Upcoming Webinars
Webinar Archives
IBM X-Force 2012 Annual Trend Report: Data Breach Issues and Solutions
Date: May 09, 2013 - 17:00:00 EDT

View webinar
Cyber-attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. At the same time, risks associated with system interconnectedness, poor policy enforcement and human error are also growing as every organization’s productivity, revenue, compliance, customer relationships and brand value become more dependent on trusted information.

To defend against this threat landscape, IT security, compliance and data management professionals must continue to ask the hard questions about how to secure an enterprise that is interconnected by means of cloud, mobile, and outsourcing technologies.

Join Robert Freeman of IBM X-Force® Advanced Research as he presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

By attending this free, highly informative webinar, you’ll discover:

  • Five common mistakes IT organizations make when it comes to data security
  • Why the cloud makes it more important than ever to understand how users access data
  • How to implement evolving best security practices despite limited IT resources

Webcast attendees will receive a complimentary copy of IBM X-Force 2012 Annual Trend Report.
IBM X-Force 2012 Annual Trend Report: Data Breach Issues and Solutions
Date: May 09, 2013 - 17:00:00 EDT

View webinar

Cyber-attacks continue to grow in volume and sophistication — relentlessly evolving to bypass traditional IT defenses. At the same time, risks associated with system interconnectedness, poor policy enforcement and human error are also growing as every organization’s productivity, revenue, compliance, customer relationships and brand value become more dependent on trusted information.

To defend against this threat landscape, IT security, compliance and data management professionals must continue to ask the hard questions about how to secure an enterprise that is interconnected by means of cloud, mobile, and outsourcing technologies.

Join Robert Freeman of IBM X-Force® Advanced Research as he presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

By attending this free, highly informative webinar, you’ll discover:

  • Five common mistakes IT organizations make when it comes to data security
  • Why the cloud makes it more important than ever to understand how users access data
  • How to implement evolving best security practices despite limited IT resources


Webcast attendees will receive a complimentary copy of IBM X-Force 2012 Annual Trend Report.

The Evolving Threat of Sophisticated Attacks
Date: May 16, 2013 - 16:00:00 EDT

View webinar

Join us for this special webcast and discover how online attackers have grown more sophisticated, targeted and dangerous to any organization’s environment and the broad potential impacts they cause, ranging from internal service interruptions to devastating brand image consequences.

IT Security Professionals who attend will obtain a better understanding of the risk your business faces by learning the latest details from the recently released IBM X-Force R&D Team's "Risk and Trend Report". This bi-annual report leads the industry in identifying the latest threats.

During this webcast, attendees will learn:

  • How the latest risks relentlessly evolve to bypass traditional IT defenses
  • How the risks associated with system interconnectedness, poor policy enforcement and human error are impacting every organization's productivity, revenue, compliance and customer satisfaction
  • Learn more about the ability of these threats to impact your brand value as organizations become more dependent on trusted information


To defend against this threat landscape, IT security, compliance and data management professionals must continue to learn the latest information on attack vectors, hacker motivations and more. Find out which areas hackers are targeting at enterprises like yours to help you keep your organization ahead of the threat.

Join Michael Montecillo, Managed Security Services Threat and Intelligence Principal, as he presents an in-depth analysis of recent public vulnerability disclosures and discusses important lessons learned.

How Attackers Identify and Exploit Software and Network Vulnerabilities
Date: May 22, 2013 - 14:00:00 EDT

View webinar

Every attack on an enterprise begins with a single vulnerability - usually a hole in an application, an open port on a network, or a misconfigured device. But how do the bad guys find these vulnerabilities? What methods do they use to seek out potential entry points, and how do they use those flaws to crack your enterprise data? In this fascinating webcast, top security experts look at the latest trends and techniques in vulnerability detection and offer a detailed look at the latest methods for exploiting vulnerabilities in enterprise applications.

Cloud Security: It’s Not Just for IT Anymore
Date: May 22, 2013 - 17:00:00 EDT

View webinar

Security has always been a concern for IT when considering a move to the cloud.

  • Does the provider meet industry standards for security and compliance?
  • Is the data center secure?
  • Is there spam and virus protection?


But Human Centric Security is also top of mind for many in Line-of-Business (LOB) roles. Knowledge workers on all levels are looking for cloud collaboration tools that allow them to be more productive in their day-to-day activities, but won’t get them in hot water with their CIO. While IT worries about protecting data, LOB is focused on controlling their information.

Attend this webcast to learn more about social cloud solutions with application security that meet the needs of both IT and LOB.

Getting a Grip on Mobile Malware
Date: May 23, 2013 - 17:00:00 EDT

View webinar

With iPads, iPhones and other smartphones and tablets accessing your network, there’s much more to consider than simple device management. The corporate use of these devices makes them an increasingly attractive target for malware writers. So what can you do to keep mobile malware at bay?

Join Sophos mobile security experts Barbara Hudson and Vanja Svajcer to learn about:

  • The most common types of Android malware and how they are distributed
  • Some simple tips to avoid malware
  • The available solutions to protect your devices


Register for this webinar to learn what types of mobile malware are around today and how you can protect your organization from these threats.

Get Actionable Insight with Security Intelligence for Mainframe Environments
Date: Jun 04, 2013 - 15:00:00 EDT

View webinar

For the last 50 years the IBM Mainframe has been the most secure computing platform to run critical applications and host essential business data. Customer's business requirements are constantly changing to support new growth opportunities, which in turn affects Mainframe security risks. The resulting security requirements include:

  • Access to applications and data by Customers and Business Partners outside the traditional enterprise.
  • End user deployment of more vulnerable mobile endpoints (BYOD) to access applications and data.
  • Utilization of Mainframe to consolidate workloads providing a virtualization platform for Cloud.
  • Need to address worldwide security regulations and industry standards for enterprise security audits and compliance.


Mainframe customers must ask themselves several questions:

  • Are mainframe security capabilities aligned to business requirements?
  • What are you doing to secure this new interconnectedness?
  • Can unauthorized users get to your mainframe data?
  • Can authorized users be monitored to detect privileged user abuse?
  • Can you automate enterprise event analysis and alerts to react quickly?
  • How do you detect risky security configuration settings and changes?
  • Can you consolidate security operations and reduce costs?


IBM recommends that customer's employ multiple layers of defense to protect their mainframe assets. These layers of defense address four security domains: People, Data, Application, and Infrastructure. This webinar describes IBM’s integrated solution to protecting the mainframe assets, addressing compliance, and reducing costs.

Why is Information Governance So Important for Modern Analytics?
Date: Jun 12, 2013 - 15:00:00 EDT

View webinar

The data that feeds your analytics solutions can include everything from customer details to financial records to employee data. The impact of this data getting into the wrong hands either internally or externally can have a major impact on the organizations success and can cost many millions of dollars, which brings information governance and analytics to the forefront for many organizations.

Register for this teleconference to learn how to:

  • Reduce business risks and costs
  • Deliver the business insights your users need to drive optimal business performance
  • Decrease the opportunity for critical data to be exposed and put at risk


Join this teleconference and learn how the combination of IBM information governance offerings and analytic solutions on the z Enterprise platform can help you to enhance information integrity, availability and quality.

4 Phases of Every Attack
Date: Jul 24, 2013 - 14:00:00 EDT

View webinar

Threats continue to grow in complexity and sophistication. Coupled with rapidly evolving usage patterns that include cloud services, mobile devices and tablets—it can be very challenging to understand the modern threat landscape.

By understanding the 4 common phases of every attack, you can be better prepared to protect your organization's infrastructure, reduce downtime from malware infections, and eliminate data loss.

Register for this interactive discussion to:

  • Identify attacker motivations, tricks and techniques
  • Dissect the 4 common phases of every attack
  • Understand recommended security controls and countermeasures that are most effective within each phase of an attack.


New Trends in Advanced Persistent Threats
Date: Jul 24, 2013 - 14:00:00 EDT

View webinar

New Trends in Advanced Persistent Threats

Advanced persistent threats have been on security professionals’ minds for years now, but today’s APTs are very different from the Stuxnet attack first seen three years ago. Attackers are becoming more sophisticated, and their intrusions are much harder to detect than they’ve ever been. How are APTs changing? What new strategies are there for fighting them?  In this special webinar, a top industry expert will offer a look at the latest advanced threats and offer some insight as to where they are going – and what your enterprise can do to detect and prevent them.

Join us on 7/24 at 11am PT/ 2pm ET. Register now!

Wireless Security: Beyond the Basics
Date: Jul 25, 2013 - 14:00:00 EDT

View webinar

It isn’t hard to set up security for the wireless router in your house – all you need to do is change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. 

Attend this webinar to learn how to:

  • Ensure that wireless access points are secure from unauthorized access
  • Provide controlled access for guests
  • Integrate wireless traffic into your network security infrastructure

Register for this webinar to join Bill Prout, wireless and network security expert at Sophos, and learn the best practices that can help you go beyond the basics of wireless security to provide advanced security, manageability and accessibility. 

Exposing the Hidden Costs of Database Security Solutions
Date: Aug 01, 2013 - 14:00:00 EDT

View webinar

IT security professionals evaluating various database security solutions will see a slew of benefit statements and favorable pricing, all in an effort to influence a purchase decision toward a specific solution.  Nevertheless, by paying close attention to the features in six key capabilities, decision-makers can calculate the hidden cost of any such solution in three critical areas: Staff, Hardware, and Risk Mitigation.  Once these hidden costs are calculated, line-of-business and IT executives will see a wide disparity between database security offerings from which the solution with the largest organizational value and lowest total cost of ownership may be selected.

In this webinar, we will provide a framework to calculate the financial impact of any database security solution, and evaluate the attributes and features:

  • Tool monitoring and configuration management
  • Reporting capabilities
  • Solution administration and management
  • APIs and integration methods
  • Architecture
  • Alerts, policies, and audit reports


Attendees of this webinar will receive a complementary download of Exposing the Hidden Costs of Database Security Solutions.

Vulnerability Management Challenges and Best Practices Revealed
Date: Aug 21, 2013 - 12:00:00 EDT

View webinar

During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence Platform, and how it can help close the gaps and eliminate inefficiencies often associated with point solutions. Security Systems experts will explain how QRadar Vulnerability Manager's seamless integration and automated operation leverages the QRadar infrastructure to consolidate systems, reduce the scan data load, and provide unparalleled visibility into an organization's threat profile.

Attend to discover:

  • How security teams can move from a reactive to proactive security strategy
  • Methods for determining the magnitude and severity of risks and vulnerabilities across your organization
  • Importance of an integrated approach for turning a sea of vulnerabilities into a swimmable lake 
  • How enterprise visibility to all sources of vulnerability data is the key to success
Allies in Battle: When next-gen network and endpoint security solutions team up to defeat the APT
Date: Sep 11, 2013 - 13:00:00 EDT

View webinar

Join guest speaker Rick Holland, senior security and risk analyst at Forrester Research, Inc., as he discusses why traditional antivirus techniques are losing the battle against today’s increasingly sophisticated malware. He’ll explore how next-generation security solutions can work together to build your best defense against today’s advanced threats and malware.

Attend this webinar and learn:

  • Why a new approach is needed to protect against today’s evolving threat landscape
  • How next-gen network and endpoint/server security solutions can work together to build your best defense against today’s cyberthreats
  • How integrating network and endpoint security solutions help you prioritize alerts,  speed forensic investigation and remediation
Understanding and Selecting IAM for Cloud Services
Date: Sep 17, 2013 - 12:00:00 EDT

View webinar

Of all the IT security areas, Identity and Access Management (IAM) can be the most complex. It is also an area that is in the midst of a Galilean-scale paradigm shift from centralized identity management of internal users and systems to unified management of internal and external users, across both traditional IT and third-party cloud services.

Register for this three-part webinar series and learn how to:

  • Define cloud identity solutions and key issues with identity services.
  • Gather a simple but effective reference for IAM architecture and design.
  • Reference your organization’s requirements against most common IAM use cases and itemize your needs within a buyer’s guide.

On September 17th, Join Adrian Lane, Analyst and CTO, Securosis and Darren Platt CTO of Symplified Software for the first part of this series, Explanations: Solutions Space, Architecture and Design, to get conceptual awareness of IAM terms and concepts, bring them into sharp focus.

Cobol Techniques For Today And The Future
Date: Sep 24, 2013 - 13:00:00 EDT

View webinar
All IT shops are asked to do more – with less.  

Almost every Cobol application can be enhanced to provide more capability.

This live webinar will show:

  • The current state of Cobol
  • Useful, little known uniquely Cobol techniques that you can use to your advantage
  • How Cobol lives nicely with new environments and languages, such as C# and java
Attend this webinar to find out how you can make best use of Cobol in your environment.

Register now.

Spear Phishing and APTs from A to Z
Date: Sep 24, 2013 - 14:00:00 EDT

View webinar
IT departments should take it seriously when employees report odd emails. They may be receiving spear phishing emails, which can be an indicator for an advanced, persistent threat (APT). What exactly is an APT and how does it impact your organization?

Attend this webinar to learn how to:
  • Recognize an APT
  • Protect your organizational data
  • Best utilize log analysis and risk analysis
Register now to learn all about APTs and how to protect your organization from them.
Inside Threats: Is Your Company at Risk?
Date: Sep 25, 2013 - 13:00:00 EDT

View webinar

You may be surprised to learn that the worst threats to your organization may be your own employees.  Insider threats consist of a “bad guy” who maliciously steals sensitive data or, conversely, when an employee inadvertently loses data or doesn’t realize that their behavior could put the organization at risk.

Attend this webinar to learn how to:

  • Reduce minor bad habits that can create major security threats
  • Reinforce good behavior and good habits among employees
  • Protect your business by replacing common mistakes with common sense

Register for this webinar to learn ways to keep your company safe from both types of these insider threats.

Privileged Users: Functional. Not Fraudulent
Date: Oct 10, 2013 - 14:00:00 EDT

View webinar
ESG recently conducted research around insider threats, privileged users and APTs. While the security community remains fixated on advanced malware, tried-and-true insider threats are becoming more difficult to detect and prevent.  

Register for “Privileged Users:  Functional. Not Fraudulent” to learn why many organization are vulnerable to these type of threats in spite of their existing cybersecurity. Key takeaways will include:

  • Key trends around Insider Threats
  • Major gaps between existing security processes and available technologies
  • Critical components that help to reduce the attack surface
Join us for this must attend webcast to learn how privileged users can get their jobs done – without viewing or compromising data.

The Wild Web: Inside the Latest Web Threats
Date: Oct 23, 2013 - 14:00:00 EDT

View webinar

The web is the number one source of malware distribution today and many organizations don’t have adequate protection against the latest and most advanced web threats.  The bad guys are using new techniques and technologies to infect your users and make off with your money or your data.

Join Chris McCormack, web security expert at Sophos to understand each step in a modern web attack and what you can do to employ a layered protection strategy to stop these threats and secure your organization. Chris will discuss:

  • Web malware by the numbers
  • The anatomy of a modern web attack from entry to execution
  • A checklist of protection strategies

Register today and be prepared for tomorrow.

The Economics of Cyber Crime
Date: Oct 29, 2013 - 11:00:00 EDT

View webinar

$11.6 million: The average cost of a cyber attack
122: The number of success attacks per week
26 percent: The increase in cyber attacks in one year

The numbers are in. According to the 4th Annual Cost of Cyber Crime Study, conducted by the Ponemon Institute, sponsored by HP Enterprise Security, cyber crime is taking an ever-bigger toll on the bottom line. The study examined sixty U.S. organizations across various industries and found that hackers are targeting companies of all sizes.   Small organizations had big losses from viruses, worms, trojans, phishing and malware, while the majority of larger organizations' losses came from denial of service, malicious code and web-based attacks.

Is your organization protected? Join HP for a discussion about the results of the study and find out how you can mitigate cyber crime risks.

In this one-hour webinar you’ll learn:

  • Which industries are most at risk
  • How long it takes to respond to an attack
  • How to fully neutralize an attack
  • How to take proactive action with advanced security intelligence solutions
  • What governance practices should be implemented
How to Defend Your Network from Advanced Persistent Threats (APTs)
Date: Nov 14, 2013 - 13:00:00 EST

View webinar

According to the Verizon Data Breach Investigations Report 2013, 71% of attacks seen in 2012 targeted user devices, up from 60% in 2011. The hard and fast boundaries that defined corporate networks and security are a thing of the past.  There is a growing reliance on robust solutions that provides network-to-endpoint/server visibility into the lifecycle of the attack, and multiple techniques to quickly mitigate the damage of a cyber attack. Are you and your organization taking a proactive approach to defending your most vulnerable assets?

Register for this webinar to learn:

•  Why and how malicious actors are targeting your endpoints

•  Strategies for integrated detection and defense that leverage next-generation firewalls and malware detonation technologies

•  How organizations like yours have deployed a unified solution to prioritize alerts, accelerate incident response, and drive down operational costs

Attend this webinar with Josh McCarthy, Solutions Architect at FireEye, and Michael Bilancieri, Director of Product Management at Bit9, to get the latest intelligence on advanced attack scenarios and how FireEye and Bit9 are working together to deliver an integrated malware defense platform.  

Taking the Cloak off Targeted and Sophisticated Threats
Date: Nov 19, 2013 - 12:00:00 EST

View webinar
Cyber security is a process, not a destination. Sophisticated attackers are constantly changing tactics, techniques and procedures. Organizations must move ‘in lock-step’ with them to mitigate risk to operations, reputation, productivity and financials.

During this interactive webinar, Jon Ramsey, Chief Technology Officer at Dell SecureWorks, will discuss a real-world example of a sophisticated adversary to answer the questions:

  • How is a sophisticated attack different from a commodity attack?
  • What kind of malware do sophisticated attacker use?  
  • How do sophisticated attackers maneuver around your network?
  • What can you do to stop them?
Please share this message with your peers. Register Now.
Defense Against the Dark Arts
Date: Nov 21, 2013 - 14:00:00 EST

View webinar

The recent arrest of the Blackhole kit developer Paunch suggested to less-informed observers the potential for a significant reduction in targeted malware attacks.

Unfortunately, fame does not equate to efficacy -- and the void left by Blackhole's absence is being rapidly filled by potentially even more effective and stealthy exploit kits. Register for “Defense Against the Dark Arts” to learn about:

  • The previous use and history of Blackhole and its creator Paunch
  • Changes in the threat landscape after Blackhole efficacy ceased
  • Alternative exploit kits being used by attackers
  • Observations on the unique characteristics of these alternative exploit kits

Join us for a discussion led by an industry expert; Wayne Huang, co-founder and CTO of Armorize & VP Engineering at Proofpoint as he discusses this evolution in kits and some of his recent observations of such malware usage in the wild. Register Now.

CSI Techniques for IT Security
Date: Nov 21, 2013 - 14:00:00 EST

View webinar

An IT security incident is often the first step in a sequence that can ultimately ruin your organization. The tipping point can be as innocuous as a misplaced laptop or as malicious as a rogue employee. For most organizations the only option is to stay ahead of the curve. This means providing IT with the necessary tools and technology to proactively monitor for early warning signs, allowing them to take meaningful action before any damage can occur.

Attend to learn how to:

•  Take proactive measures to guard against data breaches, rogue employees, and other security risks

• Determine the value of persistence technology for a constant connection to devices that store corporate data

•  Decide how war zone IT security measures can work for corporate

•  Gain real life examples of security incidents and how they can be mitigated or avoided altogether

Register for this webinar to join Lance Mueller, Director of Forensics at Magnet Forensics for a fascinating look at investigative and other techniques IT can use to safeguard sensitive data, intellectual property, and corporate equipment.

 

Advanced Threat Protection For Dummies ebook and Using Big Data Security Analytics to Identify Advanced Threats Webcast
Date: Dec 03, 2013 - 13:00:00 EST

View webinar

Enterprises continue to be compromised by well-disguised, sophisticated and targeted cyber-attacks that elude most security tools.

This session will discuss methods for analyzing enterprise security data in order to identify and stop these sophisticated attacks.

Join us for an interactive discussion on how you can:

  • Identify sophisticated attacks and cyber threats
  • Analyze existing security information and log data to isolate potential threats
  • Use big data and advanced data intelligence techniques to crunch security data and identify anomalies and obfuscated attacks
  • Build a strategy/best practices for doing security analytics in the enterprise

Top security experts will join Dark Reading editors to discuss the ways that enterprises can employ next-generation forensics and big data analysis to help locate sophisticated attacks, and to help devise the right countermeasures.

Please forward this message to your colleagues as well. Register now.

Advanced Threat Protection For Dummies e-Book: All attendees will receive a complimentary copy of the Advanced Threat Protection For Dummies ebook. Register now.

How to Stop Web Application Attacks
Date: Dec 03, 2013 - 16:00:00 EST

View webinar

Like the doors and windows in a building, your Web applications are the most visible points of entry for cyber attackers to target. What methods do they use to crack those applications? How do they identify vulnerabilities, and what are the latest exploits they use to penetrate Web applications and steal the data behind them?

Attend this webinar to learn how to:

  • Identify potential attacks on your Web applications
  • Recognize vulnerabilities in your Web applications
  • Remediate websites and Web applications that have been compromised

Register for this webinar to learn how to better understand how attackers find weaknesses in your Web applications, and how you can stop them.

Measuring And Reporting On Your Organization’s Security Posture
Date: Dec 06, 2013 - 13:00:00 EST

View webinar

How safe is our enterprise?  Unfortunately, answering that question is no simple task.

Join this webinar to see how you can:

  • Develop a baseline set of metrics to benchmark your enterprise’s security posture
  • Implement practical methods for reporting changes in security risk
  • Create benchmarks for accurately measuring the performance of your IT security team
  • Understand how new threat intelligence data may help you measure security posture
  • Improve your ability to harvest data from security systems and mine it for security posture reporting
  • Create methods for measuring security risks and performance that non-IT executives can understand

Gain the best methods for measuring security risk and benchmarking security performance over time.

Register for this webinar now.

Top Big Data Security Tips and Ultimate Protection for Enterprise Data
Date: Dec 10, 2013 - 13:00:00 EST

View webinar

Organizations are leveraging increasing varieties and large volumes of information to gain deeper insight into their business. In today’s data intensive environment, data protection is a requirement to reduce business risk particularly as customers undertake big data initiatives. Join us for this webinar so you can discover how you can:

  • Ensure real time monitoring and reporting of security related events
  • Protect a wide range of data sources across many platforms and database vendors
  • Lower the cost of compliance with prebuilt policies, reports and automation
  • Discover sensitive data and categorize vulnerabilities
  • Monitor for suspicious behavior and can block activity

Lower the cost and effort of compliance and take a proactive approach to protecting your many data sources.

BONUS: All attendees will also receive a complimentary copy of the ebook: Top Tips For Securing Big Data Environments.

Please forward this message to your colleagues. Register now!

How to Manage Risk & Identify Fraud with Operational Analytics
Date: Jan 15, 2014 - 12:00:00 EST

View webinar

There are a number of operational analytics opportunities and challenges facing decision makers responsible for managing risk and identifying fraud.  Organizations use analytics to examine the business and all its aspects -- its people, its customers, its finances, and its operations. But one of the top use cases is "process and operations optimization and control” -- the heart of operational analytics.

Attend this webinar, presented by an IDC analyst, to learn how to:

  • Assess risks of non-completion of a specific operation within the enterprise
  • Monitor events in order to predict and detect a specific type of operational risk
  • Provide a view that aggregates and combines risks associated with a set of key activities across functions or products or across the enterprise

Register for this webinar, which draws on IDC’s research into Big Data & Analytics trends, to learn about a workload-optimized solution that can support and enable operational analytics for risk assessment and fraud detection.

Beyond Log Management
Date: Jan 15, 2014 - 13:00:00 EST

View webinar

The threat landscape is constantly evolving, with Advanced Persistent Threats and zero-day exploits challenging our best abilities to keep systems and data safe and secure.  As a result the way we monitor and manage security events is also evolving – and SIEM, which used to be synonymous with log management has evolved to meet today’s threats and prepare for tomorrow’s as well.   Join our complimentary webinar sponsored by Dark Reading and HP to hear from Forrester security expert Edward Ferrara who will discuss how SIEM is evolving and how to best take advantage of the new security tools that puts at your disposal.

Attend this event to learn:

  • How SIEM is evolving in conjunction with the threat landscape
  • Ways application monitoring impacts security management
  • The role of Big Data in correlating security events
  • What do to now to be prepared for the evolution of SIEM

Register now for this important event and bring your questions for our panel of experts to address during the live Q&A following the presentation.

Smarter, Shadier, Stealthier Malware: The Latest on Today’s Threats
Date: Jan 22, 2014 - 14:00:00 EST

View webinar

Advanced botnets, exploit kits and Cryptolocker ransomware were a few of the big malware headlines in 2013.  And web-based attacks continue to be the delivery mechanism favored by cybercriminals, making them the biggest threat to your security today. To stay secure, you need to understand the risks and know how these threats work.

Join Sophos security experts Maxim Weinstein and John Shier for a live webcast to learn about the latest trends in malware and what you can do to protect your organization.  They will discuss:

  •  Recent trends in the threat landscape
  •  The complex network of malware distribution
  •  An inside look at Cryptolocker ransomware
  •  How to stay ahead of the latest sophisticated attacks
  •  Predictions for 2014

Register today and be prepared for tomorrow.

Privileged Threat Analytics: Detect and Disrupt Network Attacks as they Occur
Date: Jan 23, 2014 - 14:00:00 EST

View webinar

Advanced attacks and malicious insiders are targeting privileged accounts for access to the heart of your enterprise and they are succeeding. Perimeter defenses don’t provide the level of security and reliable protection your organization needs. 

As a result, securing privileged credentials and actively monitoring individual privileged user activity is critical to detecting and stopping attacks in-progress on your network.

Join this webinar to uncover the:

  • Secrets of how criminals are targeting your privileged accounts
  • Techniques you can leverage to secure your privileged accounts
  • Strategies to monitor user behavior that expose compromised accounts

Attend this webinar to learn about the threats to your privileged accounts and how Privileged Threat Analytics, an innovative solution from CyberArk, can identify previously undetectable, malicious privileged user activity and provide immediate, actionable threat alerts.   

Review a short video here:

http://www.cyberark.com/contact/video-introducing-privileged-threat-analytics

Register for this webinar and begin protecting your enterprise in 2014.

Adapting Incident Response to Meet the Threat [and Minimize the Impact of a Breach]
Date: Jan 28, 2014 - 12:00:00 EST

View webinar

As the frequency and sophistication of cyber attacks continue to evolve, so too must your capabilities to respond. The reality of security today is that a breach is inevitable. But is your organization prepared for a major compromise today and how will it adapt to a changing threat in the future? Do you really know your environment?  Do you really understand the threat?  Do you know where to focus your limited incident Response Capabilities?  Do you know how to measure the success of your Incident Response and Security plan?

In this webcast, Jeff Schilling – Director of Incident Response and Digital Forensics at Dell SecureWorks, provides a vision for how security must evolve to combat the changing nature of the threat. Jeff will discuss the best methods for layering incident response into the security stack and developing a proven capability to handle a major data breach.  Sharing examples of actual incidents, Jeff will provide practical recommendations you can implement quickly to minimize the “detection to response” window and better protect your networks, servers, hosts and end users.

Security Intelligence Solution for System z and the Enterprise Abstract
Date: Feb 06, 2014 - 13:00:00 EST

View webinar

Relying on the security of the mainframe infrastructure is no longer adequate to meet contemporary challenges.

Mainframe data is now assessable via web services, web browsers and mobile devices from anywhere in world.  A more holistic approach to security that considers the entire enterprise is warranted. 

According to the 2011 Verizon Data Breach Investigations Report, greater than 85% of breaches go undetected by the affected organization.  Coupled with the fact that 70% of the world’s production data originates from the mainframe, and then you understand why mainframe customers have a renewed concern about security.

IBM’s Security Intelligence solution provides a massively scalable, real time enterprise security solution that, through the use of advanced analytics, can reduce hundreds of millions security events received daily in to a handful of meaningful events that require action.

  • Recognize the changing risk landscape that now threatens mainframe application and data
  • Recognize the new potential attack surfaces for mainframe applications and data
  • Understand the multi-tiered architectural requirements to monitor and protect the mainframe from more sophisticated attacks.
  • Appreciate the role of Security Intelligence in optimizing and simplifying enterprise security and compliance

Mainframe and enterprise security is a complex, three dimension puzzle: 1) The entire environment must be instrumented to collect security events; 2) Security event information must aggregated to understand the security profile across the enterprise; and 3) Advanced analytics must be applied to the massive amounts of security information to identify those events that require attention. This webinar will present IBM’s Security Intelligence solution for the mainframe and the enterprise.

The Failure of Traditional Endpoint Protection: How to Defend Your Devices from Advanced Threats
Date: Mar 05, 2014 - 13:00:00 EST

View webinar

Traditional endpoint and server protection solutions have become the punching bag of security.

There is a good reason for that, since solutions including signature-based antivirus have not kept pace in combating advanced threats or zero-day attacks leaving devices defenseless.

A new approach is needed that understands the lifecycle of the attacks, providing capabilities to assess devices, prevent attacks, detect compromise, investigate the incident and finally remediate the environment.

Join Mike Rothman, president and analyst at Securosis, as he describes:

  • The security challenges faced by organizations
  • Emerging endpoint and server protection approaches and technologies
  • How to give your enterprise a chance to protect intellectual property and customer data, and keep business operations running

Register for this webinar to gain a new, research-based approach to endpoint security.

Lessons Learned from the Top Security Breaches of 2013
Date: Mar 17, 2014 - 13:00:00 EDT

View webinar

Security breaches in industries like Retail and Financial Services hit home because, on a consumer level, the impact is personal as is the financial loss. But they also highlight the need for strong security policies and procedures regardless of industry. Anywhere valuable information is stored, there is the constant threat of attack. So what can be learned from the top security breaches of 2013? And how can you take action to better protect your business today?

Attend this webinar to learn how to:

  • Understand the threat landscape – have you tested your network for existing vulnerabilities or potential issues? How do you compare with peers and other organizations in your industry?
  • Prepare for the possibility of an attack – do you have an incident response plan in place? How mature are your processes and procedures?
  • Know when to seek help – are you aware of the growing skill gap in the cybersecurity space? Do you understand the impact Security Services can have on extending your capabilities?


Don’t end up in the headlines. Don’t be the next target. Watch this webinar to learn more, and take action to protect your organization today.

How To Secure Access in the Era of Mobile, Cloud and Social
Date: Mar 20, 2014 - 13:00:00 EDT

View webinar

Enterprises are going through business transformations, while embracing the new technology trends that include mobile, cloud and social.

In this complex IT environment, providing secure access to sensitive data, applications and infrastructure has become more challenging than ever.

Therefore, you need a powerful access management solution that’s built for today’s multi-perimeter world.

Join this webinar to:

  • Discuss how you can prevent insider threat and identity fraud in your complex IT environment.
  • Find out ways to safeguard your mobile, cloud and social interactions especially while accessing corporate resources from outside of your office network.
  • Explore ways to reduce cost and time to value by adopting appliance based access management solution which is easy-to-deploy-and-manage.
  • Get familiar with a new revolutionary access management solution in the market called IBM Security Access Manager, an "All-in-one" appliance
  • Realize what is in store for securing access for mobile application development and adhering to compliance mandates.

Understand the ways you can solve your complex access management problems while adapting new technologies around mobile, cloud and social.

Register Now.

Understanding and Prioritizing Today's Threats
Date: Mar 27, 2014 - 13:00:00 EDT

View webinar

Security is no one-size-fits-all endeavor. In this Webcast, you will learn from the experts how to determine and prioritize which threats apply to your enterprise and how to build in the appropriate defenses against today's constantly evolving attacks.

This webinar will provide insight and advice from renowned security experts on how to:

  • identify which new and existing threats could be used against your organization
  • prioritize these applicable threats
  • pinpoint the proper security practices and processes to protect your resources
  • find possible weak links in your infrastructure that could be abused
  • establish a strategy for triaging new threats

With the overload of information today on new threats, vulnerabilities, and attack campaigns, taking action to protect your organization can be an overwhelming and daunting task. This webinar will help you sift through the growing threat landscape in order to more efficiently and properly prepare your infrastructure for potential attacks.

Identify Targeted Attacks In Banking With Threat Intelligence
Date: Apr 08, 2014 - 13:00:00 EDT

View webinar

Banks and financial institutions have begun to recognize more sophisticated exploits that not only target specific companies, but take advantage of specific vulnerabilities and target specific individuals within the organization.

This webcast offers a closerlook at these attackers, their methods, and some ways to defend against them.

Join “ Analyzing Security Data and Threat Intelligence to Identify Targeted Attacks In Banking,” webinar that will reveal how banks and financial institutions can:

  • differentiate targeted attacks from random hacks
  • leverage tools and best practices that protect against sophisticated attacks
  • use threat intelligence data with internal security information to ferret out targeted attacks
  • respond to targeted attack - and how they can buildstronger defenses against them

This webcast will help you understand the methods and tools used by cyber attackers, and how you can tie your existing security tools to emerging threat intelligence capabilities to improve your cyber defense strategy

Register now.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web