Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report

Manage webcast
Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
•New critical attacks to watch out for
•Top vulnerabilities that are being exploited
•Rising complexity and sophistication in attacks
•Latest mobile threats

Speaker:
Gab Gennai
ArcSight Solutions Specialist , APAC & Japan
HP Enterprise Security Products

Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
May 30 2013
57 mins
Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5963)
  • Upcoming (117)
  • Date
  • Rating
  • Views
  • NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
  • No complexo ambiente de negócios de hoje, a sua organização se depara com dificuldades de segurança cada vez maiores e exigências legais que fazem com que seja essencial controlar e monitorar seus usuários privilegiados.
    O gerenciamento senhas de contas privilegiadas é um ponto de partida para proteger o seu ambiente de TI, mas ainda há muito a ser feito.
    Nesta sessão, descubra como o CA Privileged Identity Manager pode ajudar sua organização a gerenciar identidades privilegiadas (PIM) e controlar de maneira completa seus usuários privilegiados a fim de reduzir o risco de falhas de conformidade ou de violações de segurança com alto custo.
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Security incident disclosures and vulnerability warnings are being released at an alarming rate, posing a major challenge for Security & Risk (S&R) Professionals. Additionally, firms that adopt virtualized and public cloud infrastructure like AWS are quickly finding that their traditional vulnerability management solutions and processes were not designed for these dynamic, elastic, and API-services centric architectures. An April, 2015 Forrester Research, Inc. report entitled “Market Overview: Vulnerability Management” stated that the vulnerability management technology space has evolved and will help " S&R Pros repair their strained or broken processes and move past low-impact checkbox scanning to proactive, risk-based assessments."

    Join guest speakers Rick Holland, Principal Analyst at Forrester Research, Tim Prendergast, CEO and Co-founder, Evident.io, and Theodore Kim, Senior Director, SaaS Operations at Jobvite, to learn about:
    * The state of vulnerability management and why Forrester recently said "security and risk pros can't keep up with the tsunami of vulnerabilities."
    * How public cloud infrastructure like AWS adds to vulnerability complexity and has created the the need for new cloud native solutions
    * How Jobvite has implemented an effective security configuration and vulnerability management process for AWS
  • Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.
  • Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.
  • Channel
  • Channel profile
  • Find the intruders within your organisation Recorded: Jul 3 2014 43 mins
    Kelvin Wee - CISA, CISM, CISSP, APJ Regional Product Management Director– HP ArcSight HP Enterprise Security Products
    The cyber criminals may already be within your organisation, the data is there but needs analysing, correlating and put into context quickly. Join us at this session to discover
    - how to accurately prioritize security risks and compliance violations
    -identify critical events in real time via dashboards
    -case studies of how customers in this region are benefitting from the right processes and tools

    Speaker:
    Kelvin Wee - CISA, CISM, CISSP
    APJ Regional Product Management Director– HP ArcSight
    HP Enterprise Security Products

    With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of end-to-end security solutions in the area of security applications and technologies.
    Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region
  • Fighting Next-Generation Adversaries with Automated Shared Threat Intelligence Recorded: Mar 13 2014 42 mins
    Ted Ross, Director, Field Intelligence, HP Security Research
    Adversaries today are technically advanced, structured around a cybercrime market, and using paradigm shifts in technology to compromise more victims. Through specialization and collaboration, attackers are becoming more effective and continue to cause widespread damage and security issues that are extremely difficult to identify, even as systems become more secure. However, recent advances in technology provide the foundation for a new type of industry-wide threat intelligence exchange that allows potential targets to organize, collaborate, and leverage threat intelligence more quickly and effectively.
    Join us for this session to find out about
    -techniques for identifying, anonymizing, and sharing threat intelligence
    -use cases for speeding response times and preventing breaches
    -case studies illustrating the importance of collaborative threat intelligence

    Ted Ross
    Director, Field Intelligence, HP Security Research
    HP Enterprise Security Products

    Mr. Ross is an industry veteran of twenty four years in the network and security industries. Mr. Ross is currently a Director of Security Research at HP where he is responsible for the Field Intelligence team -a team of senior security researchers and analysts. Prior to his current role at HP, he led the Office of Advanced Technology and led the global TippingPoint System Engineer team where he helped grow TippingPoint from the ground up prior to the acquisition by 3Com and later HP. Prior to TippingPoint, he worked as a Strategic Engineer for Extreme Networks with a focus on service provider technologies. Before Extreme Networks, Mr. Ross was a Strategy Architect for Wal-Mart and Director of Network Engineering for West Corp. Mr. Ross started his career in the US Air Force.

    Host:
    Kelvin Wee CISA, CISM, CISSP
    APJ Regional Product Manager – HP ArcSight
    HP Enterprise Security Products
  • Managing Network Security Risks in Complex Environments Recorded: Jan 17 2014 59 mins
    Kenneth Yip, APJ TippingPoint Product Manager, HP Enterprise Security Products
    From access management to firewalls to data loss prevention, as well as relationships with multiple providers, enterprise security is a complex and messy scenario. Add cloud computing, mobility, and bring your own device (BYOD), and the need for a clear security strategy has never been greater. Effective security relies on the ability to identify and address suspicious activity within your network, as well as potentially threatening activities happening outside the enterprise.
    In this session, you will learn:
    •How to build an effective, integrated security footprint that delivers a measurable reduction in business risk and reduces complexity
    •Insights on how organisations have managed to build effective visibility and control of their networks to overcome cyber attacks

    Speaker:
    Kenneth Yip
    APJ TippingPoint Product Manager, HP Enterprise Security Products

    Kenneth Yip, a professional security evangelist, has 15 years of experience in serving top security powerhouses in Asia. He led many large security solution deployments and has accumulated insights into security requirements and threat landscape across the region. With Kenneth’s deep knowledge and experiences in security and networking, he is currently responsible for defining the long term strategy as well as technical partnerships for HP TippingPoint solutions in the Asia Pacific.

    For more information on HP Enterprise Security, please visit www.hp.com/go/sirm
  • 应用安全靠谁?——如何消除业务系统中的安全隐患? Recorded: Nov 22 2013 19 mins
    中国惠普企业安全产品部Fortify产品技术顾问范亮
    应用安全靠谁?——如何消除业务系统中的安全隐患?
    本次视频主持人是来自e行网的资深编辑冯磊,特邀嘉宾为中国惠普企业安全产品部Fortify产品技术顾问范亮,大童保险销售服务有限公司软件开发处副经理董昊哲和大童保险销售服务有限公司网络管理处经理邵安。
    此次视频的主题内容是企业应用安全遇到的具体问题,实际例子,以及应用安全软件如何帮助企业应对这些挑战。该视频大概30分钟,期间主持人和各位特邀嘉宾主要讨论了以下几个方面的问题:
    1、当开发架构、规范遇上程序员的情绪问题怎么办?
    2、漏洞扫描软件如何帮助量化IT投入的价值?
    3、为什么“重大节日前不上线”?
  • Understand and Counter Insider Threats with Behavioral Analytics Recorded: Nov 14 2013 48 mins
    Kelvin Wee , APJ Field Product Manager, HP ArcSight, HP Enterprise Security Products
    Whether your mission is safeguarding classified information or intellectual property, it's the threats you don't see that cause the most damage. From trade theft to corporate fraud, the motivations of insiders have diversified and those you'd like to trust don't always prove trustworthy. In this session, we discuss the problems that insider threats pose in your ever-evolving cyber environment and present ways to combat them. In this webinar, we’ll show you how, through behavioral analytics , you can identify patterns of behavior and tie actions to individuals in order to detect internal threats before they become headlines.

    Speaker:
    Kelvin Wee CISA, CISM, CISSP
    APJ Field Product Manager – HP ArcSight
    HP Enterprise Security Products

    With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of end-to-end security solutions in the area of security applications and technologies such as identity management systems (IDM), Public Key Infrastructure (PKI), Digital Rights Management (DRM), Data Loss Prevention (DLP) and Security Information and Event Management (SIEM).
    Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • HP TippingPoint Recorded: Sep 4 2013 45 mins
    Fujita Taira, HP ESP SLS, Japan, HP TippingPoint
    HP TippingPoint
  • HP Cyber Risk Report Recorded: Sep 3 2013 43 mins
    Asano Takashi, HP Enterprise Security Products, SE
    HPのセキュリティ研究機関HP DVLabsが、毎年、全世界の脅威動向を報告するサイバーリスクレポート。先日、最新版2012が発行されました。そのサマリーをご紹介しながら、それらの脅威への対策を、世界最先端の技術により実現するいくつかの具体的なソリューション連携をご紹介いたします。

    •複雑化、高度化するサイバー攻撃
    •脆弱性の5件に1件が深刻な状況
    •SCADAシステムないで発見される脆弱性の増加率が768%
    •最新モバイルの脅威
  • Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report Recorded: May 30 2013 57 mins
    Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
    Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

    Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
    •New critical attacks to watch out for
    •Top vulnerabilities that are being exploited
    •Rising complexity and sophistication in attacks
    •Latest mobile threats

    Speaker:
    Gab Gennai
    ArcSight Solutions Specialist , APAC & Japan
    HP Enterprise Security Products

    Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
  • Mobile Application Integrity: Being good when no one is watching Recorded: Apr 18 2013 71 mins
    Andrew Kay, Software Security Consultant, HP Enterprise Security Products
    Mobile devices are a hot trend amongst security topics this year. While most cover the angle of the device management, only few go into testing the applications. Since the mobile application vulnerability landscape is still young, there is a need to classify these vulnerabilities so that development teams can focus and root them out of their codebases. Join us as we explore the OWASP Mobile Top 10 classification system and metrics from a large case study of a real enterprise facing the deployment and assessment of a large number of mobile applications. Developers, Managers, and team leads will leave with resources and guidelines to start mobile security both at the process level and code level, including how to handle external mobile development teams they might contract. Get ahead of upcoming PCI compliance by addressing your mobile software early!
Security Intelligence for the Asian IT Security Professional
HP brings to you a community of experts sharing their unique experiences in security and risk management across the various markets in the Asia Pacific region.
Find out more about HP Enterprise Security at www.hp.com/go/sirm .

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
  • Live at: May 30 2013 5:00 am
  • Presented by: Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
  • From:
Your email has been sent.
or close
You must be logged in to email this