Symantec's Reputation based security
Zulfikar Ramzan, technical director for Symantec’s Security Technology and Response Team, provides an overview of the recently released Symantec Report on the Underground Economy. The report provides data collected from Symantec and explores how cybercriminals network and exchange information for profit.
Stuxnet Worm: Preparing to Defend against Attack
The Stuxnet attack has changed the current Information Security landscape, this sophisticated attack has demonstrated techniques to breach air gapped systems, utilise stolen intellectual property, locate specific systems and deploy advanced stealth techniques. Whilst some of the components have been seen before this is the attack to bring so many sophisticated technologies including 4 zero day vunerability exploits into a single attack. During this webcast you will hear the latest analysis of the Stuxnet attack our insights into how future attacks can be detected and prevented.
BrightTALK Channel - Encryption and Data Loss Prevention
Visit the Symantec Encryption and Data Loss Prevention webcast channel for the latest webcats on Encryptin and Data Loss Prevention
BrightTALK Channel - Security
Visit the Symantec Security webcast channel for the latest webcasts on IT Security
Authentication Death Match: Mobility vs. Passwords (and why Passwords will lose)
"In the olden days, IT could provide managed devices to mobile users that provide proper protection and assurance. But with today's inexpensive, always-on, network-connected, consumer-grade devices, control is a myth and the antiquated reliance on passwords becomes a huge liability. Thus organizations need to start planning to build identity protection into the systems. For enterprises, this represents a novel and difficult challenge: balancing the need to deliver services to mobile users, while still defending the organization against data breach or fraud. This webcast will discuss the key trends around mobility and authentication, and the implications for an organization’s information security programs."
Defeating the Cyber Mutants: Protecting Your Business from Modern Malware
"Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: - Why traditional antivirus approaches no longer work - How Symantec Insight™ technology mitigates the threats of today and tomorrow - How the Symantec Endpoint Protection product family protects both the smallest businesses and the largest enterprises "
Understanding the real cost of a UK data breach
Securing information clearly continues to challenge organisations at all levels, but the vast majority of these breaches are preventable through the implementation of policies and technologies. This webinar will help with understanding where your risks lie and how information practices can be integrated into business processes.
Data Loss Prevention and Encryption: A Winning Strategy for Comprehensive Information Protection
While the need to protect sensitive data is well understood, understanding where to start is not as simple. With the explosion of information in today’s enterprise, increasing regulatory requirements for data protection, the growing sophistication of attackers, and the rising threat of insider leaks, information security professionals need smarter strategies to discover and protect their most sensitive information. Symantec’s integrated suite of data protection solutions, which include data loss prevention and encryption, provide a comprehensive solution to today’s data protection challenges.
06 Cze 2011.