Protection Capabilities to Consider While Preparing for Advanced Malware

"We learned a few things about advanced malware in 2013. Namely, zero-day and targeted attacks continued to evade more traditional protection methods. And while many organizations are stepping up detection efforts, there’s still more that can and should be done. So what will 2014 bring?

Join McAfee and featured analyst firm Gartner for an in-depth look at what advanced threats are on the horizon for 2014 and what you can do to improve your security posture. Our conversation will cover:

Threat predictions for 2014 and beyond
Key capabilities to consider in your detection and protection arsenal
Planning for a successful advanced malware protection strategy"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Navigating the IT Security Certification Labyrinth

udemy

Cybersecurity remains a top priority for IT teams, but how can you prepare you and your team with the right skills? One of the challenges in IT security is the complex web of 200-300 different IT certifications. How can you navigate the IT security certification labyrinth and identify the best pathway for you and your team?
Watch Now

Making Security Cloud-Friendly

Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.
Watch Now

Key Trends in Payments Intelligence - Machine Learning for Fraud Prevention

Bank information security

Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for the business. Register for this webinar and join Marc Trepanier, Principal Fraud Consultant at ACI Worldwide, and leading industry analyst Julie Conroy of Aite Group as they discuss real-life use cases that demonstrate how banks can: Improve data management control costs while reducing the compliance and regulatory risks.
Watch Now

Stage 3 – Management: The third layer of your cyber-defense-in-depth strategy

When it comes to larger or more complex organizations, managing cyber security risks requires a more intensive approach than implementing basic security protection. Embedding risk-based security controls, managing the security of supply chains, and carrying out regular audits are some of the many measures an organization may need to take to manage and reduce risk.
Watch Now