Protecting healthcare organizations from cyber attacks
Connie Barrera, CISO of the internationally recognized Jackson Health System in Miami, will talk about the rising tide of cyber attacks and medical device vulnerabilities that are threatening healthcare organizations and how automated threat management has played a key role in mitigating this ominous problem – without requiring additional headcount.
The hidden role of IoT in cyber attacks
Networked IoT devices – printers, cameras and even advanced devices like MRI scanners – can pose an alarming cybersecurity risk. While they don’t fit the bill of a traditional network host, they represent fruitful targets and vectors for cyber attackers.
In this live webinar, we will dive into examples of how attackers target and use IoT device vulnerabilities to their advantage, and how IT security organizations can stop this emerging threat.
Making cybersecurity manageable with high-sidelity security
Join David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Wade Williamson, director of threat analytics at Vectra Networks, to learn how to implement high-fidelity security to manage today’s most challenging threats, efficiently and effectively.
Hostage crisis survival: The ransomware pandemic
Tune-in to hear Jacob Sendowski, Ph.D., senior product manager at Vectra Networks and Wade Williamson, direct of threat analytics at Vectra Networks discuss ransomware, the implications for enterprises, and steps that can be taken to help IT organizations address the risks.
The new rules of engagement for breach detection
Forrester Principal Analyst John Kinderwag will explain the new rules of engagement for automating the response to network breaches. Also, Wade Williamson, director of threat analytics at Vectra, will expose real-world cyber-attack techniques and reveal new detection methodologies that can identify active threats before data is stolen.
Building resilient security with network-based threat detection
Prevention alone is not enough. IDS, SIEM tools and other traditional threat detection methods aren’t solving the problem, either. Join host Mike Rothman, president of Securosis, who will share perspectives from his research report, Network-Based Threat Detection. Vectra CSO Gunter Ollmann will also share real-world examples and observations from the field.
Detecting and preventing cyberattacks in your network
Tune in to this web seminar to learn about threats, as well as the new defense-in-depth models that can quickly pinpoint and mitigate threats in progress. Hernan Londono, associate CIO at Barry University in Miami, will share strategies to detect and mitigate in-progress cyberattacks, how Automated Threat Management can reduce risk, and how to meet university security requirements while providing an open and collaborative learning environment that embraces BYOD and mobility.
The expanding role of data analytics in threat detection
The SANS Institute
Recent SANS studies on malware, intrusion prevention and cyber threat intelligence agree that almost every organization, no matter how well prepared, is infected with malware to some degree and that many show signs of malicious activity.
This webinar provides insight and guidance about:
- The characteristics of the technologies being used in this modern age of intelligence-driven threat detection
- How this new type of threat detection differs from more traditional methods
- How data analytics affects existing security frameworks and complement critical security controls"
Why data center attackers are aiming low
While most data center security has focused on protecting the virtualized layers, real-world attackers are increasingly subverting the data center's physical infrastructure. This webcast analyzes the reality of data center cybersecurity, including:
- The hidden role of infrastructure in the data center attack surface
- An analysis of recent attack tools and how they can be used in a targeted attack
- Understanding the sanctioned backdoors into your data center and how attackers use them