Webinar Week: Data Breach Detection and Remediation

"2013 has been the year where there has been a real sea-change in the way the industry perceives data protection and data breaches. In the past, the focus has been on prevention, but it is now more widely accepted that the question of if you will suffer a data breach is now when you will suffer a data breach.

As a consequence, the information security industry is shifting its focus to detection and remediation. This webinar will consider the aftermath of a data breach. Experts will discuss the impact of disclosure, and take a look at strategies for PR, business continuity and forensics."
Watch Now

Spotlight

APTs are not welcome here. Leading hotel chain Motel 6 is fighting back against advanced persistent threats to protect credit card numbers and other private customer data. Trend Micro Deep Discovery gives Motel 6 a custom APT defense with visibility and control across data centers serving 5,000 endpoints. Security adapts to threat behavior so APTs can no longer hide.


OTHER ON-DEMAND WEBINARS

Intellectual Property: Cybersecurity's Next Front Line?

Theft of intellectual property is one of the top three risk facing business today, according to the 2013 Advanced Threat Report from FireEye. And it is hardly surprising that companies and regulators are starting to take the issue more seriously.In the US, listed companies will have to notify the SEC if a loss of IP presents a material risk to the business, and other regulators are watching the US move with interest. At the same time, the growth of sophisticated malware attacks – launched both by nation states and commercial entities – is often as much a result of a desire to steal commercial secrets, as it is to disrupt businesses.
Watch Now

Build Your Software Securely

VERACODE

By now, you are well aware of the implications of building and shipping insecure software. The increasing number of application software security and compliance requirements are becoming more significant within your daily workflow.This webinar will provide an overview of the software development landscape across different industry verticals. We will talk with secure development experts from Veracode and others on the best practices to measure application portfolio risk, implement practical steps for remediation of software vulnerabilities, and motivate development teams to embed these concepts into the software development lifecycle.How your development environment compares to others in the quality, threat landscape, and rate of remediation of its applications.What the likelihood is of your applications containing serious security risks.What measures your organization can take to reduce risk while building its applications.
Watch Now

PandaLabs Reveals the Cybersecurity Trends in Store for 2018 - Panda Security Webinar

Panda Security

Today, more malware samples are created in just a few hours than in the entire twentieth century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more precisely designed. Attackers are meticulously studying their victims to adapt their strategy and achieve the greatest possible impact. This Thursday, November 30, PandaLabs and Panda Security invite you to a webinar in which we will discuss: 1. What attacks have been trending in 2017? 2. The year in figures 3. Cybersecurity predictions for 2018 4. Conclusions and recommendations.
Watch Now

How to Remain Secure, Protect Data, and Stay Compliant in the Face of End of Life Operating Systems

Carbon Black

The ever-changing threat landscape continues to challenge businesses who attempt to protect critical data, improve security posture, and remain compliant. That challenge is intensified when adding the constant risk of operating systems going end of life and pushing endpoints out of compliance against many modern data security laws, regulations, and compliance policies. The risk is too great and businesses can no longer afford to take a passive stance when it comes to maintaining system endpoints and ensuring that vulnerabilities are in check.
Watch Now

Spotlight

APTs are not welcome here. Leading hotel chain Motel 6 is fighting back against advanced persistent threats to protect credit card numbers and other private customer data. Trend Micro Deep Discovery gives Motel 6 a custom APT defense with visibility and control across data centers serving 5,000 endpoints. Security adapts to threat behavior so APTs can no longer hide.

resources