How UNB is using policy, practice, and technology to enhance cyber security

"Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.

Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively."
Watch Now

Spotlight

For each high visibility targeted attack that has been made public, we really don't know how many have gone either undetected or undisclosed. Like an insect going through metamorphosis from one stage to the next, APT attacks are by definition multi-stage. Defenses must be specifically formulated to thwart APT's at specific stages of its life cycle, with the understanding that at different stages, different defenses will be most effective.


OTHER ON-DEMAND WEBINARS

Survive Cyber-Attacks in Healthcare with Isolated Recovery

Dell EMC

Hacktivists are targeting healthcare organizations with cyber-attacks at an alarming rate. Their objective is not just getting data access, it is more about holding your critical data hostage until you pay a ransom. In this webinar, Dell EMC will cover the impact cyber-attacks are having on healthcare organizations, the regulatory ramifications, and how Isolated Recovery helps you protect your organizations from these attacks.

Evolving Your Security Strategy to Overcome Business Challenges

Trustwave

"Organizations are having to cover more ground than ever when it comes to security. Yet businesses often lack the in-house skills and resources, so security leaders are turning to MSSPs to help bear the burden to ensure every area of risk is adequately attended to. Guest speaker, Forrester Research VP and Principal Analyst, Ed Ferrara, explains how MSS is changing the conversation for businesses to achieve security goals. Ed tackles your biggest security concerns such as: Overcoming the skills shortage Where to focus the budget - spending trends across industries The value of security - pitching it as an investment not a cost to business leader Improving business outcomes - leveraging MSSPs as a tactical arm to optimize IT security, efficiency and value"

Managing the Insider Threat—Why Visibility Is Critical

ObserveI

Only with full visibility into employee or third-party activity across a company network can even the earliest indicators of an insider threat be detected. By monitoring both user and file activity, security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach. Research from The Ponemon Institute shows that Financial Services organizations face the highest penalty costs of any other industry ($12.05 million annually) when they experience an insider-led incident, though they are closely followed by the Energy & Utilities and Retail sector. This cost alone is a very concrete reason to address what otherwise might seem to be an invisible problem.

Know Your APT Unknowns – How to Unlock Irrefutable Insight from Your Packets

"Advance Persistent Threats (APT) use unexpected, multiple, time limited and diverse attack vectors. Experience, knowledge and skills all play a powerful role in shaping effective security intervention decisions but without robust understanding of your context, actual network traffic and content you are left relying on making an informed guess which may or not prove to be correct. When APT security issues occur network security operations professionals are instantly under pressure from their organization to explain and resolve the problems swiftly. So how fast can you react to a suspected APT security anomaly? And even more importantly, are you giving yourself the best chance of success when you act by ensuring that your actions are informed, appropriate and effective?"

Spotlight

For each high visibility targeted attack that has been made public, we really don't know how many have gone either undetected or undisclosed. Like an insect going through metamorphosis from one stage to the next, APT attacks are by definition multi-stage. Defenses must be specifically formulated to thwart APT's at specific stages of its life cycle, with the understanding that at different stages, different defenses will be most effective.

resources