View recorded webinar here - http://hubs.ly/H03W-Ns0
Learn the secrets of one mobile security superhero as he details his journey to defend his organization, the 2nd largest beverage distributor, against mobile threats.
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
View webinar recording - http://hubs.ly/H06134H0
Learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.
Tools for Evaluating Mobile Threat Defense SolutionsSkycure
View recorded webinar - http://get.skycure.com/evaluating-mobile-threat-defense-solution
Get the tools and information you need to make the evaluation process of Mobile Threat Defense solutions easier and ensure your success.
How Healthcare CISOs Can Secure Mobile DevicesSkycure
Original webinar: http://get.skycure.com/mobile-security-in-healthcare-webinar
In this webinar, Jim Routh, CSO at Aetna, and Adi Sharabani, CEO and co-founder at Skycure, discuss:
- The state of mobile security in Healthcare organizations
- How to improve incident response and resilience of mHealth IT operations
- How to leverage risk-based mobility to predict, detect and protect against threats
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
How can mobile device data be protected? This SANS webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
Watch webinar recording: http://hubs.ly/H01l56L0
Join Brian Katz, director of mobile strategy at VMware, and Varun Kohli, vice president at Skycure, discuss how to:
- Get visibility into ALL mobile threats, vulnerabilities and attacks impacting your organization today
- Integrate Skycure with AirWatch to predict, detect, and protect against mobile cyber attacks
- Stop attacks before they make it to the enterprise by profiling good and bad device, app and user behaviors by leveraging crowd wisdom
Supply Chain Threats to the US Energy SectorKaspersky
This presentation by Cynthia James discusses steps to take towards cyber-securing the supply chain of Energy sector organizations in the U.S. From the biggest challenges to a review of regulation and compliance guidelines, this deck covers three areas of Energy: nuclear, electric and "other".
Cynthia James is a CISSP (Certified Information Systems Security Professional) and frequent presenter for the TABD group at Kaspersky Lab, global provider of cybersecurity solutions. With 9 years of experience in the cybersecurity space, Cynthia is a regular speaker on the subject and has authored a book on cybercrime: “Stop Cybercrime from Ruining Your Life".
Kaspersky Lab, one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned, presents a short story about the company - its Values, Business, Solutions, i.e. what we think and strive for in our business, how we develop our technologies and solutions to protect our customers and people around the globe against cyberthreats, as well as the results we've managed to achieve.
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
View webinar recording - http://hubs.ly/H06134H0
Learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.
Tools for Evaluating Mobile Threat Defense SolutionsSkycure
View recorded webinar - http://get.skycure.com/evaluating-mobile-threat-defense-solution
Get the tools and information you need to make the evaluation process of Mobile Threat Defense solutions easier and ensure your success.
How Healthcare CISOs Can Secure Mobile DevicesSkycure
Original webinar: http://get.skycure.com/mobile-security-in-healthcare-webinar
In this webinar, Jim Routh, CSO at Aetna, and Adi Sharabani, CEO and co-founder at Skycure, discuss:
- The state of mobile security in Healthcare organizations
- How to improve incident response and resilience of mHealth IT operations
- How to leverage risk-based mobility to predict, detect and protect against threats
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
How can mobile device data be protected? This SANS webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
Watch webinar recording: http://hubs.ly/H01l56L0
Join Brian Katz, director of mobile strategy at VMware, and Varun Kohli, vice president at Skycure, discuss how to:
- Get visibility into ALL mobile threats, vulnerabilities and attacks impacting your organization today
- Integrate Skycure with AirWatch to predict, detect, and protect against mobile cyber attacks
- Stop attacks before they make it to the enterprise by profiling good and bad device, app and user behaviors by leveraging crowd wisdom
Supply Chain Threats to the US Energy SectorKaspersky
This presentation by Cynthia James discusses steps to take towards cyber-securing the supply chain of Energy sector organizations in the U.S. From the biggest challenges to a review of regulation and compliance guidelines, this deck covers three areas of Energy: nuclear, electric and "other".
Cynthia James is a CISSP (Certified Information Systems Security Professional) and frequent presenter for the TABD group at Kaspersky Lab, global provider of cybersecurity solutions. With 9 years of experience in the cybersecurity space, Cynthia is a regular speaker on the subject and has authored a book on cybercrime: “Stop Cybercrime from Ruining Your Life".
Kaspersky Lab, one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned, presents a short story about the company - its Values, Business, Solutions, i.e. what we think and strive for in our business, how we develop our technologies and solutions to protect our customers and people around the globe against cyberthreats, as well as the results we've managed to achieve.
How to Add Advanced Threat Defense to Your EMMSkycure
View recorded webinar here: http://hubs.ly/y0SRV90
In this webinar presentation we discuss how to:
- Stop mobile attacks before they make it to the enterprise by leveraging crowd wisdom
- Dynamically enforce BYOD, security and compliance policies based on actively detected threats
- Leverage risk-based enterprise mobility management to detect and protect against corporate espionage via infiltrated mobile devices
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
In this presentation, we discuss about the trend on application, cloud and cyber security. We analyze surveys on several hundred of companies to show the trend on security concerns, threats, and what controls companies are looking to do.
It also introduce Pactera's cybersecurity capabilities in providing end-to-end managed services for application security testing, secure code review, penetration testing, application security - secure coding practice training, third-party supplier security risk assessment, data governance and ISO 27001 based assessments.
Watch the webinar recording: http://hubs.ly/y0XwTS0
In this RSA Conference webcast, security experts Adi Sharabani and Yair Amit describe the current threat landscape for mobile devices and discuss security strategies.
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
For several years now, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been monitoring more than 60 threat actors responsible for cyber-attacks worldwide. By closely observing these organizations, which appear to be fluent in many languages, including Russian, Chinese, German, Spanish, Arabic and Persian, we have put together a list of what seem to be the emerging threats in the APT world. We think these will play an important role in 2015 and deserve special attention. As a participant of the webinar, you will be the first to hear our detailed analysis of the trends.
The webinar was hosted by Costin Raiu, Director of GReAT at Kaspersky Lab, on December 11.
“If we can call 2014‘sophisticated’, then the word for 2015 will be ‘elusive’. We believe that APT groups will evolve to become stealthier and sneakier, in order to better avoid exposure. This year we’ve already discovered APT players using several zero-days, and we’ve observed new persistence and stealth techniques. We have used this to develop and deploy several new defense mechanisms for our users,” comments Costin Raiu.
Listen to the presentation https://kas.pr/aptwebinar
Read the full report https://kas.pr/ksb
View recorded webinar - http://get.skycure.com/accessibility-clickjacking-webinar
Accessibility Clickjacking, a vulnerability discovered by Skycure’s Mobile Threat Defense Research Team, is a method hackers may use to gain complete control over an Android device, including acquiring elevated privileges and exposing the content of all apps on the device.
It can compromise container solutions and is extremely difficult to detect.
Kaspersky endpoint security business presentationData Unit
A presentation of the kaspersky portofolio for business. The antivirus package of kaspersky Endpoints, can secure your mobiles, desktops, servers and more.
Solar winds supply chain breach - Insights from the trenchesInfosec
On December 13 2020, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to immediately “disconnect or power down SolarWinds Orion products” as they were being actively exploited by malicious actors.
Infosec Skills author and KM Cyber Security managing partner Keatron Evans is helping numerous clients respond to the breach and mitigate any potential damage. Join him as he discusses:
-What we know about the breach so far
-How his clients have responded to the incident
-What to look for in your environment to see if you’ve been affected
DevOps Indonesia "How Security with DevOps can Deliver more secure software"
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - Remediation) by Mr. Faisal Yahya
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
Nico Popp, Vice President, Information Protection, Symantec explains. As users, infrastructure and applications move to the cloud at a record-breaking pace, the cloud has become a paradox: both a dream and a nightmare. Accessibility, scale, price and elasticity drive high adoption while security is a source of constant concern. This session will focus on a practical four pillar model for enterprise cloud security, all supported by real-world implementation.
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
A key business goal of any organization is to maintain the constant availability of data and systems that can be trusted for decision-making purposes. The evolving threat landscape has resulted in increasing focus, right to board level, on cybersecurity. IT operational and security teams should demonstrate a comprehensive, cohesive approach in their response to security incidents and data breaches.
We are all aware of the current risks when developing a connected product, especially with vehicles since much is at stake both from an information and safety perspective. In this workshop, we will learn how to build Security requirements, architect, design, test and produce Safety and Security critical components using a methodology that works in harmony both with Engineering and Security
Malware evolution and Endpoint Detection and Response Adrian Guthrie
As malware evolves into targeted Advance Persistent Threat the response has to change to more proactive security model.
Automated Prevention Block malware and exploits to prevent Automated Detection -Targeted and zero-day attack are block in real time
Automated Forensics - Forensic information for in-dept analysis of every attempted attack
Automated Remediation - Automated malware removal
all made possible by Big Data analytics and Collective Intelligence .
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
View on demand: http://event.on24.com/wcc/r/1071186/DB920F7B3EC241F8D7637CE3303D6585
Session 2 of IBM’s #CoverYourApps with Application Security on Cloud Webinar Series
In this session, you’ll learn how to test application source code for potential security vulnerabilities, so that you can confidently release your organization’s applications. Special emphasis will paid on how to test code quickly and effectively, in order to keep up with the ever-increasing pace of application release schedules.
Check out the rest of our #CoverYourApps with IBM’s Application Security on Cloud Webinar Series! Register today for all three to get up to speed on the latest from IBM on Application Security on Cloud.
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
Get a comprehensive view of today’s threat landscape — and a deeper understanding of the biggest cyber risks facing organizations today — with new insights from the Nokia Threat Intelligence Lab.
The annual Nokia Threat Intelligence Report takes a look at the past year’s threat activity, including malware infections on mobile and fixed networks, based on data from hundreds of millions of endpoints and Internet of Things (IoT) devices protected by Nokia’s NetGuard Endpoint Security solution.
In this webinar, lead security researcher Paul Edwards will cover the highlights of the report and drill down into key threat trends, including:
The impact of COVID-19 on malware infection rates
The massive surge in IoT-related infections — a 100% increase over last year
The top malware seen so far in 2020
Roche Considers Enterprise Contract Management Software from IcertisIcertis
Roche Diagnostics rebuild its contract management system on the Icertis Contract Management Platform, which has helped them to scale to meet an increasing volume of contracts. Roche now has end to end visibility into the contracting process.
Marketing Agility: A Brand Point Management PerspectiveSchawk, Inc.
This white paper discusses how brand point management improves a business’ ability to react to the marketplace more quickly. Brand point management promotes marketplace agility by considering three critical components: people, process and technology.
How to Add Advanced Threat Defense to Your EMMSkycure
View recorded webinar here: http://hubs.ly/y0SRV90
In this webinar presentation we discuss how to:
- Stop mobile attacks before they make it to the enterprise by leveraging crowd wisdom
- Dynamically enforce BYOD, security and compliance policies based on actively detected threats
- Leverage risk-based enterprise mobility management to detect and protect against corporate espionage via infiltrated mobile devices
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
In this presentation, we discuss about the trend on application, cloud and cyber security. We analyze surveys on several hundred of companies to show the trend on security concerns, threats, and what controls companies are looking to do.
It also introduce Pactera's cybersecurity capabilities in providing end-to-end managed services for application security testing, secure code review, penetration testing, application security - secure coding practice training, third-party supplier security risk assessment, data governance and ISO 27001 based assessments.
Watch the webinar recording: http://hubs.ly/y0XwTS0
In this RSA Conference webcast, security experts Adi Sharabani and Yair Amit describe the current threat landscape for mobile devices and discuss security strategies.
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
For several years now, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been monitoring more than 60 threat actors responsible for cyber-attacks worldwide. By closely observing these organizations, which appear to be fluent in many languages, including Russian, Chinese, German, Spanish, Arabic and Persian, we have put together a list of what seem to be the emerging threats in the APT world. We think these will play an important role in 2015 and deserve special attention. As a participant of the webinar, you will be the first to hear our detailed analysis of the trends.
The webinar was hosted by Costin Raiu, Director of GReAT at Kaspersky Lab, on December 11.
“If we can call 2014‘sophisticated’, then the word for 2015 will be ‘elusive’. We believe that APT groups will evolve to become stealthier and sneakier, in order to better avoid exposure. This year we’ve already discovered APT players using several zero-days, and we’ve observed new persistence and stealth techniques. We have used this to develop and deploy several new defense mechanisms for our users,” comments Costin Raiu.
Listen to the presentation https://kas.pr/aptwebinar
Read the full report https://kas.pr/ksb
View recorded webinar - http://get.skycure.com/accessibility-clickjacking-webinar
Accessibility Clickjacking, a vulnerability discovered by Skycure’s Mobile Threat Defense Research Team, is a method hackers may use to gain complete control over an Android device, including acquiring elevated privileges and exposing the content of all apps on the device.
It can compromise container solutions and is extremely difficult to detect.
Kaspersky endpoint security business presentationData Unit
A presentation of the kaspersky portofolio for business. The antivirus package of kaspersky Endpoints, can secure your mobiles, desktops, servers and more.
Solar winds supply chain breach - Insights from the trenchesInfosec
On December 13 2020, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to immediately “disconnect or power down SolarWinds Orion products” as they were being actively exploited by malicious actors.
Infosec Skills author and KM Cyber Security managing partner Keatron Evans is helping numerous clients respond to the breach and mitigate any potential damage. Join him as he discusses:
-What we know about the breach so far
-How his clients have responded to the incident
-What to look for in your environment to see if you’ve been affected
DevOps Indonesia "How Security with DevOps can Deliver more secure software"
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - Remediation) by Mr. Faisal Yahya
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
Nico Popp, Vice President, Information Protection, Symantec explains. As users, infrastructure and applications move to the cloud at a record-breaking pace, the cloud has become a paradox: both a dream and a nightmare. Accessibility, scale, price and elasticity drive high adoption while security is a source of constant concern. This session will focus on a practical four pillar model for enterprise cloud security, all supported by real-world implementation.
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
A key business goal of any organization is to maintain the constant availability of data and systems that can be trusted for decision-making purposes. The evolving threat landscape has resulted in increasing focus, right to board level, on cybersecurity. IT operational and security teams should demonstrate a comprehensive, cohesive approach in their response to security incidents and data breaches.
We are all aware of the current risks when developing a connected product, especially with vehicles since much is at stake both from an information and safety perspective. In this workshop, we will learn how to build Security requirements, architect, design, test and produce Safety and Security critical components using a methodology that works in harmony both with Engineering and Security
Malware evolution and Endpoint Detection and Response Adrian Guthrie
As malware evolves into targeted Advance Persistent Threat the response has to change to more proactive security model.
Automated Prevention Block malware and exploits to prevent Automated Detection -Targeted and zero-day attack are block in real time
Automated Forensics - Forensic information for in-dept analysis of every attempted attack
Automated Remediation - Automated malware removal
all made possible by Big Data analytics and Collective Intelligence .
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
View on demand: http://event.on24.com/wcc/r/1071186/DB920F7B3EC241F8D7637CE3303D6585
Session 2 of IBM’s #CoverYourApps with Application Security on Cloud Webinar Series
In this session, you’ll learn how to test application source code for potential security vulnerabilities, so that you can confidently release your organization’s applications. Special emphasis will paid on how to test code quickly and effectively, in order to keep up with the ever-increasing pace of application release schedules.
Check out the rest of our #CoverYourApps with IBM’s Application Security on Cloud Webinar Series! Register today for all three to get up to speed on the latest from IBM on Application Security on Cloud.
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
Get a comprehensive view of today’s threat landscape — and a deeper understanding of the biggest cyber risks facing organizations today — with new insights from the Nokia Threat Intelligence Lab.
The annual Nokia Threat Intelligence Report takes a look at the past year’s threat activity, including malware infections on mobile and fixed networks, based on data from hundreds of millions of endpoints and Internet of Things (IoT) devices protected by Nokia’s NetGuard Endpoint Security solution.
In this webinar, lead security researcher Paul Edwards will cover the highlights of the report and drill down into key threat trends, including:
The impact of COVID-19 on malware infection rates
The massive surge in IoT-related infections — a 100% increase over last year
The top malware seen so far in 2020
Roche Considers Enterprise Contract Management Software from IcertisIcertis
Roche Diagnostics rebuild its contract management system on the Icertis Contract Management Platform, which has helped them to scale to meet an increasing volume of contracts. Roche now has end to end visibility into the contracting process.
Marketing Agility: A Brand Point Management PerspectiveSchawk, Inc.
This white paper discusses how brand point management improves a business’ ability to react to the marketplace more quickly. Brand point management promotes marketplace agility by considering three critical components: people, process and technology.
When Healthcare Data Analysts Fulfill the Data Detective RoleHealth Catalyst
There’s a new way to think about healthcare data analysts. Give them the responsibilities of a data detective. If ever there were a Sherlock Holmes of healthcare analytics, it’s the analyst who thinks like a detective. Part scientist, part bloodhound, part magician, the healthcare data detective thrives on discovery, extracting pearls of insight where others have previously returned emptyhanded. This valuable role comprises critical thinkers, story engineers, and sleuths who look at healthcare data in a different way. Three attributes define the data detective:
They are inquisitive and relentless with their questions.
They let the data inform.
They drive to the heart of what matters.
Innovative analytics leaders understand the importance of supporting the data analyst through the data detective career track, and the need to start developing this role right away in the pursuit of outcomes improvement in all healthcare domains.
Healthcare Analytics Adoption Model -- UpdatedHealth Catalyst
The Healthcare Analytics Adoption Model is the result of a collaboration of healthcare industry veterans over the last 15 years. The model borrows lessons learned from the HIMSS EMR Adoption Model, and describes an analogous approach for assessing the adoption of analytics in healthcare.
The Healthcare Analytics Adoption Model provides:
1) A framework for evaluating the industry’s adoption of analytics
2) A roadmap for organizations to measure their own progress toward analytic adoption
3) A framework for evaluating vendor products
This Analytics Adoption Model will enable healthcare organizations to fully understand and leverage the capabilities of analytics and so achieve the ultimate goal that has eluded most provider organizations – that of improving the quality of care while lowering costs and enhancing clinician and patient satisfaction.
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHealth Catalyst
Many healthcare organizations don’t hold quality and cost gains because they don’t make improvement the backbone of their organization. Rather, they approach improvement as a series of initiatives. Ronald D. Snee, a fellow with the American Society for Quality states, “Many organizations focus on sustaining the gains only after improvement has been achieved. Intuitively, that may seem the correct sequence, but it is in fact backwards. The time to focus on sustaining improvement gains is well before the initiative is launched.”
Here are 3 critical organizational steps that can help sustain those gains.
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Health Catalyst
It can be confusing to know whether or not your health system needs to add a data warehouse unless you understand how it’s different from a clinical data repository. A clinical data repository consolidates data from various clinical sources, such as an EMR, to provide a clinical view of patients. A data warehouse, in comparison, provides a single source of truth for all types of data pulled in from the many source systems across the enterprise. The data warehouse also has these benefits: a faster time to value, flexible architecture to make easy adjustments, reduction in waste and inefficiencies, reduced errors, standardized reports, decreased wait times for reports, data governance and security.
What is the best Healthcare Data Warehouse Model for Your Organization?Health Catalyst
Join Steve Barlow as he addresses the strengths and weaknesses of each of the following three primary Data Model approaches for data warehousing in healthcare:
1. Enterprise Data Model
2. Independent Data Marts
3. Late-binding Solutions
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
Gartner recently released a report on IT security priorities for the remainder of 2014. Amongst respondents, network security, application security, endpoint security, and security services all ranked highly. In this quick-fire, half-day roadshow, Scalar brings you solutions to these problems from three of our most strategic security vendors, as well as a full presentation on our managed security services portfolio.
Gartner recently released a report on IT security priorities for the remainder of 2014. Amongst respondents, network security, application security, endpoint security, and security services all ranked highly. In this quick-fire, half-day roadshow, Scalar brings you solutions to these problems from three of our most strategic security vendors, as well as a full presentation on our managed security services portfolio.
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
If you still think Mobile Security is a thing of the future--think again. Millions of mobile devices worldwide were exposed in 2015 to vulnerabilities and advanced cyber-attacks including: No iOS Zone, XcodeGhost, Stagefright and SwiftKey to name just a few. Given 2015’s ultra-active cyber-risk front, we are sure 2016 has much more in store. In this webinar, Yair Amit, CTO and Co-founder at Skycure, wraps-up the state of mobile security in 2015 and shares his predictions for 2016.
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
[View the Webinar] - https://electrici.mp/2v1fQlI
Electric Imp CEO, Hugo Fiennes, and UL’s Director of Connected Technologies, Rachna Stegall discuss the unique demands of helping to secure the IoT — and why independent certification is even more critical in the fast-evolving world.
Join us to hear Fiennes & Stegall share candid insights into why establishing an IoT Security Benchmark, such as UL 2900-2-2 Cybersecurity Certification, is critical for due diligence of edge to enterprise technologies — and the future of commercial, industrial and consumer IoT overall.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
On Thursday, September 25, Bluebox Security hosted a webinar on transforming risky mobile apps into self-defending apps. During the webinar, Subbu Iyer, VP of Product management, analyzed the anatomy of risky apps and explained how to encrypt and protect data from device or app-level compromises.
View and listen to the entire webinar here:
http://offers.bluebox.com/resource-webinar-transform-risky-mobile-apps.html
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty.
In his session at 16th Cloud Expo, Denny Heaberlin, Security Product Manager with Windstream's Cloud and Data Center Marketing team, discussed how to manage these concerns and how choose the right cloud vendor, an essential part of any cloud strategy.
As security professionals, how can we be sure that we’re ready for 2019? After the last few years, when our practices and conventions have been tested again and again, it’s a little daunting to consider what may face us in the year ahead. Will attackers set their sights on cloud apps? Will hackers join forces with organized crime? Will governments look to the private sector to deal with the skills gap? What will happen to cybersecurity budgets? Join us to get answers to these questions and more.
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
James Brown, Director of Cloud Computing & Security Architecture, Alert Logic covers:
• The shared security model: what security you are responsible for to protect your content, applications, systems and networks vs AWS.
• Overview of the OWASP Top 10 most critical web application security risks (such as SQL injections)
• Best practices for how to protect your environment from the latest threats
The Future of Mobile Application SecuritySecureAuth
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks.
SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges.
-Secure enterprise application deployment
-End-to-end data security with strong encryption
-Managed application container that works on any device
-Developer SDK for creating rich application user experiences
Nowadays, your users are the primary attack vector, since they are not only sitting in the office, but they also carry mobile devices that are always on and almost always connected to the Internet.
So, besides protecting your datacenter, you need to protect your users wherever they are and whenever they connect to the Internet and/or to your corporate network.
zScaler, as a SaaS (Security-as-a-Service) platform, enables you to provide such protection, as well streamline your network connectivity.
Gartner recently released a report on IT security priorities for the remainder of 2014. Amongst respondents, network security, application security, endpoint security, and security services all ranked highly.
Together with our event partners Cisco, F5, and Bromium, Scalar brings you solutions to these problems, as well as a full presentation on our managed security services portfolio.
17. 17
RNDC’S MOBILE THREAT DEFENSE JOURNEY
Mobile is where PC was 20 years ago
Mobile is actually MORE VALUABLE and MORE VULNERABLE than other corporate devices
You don’t just need to manage these devices,
you need to SECURE THEM too
18. THERE WAS SKEPTICISM EARLIER…
18
MANAGEMENT BUY-IN WAS EASY
1 2
• Leveraged SKYCURE’S iOS
MALICIOUS PROFILE EXPLOIT
• Took over CFO’s iPhone in less
than a minute
• Easiest sell ever
• Skycure gave 250 FREE SEATS as
part of the trial
• 30% DEVICES had known
vulnerabilities
• 10 DEVICES had keystroke
loggers
19. 19
MY SELECTION CRITERIA
USER IT
• USER EXPERIENCE
• PRIVACY
• BATTERY LIFE
• CLOUD was a must
• Integrated like glue with
AIRWATCH
• Protection against
MALICIOUS APPS, NETWORKS
AND DRIVE-BY WEBSITES
WHO ELSE DID
WE LOOK AT?
ZIMPERIUM
AND
LOOKOUT
Zimperium had a complicated UX and
required scripting
Lookout did not do anything for network
awareness and protection
21. • MULTIPLE DEVICES had malicious activity
• SKYCURE HELPED WITH IMMEDIATE REMEDIATION
• GETTING MORE MOBILE RELATED QUESTIONS – There is more awareness
• Helps to drive more applications into the AirWatch App Store rather than fighting the
pushback
• This gives us a touch into the salesforce automation program.
THIS WAS MISSING EARLIER.
• “THANK YOU’S” from all associate levels, especially for securing BYO devices and
personal data in addition to business data
21
OVERALL IMPACT OF SKYCURE
5,000+
Users
8,000
Devices
~10,000
Networks
Scanned
850,000
Apps
Analyzed
4,000,000
Tests
Performed
23. Manage All Endpoints in a Single Solution
23
Any Endpoint Any Use Case
Knowledge
worker
Corporate |
BYO
Task worker
Line of Business
No user
Kiosk | IOT
Modern Management Framework
Out of box
configuration
Policies and
security settings
Over-the-air
management and
updates
Asset
tracking
Full lifecycle
management
24. Protect Company Apps and Data Through Multi-layered Security
24
Intelligent Access Controls | Automated Compliance
Secure
the Endpoint
Trust
the User
Containerize
the App
Safeguard
the Data
Protect
the Network
25. 25
Skycure + AirWatch allows you to predict, detect and proactively mitigate mobile threats
Skycure and AirWatch Integration
Malware
Vulnerability
Network
Mobile
Threats