Close Operational Gaps for Better Cybersecurity

"As security solutions become more sophisticated, the challenge is not a lack of data, but how to cut through the noise quickly to understand what is actionable and where to allocate resources.

In this webinar, we discuss strategies that provide your organization the best protection against cyberthreats:

•Reduce response times with visual actionable data
•Discover the unknown with automated threat correlation
•Streamline management with operational and policy control"
Watch Now

Spotlight

This White Paper offers an overview of ETSI's work on security in Information and Communications Technologies (ICT). Each section introduces a specific technology and outlines ETSI's involvement in the standardization of security in that area. Some of our major achievements are then highligh


OTHER ON-DEMAND WEBINARS

The Importance of Attribution Against Today's Cyber Adversaries

FireEye, Inc.

Without the right context and perspective to a situation, you cannot make an unbiased and fair decision. Any decision maker needs a 3D view of a situation to make informed decisions and opinions. It is similar in the security industry, if you have no context and you are not aware of the who, what, why and when in terms of a cyber attack then how do you know what to prioritise and where potential gaps maybe. This has never been more prevalent than during todays cyber threat landscape, attacks are becoming so sophisticated and specifically targeted that the right threat intelligence is absolutely key in surviving and being able to attribute correctly in your security strategy.

Reality Checking Your Security Testing Program

"In this webinar, security teams and developers will learn how they can improve their application security assessment program by fitting security testing into the daily build and test cycle. This enables organizations to create a continuous quality assurance process across all phases of development, whether they’re using Agile or other methodologies. Development and security teams will learn how to: -Embed security testing into daily build and test cycles as well as the certification or quality control phase of development. -Introduce security testing into the support phase of software development in light of the constantly evolving threat environment. -Transform and automate security testing by rapidly providing actionable and measurable results to the development organization and keeping pace with agile initiatives. Most security assessment programs were built to meet a particular compliance standard, and don’t scale beyond these requirements. This results in process mismatches, lack of agility, and incentive misalignment, which means that security ends up getting de-prioritized. It's time to move beyond a “check-box” approach, and embed security testing into the entire application lifecycle"

DDoS - A Modern Day Opportunity for Service Providers

Corero

The DDoS challenge of today has become a revenue generating opportunity for Converged Service Providers, Mobile Carriers as well as Wireline and Cable Carriers. While hardened centralized DDoS scrubbing operations are increasingly inflexible and becoming obsolete, localized DDoS mitigation operations are becoming the solution of choice for many. A new approach to DDoS protection, visibility and scalability is enabling Providers with new opportunities for revenue generating services--at a fraction of the cost of traditional DDoS defense solutions.

Compelling Reasons to use Vulnerability Intelligence

"Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms. As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk. In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture"