Threat Protection: how does the growing threat landscape affect you?

"If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
On this webcast we will cover;
•The main security challenges and trends in 2014
•Highlight how threats operate to allow you to better informed
•Key takeaways for executive / functional leaders"
Watch Now

Spotlight

A security officer has to be right all the time, the hacker has to be right once. Cybercriminals continuously target financial institutions, enterprises, eCommerce sites and other organizations to steal money and valuable business information. Trusteer, a leading provider of endpoint and clientless cybercrime prevention solutions, now joins IBM Security's broadest, advanced and most integrated security solutions.


OTHER ON-DEMAND WEBINARS

DRIVING IT, PRIVACY - CYBERSECURITY AND PERSONAL DATA PROTECTION - ON DEMAND WEBINAR

Initiatives to improve network security collides sometimes with the citizen's right to privacy and the protection of private data. An important point is that public policies for network security must respect our fundamental rights. Hear why Jesper Lund believes that restrictions on the use of techniques of privacy and encryption does not solve problems with network security - on the contrary.
Watch Now

Seamless Integration With Google Apps For Education

How can you make it easier to manage users in GAFE and integrate with your on-premises AD? Join us and learn how Azure AD Premium creates and manages identity in GAFE. We'll use the same easy-to-use tools that Office 365 uses for AD integration and give your users a friendly web portal for all of their applications, both in the cloud and on premises.
Watch Now

Security Incidents are the New Normal - Common Gaps in Network Security Strategies

ForeScout

In a survey conducted by Forescout and Frost & Sullivan last October, the reality of how many “serious incidents” were faced by large enterprises is discussed. The results are shocking, in this webinar we will look at the results and dissect the findings to demonstrate how businesses are facing attacks and dealing with incidents.
Watch Now

Using a Risk-Based Approach with Application Security

"Laz will present information on using a risk-based approach through the SDLC. The presenter will draw from his background and experience as a two-time former CISO working in two completely different environments. Use cases will include, but not limited to: Ideas of where to include exit criteria in your SDLC Streamlining and automating testing and tracking False positives - why they’re so time consuming Reporting and metrics Quantifying losses in dollars"
Watch Now

Spotlight

A security officer has to be right all the time, the hacker has to be right once. Cybercriminals continuously target financial institutions, enterprises, eCommerce sites and other organizations to steal money and valuable business information. Trusteer, a leading provider of endpoint and clientless cybercrime prevention solutions, now joins IBM Security's broadest, advanced and most integrated security solutions.

resources