The New Cybersecurity: Leveraging the Cloud and Big Data

"We need a new cybersecurity model. One which will reduce the current insane complexity, handle the megavolumes of security events, and provide adequate defenses to organizations of all sizes and technical sophistication.
Fortunately, two maturing new technologies are available to point the way. First, the Cloud already provides a cost-effective Software-as-a-Service (SaaS) model. In similar fashion, the Cloud can be leveraged for Security-as-a-Service. In this model, large and sophisticated Cloud Service Providers (CSPs) provide the security experts, toolsets, and up-to-date threat information, all on a pay-as-you-go basis. Small and mid-sized organizations gain the same benefits as large ones.
The second technology is so-called Big Data which provides capabilities to analyze gigantic, rapidly growing datasets, such as security log files, to detect patterns, the evidence of ongoing or potential cyber-attacks; all in near real-time.
This session will review these exciting concepts which address the current cybersecurity issues while simultaneously reducing costs and simplifying the management headaches."
Watch Now

Spotlight

This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild.


OTHER ON-DEMAND WEBINARS

Adapting Software Security Assurance for Cloud and Mobile

"Many organizations have been building client-server and web applications for some time, and quite a few have reached a good level of maturity in regards to building security into their SDLC. Yet that traditional model of securing applications can’t fully address the security challenges presented by mobile and cloud infrastructures and the applications built around them. The business benefits of ubiquitous and quick data access (that come with mobile and cloud) are obvious, but the security issues are very real. Join this discussion to find out how internal development and security groups can update their software security assurance processes so that they are embracing AND securing mobile and cloud solutions"

How to Develop Military-Grade Cybersecurity

Join this session to hear from Mike Walls, a US Navy officer with combat cyber operations experience, who will share insights on how to keep your organizations' data secure against the most persistent and motivated cyber adversaries.

How Splunk + Digital Guardian Protect Data from Advanced Threats

"Attacks may be inevitable, but with Digital Guardian loss of sensitive data is not. This webinar will explore several customer use cases and show how Security Analysts and Incident Responders can harness the power of Splunk® Enterprise search across Digital Guardian event data to: - Detect threats - Prioritize threats - Respond to threats Examples include insider attacks and APTs, and will show how Digital Guardian data can provide valuable context for correlation with threat data from other security solutions in Splunk"

"Expect the Unexpected"

"We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale. In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future"

Spotlight

This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild.

resources