Achieving BYOx Security and Manageability with Containerization

"Containerization has enabled secure BYOD programs for mobile and tablets. If the same could be done for the humble PC, IT could get out of the laptop business and save money. What if you could enable containerization on PC’s in a way that ensures security and manageability, while enabling new use cases like BYOPC contractor, Joint ventures, BYOPC employee, Mergers and Acquisition and many more?

In this session, learn how to secure virtual containers on an unmanaged PC, as well as how the new class of ‘enterprise consumer’ is changing the nature of the enterprise perimeter and the right way forward for the next decade of enterprise IT."
Watch Now

Spotlight

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the security issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals.


OTHER ON-DEMAND WEBINARS

HIMSS15 and the FortiGuard Threat Research Factor

There was a very clear and present sound on the convention floor this year at HIMSS in Chicago, Illinois, a buzz that resonated particularly with the team at Fortinet and it was the need for a multi-layered strategy around cybersecurity and the healthcare industry. Many who attended say they are just waiting for the next big headline news attack that shakes the very core of patient data and how doctors care for their patients in new and innovative ways. Fortinet’s presence at HIMSS also signaled to many, a shift in the industry towards the reality of cybersecurity and getting ahead of hackers looking for extremely rich data. Digital Strategist Jonas Tichenor caught up with Fortinet’s Senior Security Strategist Anthony Giandomenico about how these trends are shaping cybersecurity and the healthcare industry
Watch Now

"Threat Update: SYNful Knock - A Cisco Implant"

"SYNful Knock, once a theoretical cyber attack, is now a reality. This Cisco router implant was recently discovered in multiple organizations and several countries. Based on research from Mandiant, a FireEye company, we believe this is just the first of many possible router implant techniques and expect similar attack methods to become more popular and sophisticated in the future. In this webinar, you’ll learn about the malware and its capabilities, as well as tools to detect the threat in your organization. Join us to discover: - How SYNful Knock works - Why SYNful Knock is so difficult to detect, even when you suspect an implanted router - How you can better detect and foil SYNful Knock - What future variants of this attack might look like"
Watch Now

Putting Penetration Testing in Context

"Penetration testing is just one element in the overall process of obtaining confidence in the cyber security of the organisation. Consideration to security must be given in the architectural design of networks and the coding of applications and website. Where this is not the case penetration testing will provide an indication of what should be done to retrospectively apply security or to provide a ‘patch’ to make things better. Many investigations of cyber attacks have highlighted that the system has been compromised for some time, often years, without the system owner knowing. The penetration test provides an insight into the internal controls and the ability of the SOC or NOC to identify attacks. If the test is conducted and there is no indication that it has been detected, it is highly likely that real attacks have not been detected either and further analysis is required. It must be recognised that no security is impenetrable and therefore the ability to react to a cyber security incident is really important. The penetration testing is essential to test the organisation’s ability to respond. The statement that a penetration test will be quickly out of date is valid to some extent but without it the organisation is blind to the types of threats it is exposed to and the vulnerabilities in the systems. To be effective the testing programme must be placed in context and the links between assurance activities fully understood."
Watch Now

"Back to Basics: Defense-In-Depth to Maximize the ROI of Your Security Program"

"Non-targeted, opportunistic, targeted, and insider are 4 threat types, or groupings, that have been understood by the security community at large for years. These groupings of threats are largely based on motivation, prevention, detectability, cost, and impact to those affected. On the defensive side, the concept of defense in depth where you secure the outer perimeter to prevent threats, monitor the interior perimeter for anomalous behavior, and apply tight restrictions to the most sensitive data and system has also been a proven approach to minimizing the impact of threats. Join Wade Woolwine and Mike Scutt from Rapid7’s threat detection and incident response team to discuss how making threat groupings, the attack lifecycle, and defense in depth part of your overall security program planning can help you apply your resources in a way to maximize prevention, detection, and response for a more effective ROI. "
Watch Now

Spotlight

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the security issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals.

resources