Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
- LANGUAGE: English DATE: Tuesday, December 06, 2016 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the focus of security turned to identity-based solutions but IAM has also been shown not to be a silver bullet to protect against breaches.
The chances of getting breached seem to grow daily and could quickly become your company’s worst nightmare.
This webinar will look at some of the recent high profile breaches, their common failings, outcomes and points to note.
The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures with a known ROI, a detection plan so that you know before your customers and a mitigation strategy for when the worst happens.
In this KuppingerCole webinar, you will learn about the three steps for moving to a modern approach to breach avoidance, mitigation and response:
- How to define your risk appetite
- Calculating the ROI on security solutions
- Planning for the breach
In the first part, Paul Simmonds, Fellow Analyst at KuppingerCole, will look at the companies and organizations that have been breached in recent times and give more details of the history, issues and solutions to consider when looking at how to mitigate a breach.
In the second part, Péter Gyöngyösi, Product Manager of Blindspotter will share Balabit´s point of view, of how to detect identify unusual user activities and provide deep visibility into potential threats.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.