprises can activate the full potential of their vulnerability management programs. Together with Flexera Software’s Marcelo Pereira, he will discuss how to combine principles of vulnerability management to other areas of operations management to efficiently improve security baseline.
John Pescatore, Director of Emerging Security Trends at SANS, Dylan Hudak and Marcelo Pereira from Flexera Software
Despite the awareness that patching plays an important role in every organizations security, we continue to see incidents in which software vulnerabilities are a root cause, or enabler of security breaches. We believe that a different perspective to patch management is the key to prioritize patching, reducing work load and improving the security baseline for organizations.
This webinar is for those in charge of scoping, supporting and executing patch management strategies. We talk about patch management in the context of security and will show how our solution, Corporate Software Inspector, can help organizations extend the scope of their Microsoft System Center implementation to prioritize patching of non-Microsoft applications.
One of the biggest challenges organizations face when trying to reduce the attack surface for cybercriminals and hackers is the lack of visibility and control over their IT environments, devices and applications. The ever growing number of software vulnerabilities makes it even more critical to leverage data from Software Asset Management (SAM) programs to help reduce security risk.
In this webinar, you will hear how to leverage existing SAM data sources such as discovery and inventory data, unlicensed and unauthorized software, along with vulnerability intelligence data, to drive mitigation of security risk through effective reduction of the attack surface.
Kasper Lindgaard – Director of Secunia Research at Flexera Software
Every year, Secunia Research at Flexera Software releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Personal Software Inspector user base.
The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.
In this webinar, Director of Secunia Research at Flexera Software, Kasper Lindgaard will discuss the data presented in the Vulnerability Review 2016 and answer questions. The review itself is released on March 16.
-The number of vulnerabilities and zero-days detected in 2015
-How quick vendors are to respond to vulnerabilities
-Which programs have the most vulnerabilities
Amar Singh, Chair of ISACA's UK Security Advisory Group, Executive Board Member UK National MBA in Cyber Security
If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
Marcelo Pereira, Product Marketing Manager at Flexera Software
As we enter 2016, there is one certainty we all can have: we will continue to see costly breaches using well known vulnerabilities.
In this webinar, Marcelo Pereira will talk about the challenges that stop organizations implementing simple security best practices and suggest New Year’s resolutions related to Software Vulnerability Management that can help reduce the attack surface for cybercriminals and hackers.
Marcelo Pereira, Product Marketing Manager & Peter Jancso, Product Manager
Flexera Software just released Vulnerability Intelligence Manager 2016 - the first of the former Secunia products to be released under the Flexera Software brand.
Join us for an introduction and demo of Vulnerability Intelligence Manager 2016 and learn how the intelligence from Secunia Research and the functionality of the product can help your organization effectively reduce the attack surface for cybercriminals and hackers!
There is a critical relationship between Software Asset Management (SAM) and cyber security. Both disciplines require at their foundation the accurate and continual discovery and inventory of software assets within an organization's environment. Today IT asset management and security teams (and projects) are usually siloed within organizations, increasing the likelihood that security threats will slip through the gap. For instance, discovery and inventory of software assets are critical to both asset management and security teams - but are currently undertaken separately in most organizations.
Organizations able to leverage asset management insights combined with vulnerability data to rapidly address the most relevant cybersecurity threats will be ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers. That means they will be also better prepared to identify and respond to breaches.
Join Flexera Software’s VP and Chief Architect, Santeri Kangas to hear about how these two disciplines can help organizations be more efficient and more secure.
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is focused on a strategic view of risk mitigation:
Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
-Fresh data related to software vulnerabilities
-The challenge of prioritizing mitigation
-How the use of vulnerability intelligence can help support consistent risk reduction
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is for business leaders who wish to understand vulnerabilities on commercial software and how they can impact organizations:
Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
-What is a software vulnerability
-How a software vulnerability becomes a threat
-A glimpse of how threats multiply
-How closing vulnerabilities impacts risk reduction
Amar Singh, Chair of ISACA's UK Security Advisory Group, Exec. Board Member & Consultant to UK's National MBA in Cyber Sec.
Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.
While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.
Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia
Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.
Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.
The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.
The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.
In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.
In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.
Attend this session and learn:
· How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
· How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
· How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
Andrei Vilcan, Head of Information Security, Banca Transilvania
In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.
About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
Marcelo Pereira, Business Development and Analyst Relations, Secunia
Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.
Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.
The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.
In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.
Fundamentals to reduce risk through vulnerability and asset management
Managing and securing software assets through the entire asset lifecycle is key to the overall security of organizations across the globe. In this channel, Flexera Software shares knowledge, research and experience about software licensing, compliance and vulnerability management to help you overcome the challenges you face in managing and securing your assets.
Speakers include in-house technical and process specialists, customers and industry thought leaders who will talk about a variety of topics and present timely information and data on software vulnerabilities and software asset management.
Digital transformation is a top business priority and it includes embracing consumer trends around mobility. However, recent stats on the state of mobile app development in the enterprise are dismal. Gartner has also concluded that the enterprise mobile app journey is a complicated one for IT.
All too often mobile apps fail before they’re off the ground because companies try to do too much, too quickly. The road to digital transformation – and mobile – is a journey, not a race.
Join Tom Ku, VP Enterprise Mobility and hear him share our recommendation around breaking this journey down into digestible, easy to rollout and test steps before achieving ultimate mobile nirvana!
The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.
It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.
Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:
* The Threat Landscape in the Nordics
* Trends and Insights in Malware detections across the Nordics
* Geopolitical situations which can influence the threat landscape in the Nordics
* How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.
Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
Data is more valuable than ever. Yet BI adoption rates hover around 22% and project costs keep skyrocketing, leaving few companies with measurable ROI from their analytics programs.
Join analyst Surya Mukherjee, of leading global advisory firm Ovum, as we discuss best practices and common pitfalls when building an ROI business case to justify your investment in analytics. Mukherjee will cover key metrics that are often overlooked, such as faster decision making, and reduced time to value, and how to quantify them. Finally we will discuss how search-driven analytics can skyrocket BI adoption and help you achieve rapid ROI.
In this webinar, you will learn:
1. How to build a business case for analytics
2. Best-practices and common pitfalls for achieving ROI in a short time
3. Examples of ROI achieved with search-driven analytics
If you’re still spending days to provision infrastructure services, or weeks to deploy applications, it’s time to turn automation on. Join us and learn how you can automate the delivery and management of shared services, infrastructure, and applications.
What you will learn by attending this webcast:
- Tips on managing the dynamic hybrid cloud and providing on-demand infrastructure services
- How the California Department of General Services automated the delivery of virtualized compute, storage, and networking
- Why hybrid cloud capabilities are key to building a unified environment
l est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.
Assistez à notre webinar en direct sur la sécurité des terminaux
•Les coûts cachés d'un antivirus classique pour votre entreprise
•Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
•Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
•Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique
Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.
Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.
Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
Bimodal IT is putting even the most talented development teams to the test. No matter if you support or oppose the idea of two distinct speeds of IT, you’ll want to hear Jason Bloomberg from Intellyx and Deloitte’s Rui Vaz debate and discuss the realities of taking a bimodal approach.
Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
Smart Storage for the cloud IT is effortless, efficient and evergreen. In this webinar, learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.
We will cover:
- What is possible with flash?
- What flash solutions are available today?
- How do the costs compare?
- Pure Storage architecture overview
- Demonstration of storage provisioning tasks
Hadoop is a wonderful framework that can drive insight into a range of problems, but administrators can be blind to performance, utilization and cost issues of cluster deployments. There’s risk in sizing initial deployments properly, as well as determining optimal capacity over time. Without sufficient visibility, job performance can suffer and costs can escalate. Keeping a critical resource running effectively and being able to plan for the future requires intelligent decision making capabilities that many Hadoop deployments lack. This webinar will look into common problems that affect clusters and ways to detect issues early and head off long term problems. We’ll dig into capacity management and ways to deal with ever increasing demands for Hadoop resources.
• Understand initial deployment challenges
• Handling cluster growth
• Working to meet increasing pressure on storage and job density
• Planning for capacity growth and extension to cloud