Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report

Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
•New critical attacks to watch out for
•Top vulnerabilities that are being exploited
•Rising complexity and sophistication in attacks
•Latest mobile threats

Speaker:
Gab Gennai
ArcSight Solutions Specialist , APAC & Japan
HP Enterprise Security Products

Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
May 30 2013
57 mins
Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4510)
  • Upcoming (158)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
Up Down
  • Fighting Next-Generation Adversaries with Automated Shared Threat Intelligence Recorded: Mar 13 2014 42 mins
    Adversaries today are technically advanced, structured around a cybercrime market, and using paradigm shifts in technology to compromise more victims. Through specialization and collaboration, attackers are becoming more effective and continue to cause widespread damage and security issues that are extremely difficult to identify, even as systems become more secure. However, recent advances in technology provide the foundation for a new type of industry-wide threat intelligence exchange that allows potential targets to organize, collaborate, and leverage threat intelligence more quickly and effectively.
    Join us for this session to find out about
    -techniques for identifying, anonymizing, and sharing threat intelligence
    -use cases for speeding response times and preventing breaches
    -case studies illustrating the importance of collaborative threat intelligence

    Ted Ross
    Director, Field Intelligence, HP Security Research
    HP Enterprise Security Products

    Mr. Ross is an industry veteran of twenty four years in the network and security industries. Mr. Ross is currently a Director of Security Research at HP where he is responsible for the Field Intelligence team -a team of senior security researchers and analysts. Prior to his current role at HP, he led the Office of Advanced Technology and led the global TippingPoint System Engineer team where he helped grow TippingPoint from the ground up prior to the acquisition by 3Com and later HP. Prior to TippingPoint, he worked as a Strategic Engineer for Extreme Networks with a focus on service provider technologies. Before Extreme Networks, Mr. Ross was a Strategy Architect for Wal-Mart and Director of Network Engineering for West Corp. Mr. Ross started his career in the US Air Force.

    Host:
    Kelvin Wee CISA, CISM, CISSP
    APJ Regional Product Manager – HP ArcSight
    HP Enterprise Security Products
  • Managing Network Security Risks in Complex Environments Recorded: Jan 17 2014 59 mins
    From access management to firewalls to data loss prevention, as well as relationships with multiple providers, enterprise security is a complex and messy scenario. Add cloud computing, mobility, and bring your own device (BYOD), and the need for a clear security strategy has never been greater. Effective security relies on the ability to identify and address suspicious activity within your network, as well as potentially threatening activities happening outside the enterprise.
    In this session, you will learn:
    •How to build an effective, integrated security footprint that delivers a measurable reduction in business risk and reduces complexity
    •Insights on how organisations have managed to build effective visibility and control of their networks to overcome cyber attacks

    Speaker:
    Kenneth Yip
    APJ TippingPoint Product Manager, HP Enterprise Security Products

    Kenneth Yip, a professional security evangelist, has 15 years of experience in serving top security powerhouses in Asia. He led many large security solution deployments and has accumulated insights into security requirements and threat landscape across the region. With Kenneth’s deep knowledge and experiences in security and networking, he is currently responsible for defining the long term strategy as well as technical partnerships for HP TippingPoint solutions in the Asia Pacific.

    For more information on HP Enterprise Security, please visit www.hp.com/go/sirm
  • 应用安全靠谁?——如何消除业务系统中的安全隐患? Recorded: Nov 22 2013 19 mins
    应用安全靠谁?——如何消除业务系统中的安全隐患?
    本次视频主持人是来自e行网的资深编辑冯磊,特邀嘉宾为中国惠普企业安全产品部Fortify产品技术顾问范亮,大童保险销售服务有限公司软件开发处副经理董昊哲和大童保险销售服务有限公司网络管理处经理邵安。
    此次视频的主题内容是企业应用安全遇到的具体问题,实际例子,以及应用安全软件如何帮助企业应对这些挑战。该视频大概30分钟,期间主持人和各位特邀嘉宾主要讨论了以下几个方面的问题:
    1、当开发架构、规范遇上程序员的情绪问题怎么办?
    2、漏洞扫描软件如何帮助量化IT投入的价值?
    3、为什么“重大节日前不上线”?
  • Understand and Counter Insider Threats with Behavioral Analytics Recorded: Nov 14 2013 48 mins
    Whether your mission is safeguarding classified information or intellectual property, it's the threats you don't see that cause the most damage. From trade theft to corporate fraud, the motivations of insiders have diversified and those you'd like to trust don't always prove trustworthy. In this session, we discuss the problems that insider threats pose in your ever-evolving cyber environment and present ways to combat them. In this webinar, we’ll show you how, through behavioral analytics , you can identify patterns of behavior and tie actions to individuals in order to detect internal threats before they become headlines.

    Speaker:
    Kelvin Wee CISA, CISM, CISSP
    APJ Field Product Manager – HP ArcSight
    HP Enterprise Security Products

    With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of end-to-end security solutions in the area of security applications and technologies such as identity management systems (IDM), Public Key Infrastructure (PKI), Digital Rights Management (DRM), Data Loss Prevention (DLP) and Security Information and Event Management (SIEM).
    Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • HP TippingPoint Recorded: Sep 4 2013 45 mins
    HP TippingPoint
  • HP Cyber Risk Report Recorded: Sep 3 2013 43 mins
    HPのセキュリティ研究機関HP DVLabsが、毎年、全世界の脅威動向を報告するサイバーリスクレポート。先日、最新版2012が発行されました。そのサマリーをご紹介しながら、それらの脅威への対策を、世界最先端の技術により実現するいくつかの具体的なソリューション連携をご紹介いたします。

    •複雑化、高度化するサイバー攻撃
    •脆弱性の5件に1件が深刻な状況
    •SCADAシステムないで発見される脆弱性の増加率が768%
    •最新モバイルの脅威
  • Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report Recorded: May 30 2013 57 mins
    Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

    Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
    •New critical attacks to watch out for
    •Top vulnerabilities that are being exploited
    •Rising complexity and sophistication in attacks
    •Latest mobile threats

    Speaker:
    Gab Gennai
    ArcSight Solutions Specialist , APAC & Japan
    HP Enterprise Security Products

    Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
  • Mobile Application Integrity: Being good when no one is watching Recorded: Apr 18 2013 71 mins
    Mobile devices are a hot trend amongst security topics this year. While most cover the angle of the device management, only few go into testing the applications. Since the mobile application vulnerability landscape is still young, there is a need to classify these vulnerabilities so that development teams can focus and root them out of their codebases. Join us as we explore the OWASP Mobile Top 10 classification system and metrics from a large case study of a real enterprise facing the deployment and assessment of a large number of mobile applications. Developers, Managers, and team leads will leave with resources and guidelines to start mobile security both at the process level and code level, including how to handle external mobile development teams they might contract. Get ahead of upcoming PCI compliance by addressing your mobile software early!
Security Intelligence for the Asian IT Security Professional
HP brings to you a community of experts sharing their unique experiences in security and risk management across the various markets in the Asia Pacific region.
Find out more about HP Enterprise Security at www.hp.com/go/sirm .
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
  • Live at: May 30 2013 5:00 am
  • Presented by: Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
  • From:
Your email has been sent.
or close
You must be logged in to email this