Browse communities
Browse communities
Presenting a webinar?

Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report

Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
•New critical attacks to watch out for
•Top vulnerabilities that are being exploited
•Rising complexity and sophistication in attacks
•Latest mobile threats

Speaker:
Gab Gennai
ArcSight Solutions Specialist , APAC & Japan
HP Enterprise Security Products

Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
May 30 2013
57 mins
Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (110)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Find the intruders within your organisation Recorded: Jul 3 2014 43 mins
    Kelvin Wee - CISA, CISM, CISSP, APJ Regional Product Management Director– HP ArcSight HP Enterprise Security Products
    The cyber criminals may already be within your organisation, the data is there but needs analysing, correlating and put into context quickly. Join us at this session to discover
    - how to accurately prioritize security risks and compliance violations
    -identify critical events in real time via dashboards
    -case studies of how customers in this region are benefitting from the right processes and tools

    Speaker:
    Kelvin Wee - CISA, CISM, CISSP
    APJ Regional Product Management Director– HP ArcSight
    HP Enterprise Security Products

    With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of end-to-end security solutions in the area of security applications and technologies.
    Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region
  • Fighting Next-Generation Adversaries with Automated Shared Threat Intelligence Recorded: Mar 13 2014 42 mins
    Ted Ross, Director, Field Intelligence, HP Security Research
    Adversaries today are technically advanced, structured around a cybercrime market, and using paradigm shifts in technology to compromise more victims. Through specialization and collaboration, attackers are becoming more effective and continue to cause widespread damage and security issues that are extremely difficult to identify, even as systems become more secure. However, recent advances in technology provide the foundation for a new type of industry-wide threat intelligence exchange that allows potential targets to organize, collaborate, and leverage threat intelligence more quickly and effectively.
    Join us for this session to find out about
    -techniques for identifying, anonymizing, and sharing threat intelligence
    -use cases for speeding response times and preventing breaches
    -case studies illustrating the importance of collaborative threat intelligence

    Ted Ross
    Director, Field Intelligence, HP Security Research
    HP Enterprise Security Products

    Mr. Ross is an industry veteran of twenty four years in the network and security industries. Mr. Ross is currently a Director of Security Research at HP where he is responsible for the Field Intelligence team -a team of senior security researchers and analysts. Prior to his current role at HP, he led the Office of Advanced Technology and led the global TippingPoint System Engineer team where he helped grow TippingPoint from the ground up prior to the acquisition by 3Com and later HP. Prior to TippingPoint, he worked as a Strategic Engineer for Extreme Networks with a focus on service provider technologies. Before Extreme Networks, Mr. Ross was a Strategy Architect for Wal-Mart and Director of Network Engineering for West Corp. Mr. Ross started his career in the US Air Force.

    Host:
    Kelvin Wee CISA, CISM, CISSP
    APJ Regional Product Manager – HP ArcSight
    HP Enterprise Security Products
  • Managing Network Security Risks in Complex Environments Recorded: Jan 17 2014 59 mins
    Kenneth Yip, APJ TippingPoint Product Manager, HP Enterprise Security Products
    From access management to firewalls to data loss prevention, as well as relationships with multiple providers, enterprise security is a complex and messy scenario. Add cloud computing, mobility, and bring your own device (BYOD), and the need for a clear security strategy has never been greater. Effective security relies on the ability to identify and address suspicious activity within your network, as well as potentially threatening activities happening outside the enterprise.
    In this session, you will learn:
    •How to build an effective, integrated security footprint that delivers a measurable reduction in business risk and reduces complexity
    •Insights on how organisations have managed to build effective visibility and control of their networks to overcome cyber attacks

    Speaker:
    Kenneth Yip
    APJ TippingPoint Product Manager, HP Enterprise Security Products

    Kenneth Yip, a professional security evangelist, has 15 years of experience in serving top security powerhouses in Asia. He led many large security solution deployments and has accumulated insights into security requirements and threat landscape across the region. With Kenneth’s deep knowledge and experiences in security and networking, he is currently responsible for defining the long term strategy as well as technical partnerships for HP TippingPoint solutions in the Asia Pacific.

    For more information on HP Enterprise Security, please visit www.hp.com/go/sirm
  • 应用安全靠谁?——如何消除业务系统中的安全隐患? Recorded: Nov 22 2013 19 mins
    中国惠普企业安全产品部Fortify产品技术顾问范亮
    应用安全靠谁?——如何消除业务系统中的安全隐患?
    本次视频主持人是来自e行网的资深编辑冯磊,特邀嘉宾为中国惠普企业安全产品部Fortify产品技术顾问范亮,大童保险销售服务有限公司软件开发处副经理董昊哲和大童保险销售服务有限公司网络管理处经理邵安。
    此次视频的主题内容是企业应用安全遇到的具体问题,实际例子,以及应用安全软件如何帮助企业应对这些挑战。该视频大概30分钟,期间主持人和各位特邀嘉宾主要讨论了以下几个方面的问题:
    1、当开发架构、规范遇上程序员的情绪问题怎么办?
    2、漏洞扫描软件如何帮助量化IT投入的价值?
    3、为什么“重大节日前不上线”?
  • Understand and Counter Insider Threats with Behavioral Analytics Recorded: Nov 14 2013 48 mins
    Kelvin Wee , APJ Field Product Manager, HP ArcSight, HP Enterprise Security Products
    Whether your mission is safeguarding classified information or intellectual property, it's the threats you don't see that cause the most damage. From trade theft to corporate fraud, the motivations of insiders have diversified and those you'd like to trust don't always prove trustworthy. In this session, we discuss the problems that insider threats pose in your ever-evolving cyber environment and present ways to combat them. In this webinar, we’ll show you how, through behavioral analytics , you can identify patterns of behavior and tie actions to individuals in order to detect internal threats before they become headlines.

    Speaker:
    Kelvin Wee CISA, CISM, CISSP
    APJ Field Product Manager – HP ArcSight
    HP Enterprise Security Products

    With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of end-to-end security solutions in the area of security applications and technologies such as identity management systems (IDM), Public Key Infrastructure (PKI), Digital Rights Management (DRM), Data Loss Prevention (DLP) and Security Information and Event Management (SIEM).
    Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    Sponsored by HP Enterprise Security, Independently conducted by Ponemon Institute LLC
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • HP TippingPoint Recorded: Sep 4 2013 45 mins
    Fujita Taira, HP ESP SLS, Japan, HP TippingPoint
    HP TippingPoint
  • HP Cyber Risk Report Recorded: Sep 3 2013 43 mins
    Asano Takashi, HP Enterprise Security Products, SE
    HPのセキュリティ研究機関HP DVLabsが、毎年、全世界の脅威動向を報告するサイバーリスクレポート。先日、最新版2012が発行されました。そのサマリーをご紹介しながら、それらの脅威への対策を、世界最先端の技術により実現するいくつかの具体的なソリューション連携をご紹介いたします。

    •複雑化、高度化するサイバー攻撃
    •脆弱性の5件に1件が深刻な状況
    •SCADAシステムないで発見される脆弱性の増加率が768%
    •最新モバイルの脅威
  • Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report Recorded: May 30 2013 57 mins
    Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
    Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks.

    Join Gab Gennai in this hour-session, where he follows the trail of cyber criminals and the clues they leave behind to give us insights into today’s technology weaknesses and how organisations can build better defenses:
    •New critical attacks to watch out for
    •Top vulnerabilities that are being exploited
    •Rising complexity and sophistication in attacks
    •Latest mobile threats

    Speaker:
    Gab Gennai
    ArcSight Solutions Specialist , APAC & Japan
    HP Enterprise Security Products

    Gab has more than 25 years of experience in the IT industry servicing customers in the Asia Pacific region. An established security specialist, Gab is currently the Strategic Product Evangelist for HP Enterprise Security Products, where he shares the key messages and vision on HP’s new & emerging security technologies, and plays a critical role in bringing customers’ needs back into product innovation and development.
  • Mobile Application Integrity: Being good when no one is watching Recorded: Apr 18 2013 71 mins
    Andrew Kay, Software Security Consultant, HP Enterprise Security Products
    Mobile devices are a hot trend amongst security topics this year. While most cover the angle of the device management, only few go into testing the applications. Since the mobile application vulnerability landscape is still young, there is a need to classify these vulnerabilities so that development teams can focus and root them out of their codebases. Join us as we explore the OWASP Mobile Top 10 classification system and metrics from a large case study of a real enterprise facing the deployment and assessment of a large number of mobile applications. Developers, Managers, and team leads will leave with resources and guidelines to start mobile security both at the process level and code level, including how to handle external mobile development teams they might contract. Get ahead of upcoming PCI compliance by addressing your mobile software early!
Security Intelligence for the Asian IT Security Professional
HP brings to you a community of experts sharing their unique experiences in security and risk management across the various markets in the Asia Pacific region.
Find out more about HP Enterprise Security at www.hp.com/go/sirm .

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vulnerability Landscape: What’s new in the HP 2012 Cyber Risk Report
  • Live at: May 30 2013 5:00 am
  • Presented by: Gab Gennai, ArcSight Solutions Specialist, APJ, HP Enterprise Security Products
  • From:
Your email has been sent.
or close
You must be logged in to email this