The Threat Landscape: A View From the Inside

"Advanced Persistent Threats are more than media hype. Dell has seen a significant increase in stealthy activity targeting specific intellectual assets.

Security strategies and tactics must evolve in light of the growth in APT attacks; how do you find and stop advanced threats before they become serious breaches?

This presentation will take you on a journey through the threat landscape taking in sights such as the latest activity on Trojans and viruses, how the bad guys are stealing intellectual property through the use of malware, the future of cyber warfare and how hacktivism has changed the threat landscape for the foreseeable future. We will look at the road ahead, and how you can use threat intelligence to inform your security strategy over the next year.

- The tools and techniques threat actors use

- The common vulnerabilities that led to successful breaches

- Pragmatic advice on what you can do to protect your critical information assets "
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cloud Security Must: Ensuring Least Privilege

The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.
Watch Now

IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly

IBM

Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for federation standards, they might be solely backend services accessed via APIs, or even legacy applications exposed only via some sort of middleware. However, agility in the digital journey mandates that IT can provide seamless access to all these services while keeping in control and enforcing security. Identity as a Service offering, whether deployed from a public or hybrid cloud, can take a central role, by acting as the common fabric connecting all the users and all the services. Such services include support for adaptive authentication, auditing features, broad federation services, authorization capabilities, and various capabilities.
Watch Now

On Demand Utilizing Data to Eradicate Threats With Splunk & Zscaler

Modern zero trust requires the right architecture, analytics, dynamic policy, and risk visibility in order to reduce the attack surface, prevent lateral movement, and make real-time threat determinations with each transaction. Zscaler and Splunk tightly integrate best-of-breed cloud security and security analytics platforms to
Watch Now

TLS/SSL Inspection for Stronger Cybersecurity

With cyberattacks becoming easier and cheaper to launch, it’s no surprise that 80.5% of technology leaders consider cyber attacks at their organization likely. Pulse and A10 Networks surveyed 200 technology leaders to find out how their companies are thinking about SSL inspection and decryption solutions as part of a Zero Trust strategy.
Watch Now