What GDPR Means for Your Security

Proofpoint

For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core. Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization. Join us to hear how to. Discover and classify personal data.
Protect all personal data by developing and implementing appropriate security controls. Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
Watch Now

Spotlight

The security industry has thousands of researchers looking for vulnerabilities in the software you use - HP Security Research alone has more than 3000. But how do you apply the security intelligence they develop to the job of protecting your network?


OTHER ON-DEMAND WEBINARS

The Hunter Becomes the Hunted

Security Current

"During this webinar attendees will learn techniques and processes that advanced security teams are using to analyze attackers before damage is done. In this webinar you'll learn: * Why ""hunting"" is an effective tool for stopping attacks * What indicators of compromise look like and how spot them in your network. * How corporations use Pravail Security Analytics * How to enable people, process, and technology to be more successful to hunt the attacker "
Watch Now

What is the Efficacy of your Ransomware Prescription?

FireEye, Inc.

You’re painfully aware that ransomware is an epidemic, but what can you do? You know there is no immunization for security breaches so how do you limit the consequences of them using technology, intelligence and expertise? Are you a sitting duck or is there anything you can do to improve your defenses even if your organization lacks security skills and resources? While ePHI is still an attractive target in healthcare organizations, disruptive attacks are a new norm among cyber threat actors who are using ransomware, deleting data, damaging systems or modifying critical data and hoping it goes undiscovered. And that’s just one aspect…the attack surface in healthcare continues to increase as connectivity grows. Who would have imagined EMR systems connected to biomedical devices? We go behind the headlines to discuss the state of threat intelligence and best practices for mitigating ransomware and other types of business disruption attacks.
Watch Now

Twelve Recommendations for Your Security Program in 2015

In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT
Watch Now

What's Your DNS Security Risk? Insights from Recent Ponemon Survey

Vanguard Group

Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. The survey also provides insights into: The level of visibility these organizations have, especially in today’s complex network deployments. Their use of threat intelligence and the effectiveness of threat intelligence. The efficiency of their security operations.
Watch Now

Spotlight

The security industry has thousands of researchers looking for vulnerabilities in the software you use - HP Security Research alone has more than 3000. But how do you apply the security intelligence they develop to the job of protecting your network?

resources