Applied Security Analytics

Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
Watch Now

Spotlight

Outsourcing to cloud brings a new face to computation. In outsourcing, maintenance cost as well as upgrade cost is low to zero. Outsourcing's features are held back by data privacy concerns. In cloud, privacy of data can be assured by encryption schemes. Common encryption schemes will decrypt the data before processing and re encrypts data after processing, key sharing required. The sensitive data inside the processor are vulnerable to eavesdropping and other attacks. HEROIC Framework (Homomorphically EncRypted One Instruction Computer) a secure architecture for processing data in encrypted form is introduced as a promising solution to the security and privacy concerns.


OTHER ON-DEMAND WEBINARS

How to Excite your staff about Social Engineering & Awareness

Proofpoint

Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.

Designing Your Next-Gen Endpoint Security Strategy to Defend Against Modern Threats

Carbon Black

Today’s security battle is being waged at the endpoint, and industry analyst firms are all reaching the same conclusion: every organization needs to upgrade their endpoint security to a modern Next-Generation Endpoint Security solution (NGES). As your organization begins the search for a Next-Generation Endpoint Security (NGES) solution, you’re faced with an overwhelming number of vendors and approaches. So how does one build a next-gen endpoint security strategy?During this webcast, Rick McElroy, Carbon Black Security Strategist cuts through the noise and offers a clear description of.

HOW TO STAY RESILIENT TO BREACHES & AUDITORS

Dataguise

The GDPR is Here: How to Stay Resilient to Breaches and Auditors. In this session of our Webinar Wednesday series, Dataguise discusses the General Data Protection Regulation (GDPR) and how organizations can prevent breaches and audits. The presenter explores technology to help enterprise organizations protect personal data now that GDPR is here.

"Why Financial Services Companies Can't Afford Not to Secure their Email in 2015"

"It has taken decades for the leading financial services firms to establish trusted relationships with their customers - but that trust can be shattered in seconds with the click of a fraudulent email. Don't let cybercriminals misuse your brand, creating spoofed emails purporting to be from you, attacking your customers. Learn to identify how fraudsters are impersonating financial services communications and what you can do to take back control of your email communications - so that the only emails your customers receive are the ones you are legitimately sending."

Spotlight

Outsourcing to cloud brings a new face to computation. In outsourcing, maintenance cost as well as upgrade cost is low to zero. Outsourcing's features are held back by data privacy concerns. In cloud, privacy of data can be assured by encryption schemes. Common encryption schemes will decrypt the data before processing and re encrypts data after processing, key sharing required. The sensitive data inside the processor are vulnerable to eavesdropping and other attacks. HEROIC Framework (Homomorphically EncRypted One Instruction Computer) a secure architecture for processing data in encrypted form is introduced as a promising solution to the security and privacy concerns.

resources