Hi [[ session.user.profile.firstName ]]

CISO Perspective: How to Prepare for GDPR

The GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018 and requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organization will need to start planning now to achieve compliance and mitigate the risk of high fines for failing to comply.

That's where AlienVault can help. In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault has approached the GDPR compliance process internally, along with how our Unified Security Management (USM) platform can help accelerate and simplify your path to compliance.

Join this webcast to learn:

- Best practices for approaching GDPR compliance
- How to assess your level of readiness and build your roadmap to compliance
- How a unified security toolset can both expedite and simplify this process

We'll also provide a brief demo of the USM platform to illustrate some of the technical controls you need in place TODAY for compliance.

Hosted By
Sacha Dawes
AlienVault Principal Product Marketing Manager

Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
Recorded Mar 15 2018 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sacha Dawes, Principal Product Marketing Manager, AlienVault
Presentation preview: CISO Perspective: How to Prepare for GDPR

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • New (and free) analysis tools for the cyber threat hunter Jun 11 2020 3:00 pm UTC 59 mins
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • What SD-WAN means for your cybersecurity program Recorded: May 21 2020 56 mins
    Mary Blackowiak Lead Product Marketing Manager, AT&T Cybersecurity Chris Johnson Technical Product Manager
    Software Defined Wide Area Network or SD-WAN is a virtualized approach to networking that elevates network traffic management away from hardware and premises, to next-generation software in the cloud for enhanced agility, centralized control, and visibility. Organizations of all shapes and sizes are taking advantage of SD-WAN in order to modernize their networks, reduce latency, lower costs, and prepare to support future business initiatives.

    But what does it mean for your cybersecurity program?

    Join this webinar to discover:

    Why SD-WAN forces organizations to rethink their cybersecurity architecture
    Solutions to unify protection across office-based and mobile users
    How to navigate the many security products that are available
    You will also have the opportunity to see a live demo from AT&T Cybersecurity managed security services that helps to continuously protect your critical assets as you evolve your network with SD-WAN technologies.

    Register today.
  • How to Detect Fileless Attacks with Host-Based IDS in USM Anywhere Recorded: May 14 2020 55 mins
    Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales Engineer
    Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.

    Join this webcast to learn:

    - How fileless attacks work and how they evade detection by most traditional antivirus software
    - The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
    - Why HIDS is an essential security control for threat detection and compliance
    - How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response

    Speakers:
    Danielle Russell
    Group Product Marketing Manager
    Aaron Genereaux
    Sr. Sales Engineer
  • Building Blocks for your 2020 Security Program Recorded: Apr 23 2020 55 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity Bindu Sundaresan, CISSP, CEH, CISM - Directo
    Is one of your New Year's resolutions to reduce your cyber risk in 2020? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast to learn how solutions from AT&T Cybersecurity, can help you to:

    Determine your current security posture and make a prioritized plan for improvement
    Centralize security monitoring across multi-cloud and on-premises environments
    Automate threat detection and incident response activities for improved efficiency
    Consolidate your regulatory compliance requirements to help accelerate audit readiness
    Maintain continuous security monitoring all year long
    Register today to reserve your seat. Here's to a secure 2020!
  • How to evolve your web and internet security for SD-WAN, Mobility and Cloud Recorded: Mar 31 2020 55 mins
    Rich Langston Product Marketing Manager, AT&T Cybersecurity and Brandon Benke Product Marketing Manager, AT&T Cybersecurity
    Today, most organizations rely on cloud apps and services to get work done. Yet, protecting access to the cloud and the broader internet is a growing challenge as workers increasingly want access to your cloud assets from branch offices, mobile devices, and other locations not sitting safely behind your network firewall. Doing nothing is not an option, as the cyber threat landscape continues to shift and scale, making every user and device a potential target for an attack.

    Your security controls must transform as your organization adopts cloud, mobility, and SD-WAN technologies. With a cloud-native security gateway solution like AT&T Global Security Gateway, you can quickly improve your security defenses to help protect your users’ cloud and internet access wherever and however they connect.

    Join us for this webcast to learn more about how cloud, mobility, and SD-WAN are disrupting traditional approaches to network security and how AT&T Cybersecurity can help. In this webcast, you’ll learn how:

    • Network and cloud evolution are disrupting our existing security best practices

    • A cloud-native security gateway can help protect access to the cloud and internet

    • AT&T Global Security Gateway can help provide a faster, simpler path to cloud security

    • AT&T Cybersecurity delivers managed security services to help you achieve a virtually seamless security strategy across your cloud, networks, and devices
  • 5G is Coming, Are You Prepared? Recorded: Mar 24 2020 53 mins
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism
    5G technologies and networks are bringing exciting new possibilities for the enterprise. Prudent organizations are taking a proactive stance by anticipating the security requirements that will come with the new technology. Given the multifaceted nature of 5G and security, it’s critical for organizations to understand the magnitude of this undertaking.

    Join us to learn key findings revealed in the recently published AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G. This ninth edition of the Insights Report is based on a global survey of enterprise security leadership conducted by AT&T Cybersecurity with 451 Research. Results show that many enterprises are getting a head start on 5G, yet many are challenged with understanding and appreciating all its dimensions.

    In the webinar, we’ll cover:
    • How 5G will transform the network with such things as Multi-edge Computing (MEC) and IoT
    • Where 5G may present new security challenges and where it offers security benefits
    • Which security controls will become most critical in the 5G future
    • What security practitioners should focus on to get a head start on 5G

    Meet your hosts:
    Tawnya Lancaster, Lead Product Marketing Manager
    Theresa Lanowitz, Head of Evangelism
  • How cybersecurity consulting can help you make smart security investments Recorded: Nov 7 2019 60 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity and Bindu Sundaresan, Principal Architect, AT&T Cybersec
    As your organization accelerates towards digital and cloud transformation, your cyber risk and security strategy must transform as well. Yet, it can be a challenge to successfully navigate this security transformation while also contending with constant change in global cyber threats, new security technology and innovation, and the regulatory compliance landscape. That's why every organization can benefit by engaging a trusted cybersecurity consulting provider to help with their cyber risk and security strategy.

    AT&T Cybersecurity consulting has a history of providing expert cybersecurity consulting services to organizations of all sizes across industries and geographies. AT&T Cybersecurity consultants provide expert insights and practical tools that organizations need to establish and maintain security best practices.

    Join us for a special National Cybersecurity Awareness Month webcast to learn how AT&T Cybersecurity consulting can help your organization to maintain or improve your cyber risk and security strategies as your organization transforms and grows. In this session, we'll highlight the AT&T Cybersecurity consulting services that can help even small-to-midsize organizations to accelerate and simplify their security and compliance efforts, including:

    - Cyber risk posture assessments
    - Vulnerability scanning services for PCI DSS
    - Employee cybersecurity awareness training
    - Penetration Testing
    - and many more!
  • The State of the SIEM, 2020 — What’s New and What You Should Be Looking For Recorded: Oct 30 2019 61 mins
    Tawnya Lancaster - Lead Product Marketing Manager and Aaron Genereaux - Sales Engineer
    A continuously evolving IT infrastructure driven by such business drivers as virtualization, cloud computing, and mobility has the Security and Information Event Management (SIEM) market undergoing change. Traditional SIEM platforms no longer meet the needs of security pros who face new and emerging threats. So what does the future of SIEM look like? And, what essential capabilities should you be asking for when considering a SIEM today and tomorrow?

    Join us to discuss the state of the SIEM in 2020 and how platforms like AT&T Unified Security Management® (USM) are redefining this space by going beyond simply collecting, correlating, and analyzing log data to serving as the security nerve center — a central console — from which teams can coordinate an integrated cyber defense posture. We'll share insights and give a live demo of USM's coolest new features.

    - Understand the importance of automatic, continuous updating of threat intelligence from Alien Labs and how it helps you respond to threats more quickly
    - Discover which orchestration, automation, analytics, and response capabilities you should be looking for
    - Learn how integration with other security tools through AlienApps can extend your security capabilities for investigation, incident response, reporting, and more
  • PCI DSS vulnerability scanning: A compliance practitioner’s perspective Recorded: Sep 19 2019 58 mins
    Danielle Russell,Group Product Marketing Manager and Caryn Seippel, Manager of Risk and Compliance
    Industry data indicates that PCI DSS Requirement 11, "Regularly test security systems and processes," is the most commonly failed requirement. In this webcast, we’ll take a close look at PCI DSS vulnerability scanning requirements and discuss how to prepare for your PCI DSS audit with regular internal and external vulnerability scanning practices. AT&T Cybersecurity Compliance analyst, Caryn Seippel, will share a practitioner's perspective on addressing this challenging requirement as well as common mistakes and pitfalls to avoid.

    Attend this webcast to learn:

    - Which PCI DSS requirements map to vulnerability scanning and how
    - Best practices and tips from a compliance practitioner
    - How AT&T Cybersecurity solutions can help address PCI DSS vulnerability scanning
    - A live demo of USM Anywhere
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen Recorded: Aug 22 2019 58 mins
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • How to improve threat detection and response with the MITRE ATT&CK™ framework Recorded: Jul 25 2019 59 mins
    Tawnya Lancaster, Sr Product Marketing Manager & Aaron Genereaux, Sales Engineer; AT&T Cybersecurity
    The speed and sophistication with which cybercriminals are launching attacks is increasing year-over-year. In fact, a recent 2019 threat report showed that the time from initial compromise of a network by an adversary to lateral movement can be as little as 19 minutes.* This is challenging threat detection and incident response teams to keep up — especially as cybercriminals are also continuously changing their methods. To drive more resilient threat detection and response, defenders need to incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs) to protect their network and speed response.

    Join us in discussing:

    - What MITRE ATT&CK™ is and how it complements other cyber frameworks such as NIST and the Cyber Kill Chain
    - How AT&T Alien Labs maps correlation rules to the tactics and techniques of MITRE ATT&CK™ so customers can better understand the context and scope of an attack
    - How to detect, investigate, and respond to a multi-vector attack (TrickBot) using USM Anywhere and the MITRE ATT&CK™ — within one dashboard

    *2019 Global Threat Report, Adversary Tradecraft and the Importance of Speed. CrowdStrike, 2019.
  • Practitioner’s Guide to Continuous Compliance & Audit Readiness Recorded: May 16 2019 58 mins
    Danielle Russell, Group Product Marketing Manager; Caryn Seippel, Manager of Risk and Compliance
    Conducting internal audits is a security best practice and a common requirement for most compliance standards. Yet, the internal "audit season" can slow down business productivity to a grinding halt. This is especially a challenge for agile technology organizations that rely on continuous development and release schedules to drive business forward.

    By adopting a continuous compliance program, you can keep your innovation humming while ensuring that you are continually addressing important industry and regulatory demands and, more importantly, maintaining secure systems and processes.

    Join us for a special session with Caryn Seippel, Manager of Risk and Compliance at AT&T Cybersecurity, to learn:

    - What is continuous compliance
    - Practical steps to implement continuous monitoring
    - How AT&T Cybersecurity, a security company, adopted a continuous compliance program
    - How AlienVault USM Anywhere uses automation to help streamline continuous compliance
  • The Practitioner’s Guide to Security Monitoring in the Cloud Recorded: Apr 18 2019 58 mins
    Danielle Russell Group Product Marketing Manager, Brian Bledsoe Sr. Technical Manager, Sales Enablement for North America
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management
  • Building Blocks for Your 2019 IT Security Program Recorded: Mar 14 2019 51 mins
    Danielle Russell, Group Product Marketing Manager, AlienVault; Amy Pace, Principal Product Marketing Manager, AlienVault
    Is one of your New Year's resolutions to reduce your cyber risk in 2019? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast and demo of the AlienVault Unified Security Management (USM) platform to learn how solutions from AlienVault, an AT&T Company, can help you to:

    - Determine your current security posture and make a prioritized plan for improvement
    - Centralize security monitoring across multi-cloud and on-premises environments
    - Automate threat detection and incident response activities for improved efficiency
    - Consolidate your regulatory compliance requirements to help accelerate audit readiness
    - Maintain continuous security monitoring all year long

    Register today to reserve your seat. Here's to a secure 2019!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security Recorded: Jan 17 2019 60 mins
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Recorded: Nov 1 2018 59 mins
    Danielle Russell, Group Product Marketing Manager & Carlos Garcia, Solutions Architect | AlienVault
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AlienVault for a special session webcast on DFIR readiness. We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program leverage security orchestration and automation reduce time to response (TTR)?
    - How can AlienVault Unified Security Management (USM) accelerate and simplify your DFIR?

    Speakers: Danielle Russell, Group Product Marketing Manager
    Carlos Garcia, Solutions Architect, AlienVault
  • How to Detect Cryptomining in your Environment with AlienVault Recorded: Oct 18 2018 60 mins
    Danielle Russell, Group Product Marketing Manager & Amy Pace, Principal Product Marketing Manager | AlienVault
    Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless you have advanced threat detection capabilities to detect crypto-mining activities on your endpoints, in the cloud and on premises, you might be unknowingly sharing your valuable computing resources with cryptomining criminals.

    Join this webcast to learn:

    - The what, why and how of cryptomining
    - How cryptomining can evade traditional antivirus and other security controls
    - Best practices and essential tools for detecting cryptomining quickly
    - How AlienVault Unified Security Management (USM) can alert you immediately of cryptomining activity

    Speakers: Danielle Russell, Group Product Marketing Manager
    Amy Pace, Principal Product Marketing Manager
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Recorded: Oct 11 2018 61 mins
    Sacha Dawes, Principal Product Marketing Manager, AlienVault
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
    - Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    - Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    - Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    - The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • How to Solve your Top IT Security Reporting Challenges Recorded: Sep 27 2018 56 mins
    Sacha Dawes Principal Product Marketing Manager, AlienVault
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • CISO Perspective: How using the NIST Cyber Security Framework improves security Recorded: Sep 6 2018 63 mins
    John McLeod, CISO, AlienVault
    The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.

    In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.

    Join this webcast for:
    - An overview of security controls recommended by NIST CSF
    - Best practices for approaching adoption of NIST CSF
    - How a unified security toolset can greatly simplify this process
    - A demo of the AlienVault Unified Security Management (USM) platform
Edge-to-Edge cybersecurity solutions.
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CISO Perspective: How to Prepare for GDPR
  • Live at: Mar 15 2018 4:00 pm
  • Presented by: Sacha Dawes, Principal Product Marketing Manager, AlienVault
  • From:
Your email has been sent.
or close