UPCOMING VENDOR WEBCASTS

Counter malware threats and protect your business

Counter malware threats and protect your business

The cyber security threats with which information security pros must contend run the gamut from web-based malware to application vulnerabilities. Both traditional and ever-new methods are being used by cyber criminals to infiltrate corporate and government networks to steal data with ease. Compound this with widespread use of mobile devices and cloud computing and there is a lot on the plate for information security pros to manage. We talk to an expert about some of the insidious threats that security pros should be mindful of and find out the various steps they can take to ensure their risk management plans are keeping up.

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the endpoint

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask themselves "Can endpoint security products that are based on a signature/reputation based approach identify and stop targeted attacks launched by well-funded, motivated, sophisticated attackers?" If your organization was targeted and penetrated by an APT attack, would you know?

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate of larger organizations and public entities alike. Now, it is no longer a matter of if sophisticated cyber criminals have infiltrated your systems, say many experts, but when they hit and for how long they've lingered.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on in a piecemeal fashion. As those networks become ever more open with the take up of innovative new technologies, it makes sense to move security up into the network.

VENDOR WEBCASTS

Detecting the Enemy Within: Getting More out of DLP

Detecting the Enemy Within: Getting More out of DLP

Trusted insiders not only have access to sensitive corporate data, they also have unprecedented access to mediums with which to move that data. DLP solutions provide a security barrier keeping sensitive data within the organization. But intent insiders can find a way around, making the ability to watch for, detect and alert on new breaches critical to making your Data Leak Prevention strategy even more effective.

Defend the Edge with Greater Network Insight and Enforcement

Defend the Edge with Greater Network Insight and Enforcement

Enterprise networks are now more accessible than ever before. Increasingly, these networks are supporting a broader range of user types, including partners, consultants, customers and other guests. They are also supporting a greater number and variety of endpoint device types, such as tablets and smartphones - a significant number of which may be user-owned - and the growing number of applications and application types that run on these devices. This erosion of the traditional network perimeter and explosion of network devices demand a new approach to identity and access control and a comprehensive enterprise security solution that leverage both fully integrated security intelligence and granular policy enforcement to minimize threats to the enterprise network.

Achieving Irrefutable User and Transaction Authentication

Achieving Irrefutable User and Transaction Authentication

Learn about: The evolution of user and transaction authentication, Traditional defense strategies against SQL injection and malware attacks, Emerging trends, technology capabilities and widespread adoption, Sub-second device and transaction verification, and Balancing end-user experience and security

Cyber Security Disruptors: Verisign iDefense Insight on Current and Emerging Cyber Disrupters for the Enterprise Security Practitioner

Cyber Security Disruptors: Verisign iDefense Insight on Current and Emerging Cyber Disrupters for the Enterprise Security Practitioner

Each year, iDefense covers the subject of cyber security disruptors in preparation for its annual "Cyber Threats and Trends" report. This annual presentation covers the disruptive abilities of new technologies that could fundamentally change the security threat environment for enterprise organizations. The webcast will re-evaluate previously identified disruptors, and will introduce some recent disruptors that iDefense believes have the potential to impact enterprise cyber security practitioners and their networked environments now or in the near future. Topics covered will include:

Improving Paper Based Compliance Practices

Improving Paper Based Compliance Practices

In today's business environment Security and Compliance initiatives are more important than ever -- across virtually all industries. 90% of organizations believe that they have lost confidential documents in the past year. The cost of a corporate data breach can lead to loss of hundreds of millions of dollars, non-compliance with Federal and State laws and loss of credibility and trust from customers, employees and partners. Recently, an Infotrends study found that only 52% of companies have scanning policies and worse, only 34% have document management systems in place.

Building Risk Visibility into Your Firewall Management Process

Building Risk Visibility into Your Firewall Management Process

Firewall deployments in large organizations can easily get out of control - and become rife with unnecessary risk. Inappropriate access is granted readily. Constant change complicates policy implementation. A real-time, enterprise-wide picture of network security posture is a distant dream. Only by automating tedious manual processes at the operations, management and compliance levels of the organization can security teams regain control and better protect their information. This requires consolidated, real-time data of the security infrastructure and a scalable, distributed solution that provides fast, flexible analysis and reporting.

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats and Gain Actionable INTEL

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats and Gain Actionable INTEL

Let's face it, it's no longer a matter of 'If' your organization will be breached, but 'When' (if it hasn't already happened and you just don't know it). The key question is 'How can you gain better visibility, sooner to the signs that you've been breached or that you're the target of an advanced threat?' In this webinar, John Kindervag, Forrester principal analyst for security and risk, will discuss how the combination of Big Data security analytics and network analysis and visibility (NAV) capabilities provide the necessary extra ingredients for SIEM to move from merely a compliance reporting platform to delivering situational awareness and "INTEL" to: • Detect breaches and threats in near real-time • Help stop intrusions • Prevent the exfiltration of data

The Top 5 Myths to Protecting Your Data, and What to do About It

The Top 5 Myths to Protecting Your Data, and What to do About It

Customer data. Corporate financials. HR records. Strategic M&A plans. These are all part of the ecosystem of data that you have to protect. How effective are your current processes in delivering this protection? If traditional security technologies actually delivered the promised level of protection, why is there a constant stream of companies still getting breached, losing their customer data, and failing audits?

Why NAC? Why now?

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC, including techniques to:

5 Proven Practices to Address Security & Compliance in Cloud Applications Like Salesforce, Google Apps, and Office 365

5 Proven Practices to Address Security & Compliance in Cloud Applications Like Salesforce, Google Apps, and Office 365

Many organizations aren't just moving to the cloud, they're sprinting! But too often, concerns about security and compliance emerge and projects end of being delayed, and in a few cases, even cancelled all together. What are the proven practices that organizations are employing to address security and compliance concerns and keep cloud application projects moving forward?