• GDPR and What It Means for Security Teams

    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

  • Tech Demo - Addressing Data Across Borders for the GDPR

    This is part 3 in our demo series focused on GDPR. One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.

  • Tech Demo - AWS Container Security with SecureSphere

    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.

  • Detecting Suspicious File Access

    Our security experts walk through dynamic peer group analysis in CounterBreach 2.0. Tune in to see how to use machine learning to define dynamic peer groups, detect suspicious file access behavior, and dynamically manage access permissions.

  • CISO’s Tough Decision: Security On-Prem, Cloud or Both?

    Managing application security on-premises and in the cloud can be tricky. Whether CISOs want it or not, cloud transition will happen. As a CISO, you need to be ready to align operations with future company requirements and to determine when security solutions should be hosted on-premises, in the cloud or by using a hybrid model.

  • Tech Demo - Flexible hybrid cloud application security

    Enterprises are adopting a hybrid infrastructure model to take advantage of rapid deployment of cloud-based services and higher computing power. This session will show the flexibility of Imperva Application Security that will allow you to secure applications as they move to the cloud while future proofing application security investments.

  • Tech Demo - Pseudonymization and Data Masking for the GDPR

    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

  • Tech Demo: Get the Most Out of Your WAF - Tune for Security and Performance

    Our security experts will take you through WAF setup for policy and exceptions, profile review, and plugin rules to get the most of your WAF investment. They will cover 3 core topics of tuning a WAF:

    • Alert exception for false positive reduction
    • Profile maintenance for accuracy and efficiency (UBA)
    • Plugins for Dynamic Applications and Profile Tuning

  • Tech Demo - Data Discovery and Classification for the GDPR

    This is the first in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this demo, we demonstrate how to use our data security portfolio to find and categorize your data for GDPR compliance.

    In this webinar we'll provide:

    • An overview of General Data Protection Regulation (GDPR)
    • Who does it impact?
    • What are the data protection principles
    • What are the primary data security requirements
    • An insight into Imperva's data protection portfolio and a demo of its discover and classification capabilities

  • Insights from CyberEdge's 2017 Cyberthreat Defense Report

    Presented by Mark Bouchard, COO, CyberEdge | Ajay Uggirala, Director of Product Marketing, Imperva

    You know the bad guys are up to no good but do you know how your current cyber security defensive posture stacks up against those of your peers. In this live webinar, CyberEdge and Imperva will discuss key insights from the 2017 CyberThreat Defense Report.

  • How Not to Get Fired as a CISO

    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it. 

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    • What is the Two-Year Trap and how to avoid it
    • How to manage the long-term vs. short-term security view
    • What do about trendy security attacks
    Join us to learn how CISOs can extend their life expectancy with a long-term view.

  • Tech Demo - Imperva Application Protection Portfolio

    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.

  • Tech Demo - Simplify SecOps with Single-Dashboard Monitoring

    Managing data security across a distributed enterprise – deployed on-prem or in the cloud – is a daunting task. Imperva has powerful centralized management and reporting solutions that unify and streamline security operations to simplify distributed management. This webinar will provide an overview of SecureSphere MoM, providing visibility into system wide performance and problem areas by aggregating performance and status metrics for individual MX Management Servers, Gateways and Agents in a single dashboard view.

  • Top Cyber Security Trends for 2017

    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    • What top 3 cyber security trends will have the largest impact in 2017
    • Why cyber attacks are on the rise and multiplying quickly
    • How to combat the increasing number of breaches
    • What to consider in building a security plan that is right for your organization

  • Technical Deep Dive: How to Detect and Mitigate Ransomware

    Presented by Carrie McDaniel, Sr. Product Marketing Manager and Elad Erez, File Security Innovation and Development, Imperva

    Nearly 40% of businesses got hit by ransomware in 2015, and the vast majority couldn’t access data for at least two days following an attack. Given the speed at which ransomware impacts organizations, security teams need to detect ransomware as quickly as possible. Watch the on-demand product demonstration for an inside look at Imperva file security technology. During this session, we’ll explore how to monitor user access to file shares in real-time, how to leverage deception-based detection capabilities to identify ransomware, and how you can block costly attacks before it’s too late.

  • Defend Against the Data Miner for Financial Services

    Data miners are sophisticated thieves that tap, explore, and drain your financial institution’s databases of valuable information. Whether in the office next door, or a thousand miles away, data miners steal your customer and account information and leave little trace. Join us for the webinar "Defend Against the Data Miner" to discover:

    • How behavior analysis and deception technology identify insider threats
    • Why data activity monitoring provides comprehensive coverage
    • Why a proactive approach with visibility can quickly stop data miners

  • Unedited: Tales, Tips and Technologies from a Security Company CISO

    It’s Cyber Security Awareness Month—a great time to prepare your company against cyber threats. We know that running security for your company can be a difficult task. In addition to dealing with employees and executives, CISOs have the added challenge of working with the board. We want to share what we’ve learned, and talk about what has and has not worked for us. Spoiler alert: “You can’t patch people.”

    Join this webinar with Shahar Ben-Hador, Chief Information Security Officer (CISO), and Paul Steen, Senior Director, Global Security Strategist for a lively interactive session that will include:

    • Humorous security tales and repercussions of employee behaviors
    • Tips to deal with employees, execs and board members
    • Security technology recommendations that work best across a security stack
    Cybersecurity is ultimately about people, and, for better or worse, human nature will always prevail. The trick is establishing a pragmatic security posture to deal with that reality. Join our CISO for an off-script, unedited security discussion.

    Do you have pressing questions you’d like to have answered? Send them to AskTheCISO@imperva.com, and we’ll get them in front of our CISO. Who knows? They might just end up part of the discussion.

  • Technical Deep Dive: Imperva Web Application Firewall - How to Protect Web Applications from Advanced Attacks

    Presented by Narayan Makaram, Dir. Product Marketing, Imperva | Aaron Willis, Sr. Security Engineer, Imperva

    The use of web-based applications to conduct business online has grown exponentially in the last decade. However, the vulnerabilities in these applications are creating significant business risks and exposures to business critical data. Join us for a 30-minute live product demonstration and Q&A with a security expert for an inside look at how SecureSphere can be used to automatically identify potential attack vectors on your web applications using unique application profiling techniques to correlate user and application behavior, and streamline forensics analysis and virtual patching mitigation actions to demonstrate compliance.

  • Defend Against the Data Miner

    Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious(sly) thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:

    • Learn how to accurately identify and track insider threats.
    • Understand how data activity monitoring can detect and stop suspicious behavior
    • Reduce security alert noise and provide actionable context for security incidents

  • More Healthcare Cyber Threats - More Breaches - More HIPAA Enforcement: No Place to Hide

    Join us for an engaging webcast that will feature several healthcare security leaders and practitioners as they discuss the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.

    Specifically, the distinguished panel will focus on:

    • Recent trends in healthcare cyber threats and breaches
    • HHS guidance on “ransomware and medical equipment patching”
    • Recent HIPAA enforcement activities by the HHS that are potentially game changing
    • What can you do to protect your data
    The panel will also discuss key mitigating steps that every healthcare organization needs to take to lessen potential breaches and the ever-escalating HIPAA enforcement sanctions.

  • Technical Deep Dive: Imperva Breach Prevention - How to Detect Insider Threats with Machine Learning

    Presented by Dror Shemesh, Engineering Group Lead, Imperva | Carrie McDaniel, Sr. Product Marketing Manager, Imperva

    Internal users that perform careless actions, become compromised or have malicious intent put enterprise data at risk. Detecting inappropriate or abusive access to data is challenging without the right tools in place. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva machine learning technology. The session will discuss advanced data compression techniques, unsupervised baseline development, incident detection capabilities and solution architecture.

  • Technical Deep Dive: Imperva DDoS Protection - How to Defeat Botnets and Prevent Downtime

    Presented by Sina Siar, Solutions Manager, Imperva | Nabeel Hasan Saeed, Product Marketing Manager, Imperva

    Website downtime from DDoS attacks can cost you thousands or even millions of dollars an hour due to lost revenue and brand damage. Join us for a 30-minute live product demonstration and Q&A with a security expert for an inside look at how Incapsula protects your website from DDoS attacks. During this session we’ll explore the user interface, explain how to easily identify and block web security threats, how to use our global content delivery network (CDN) for instant performance enhancement, and how to gain valuable insights into your website's traffic using real-time monitoring. We’ll also review some of the more advanced features of the service like cloud-based load balancing.

  • Gartner MQ for Web App Firewall Webinar

    Presented by Terry Ray, Chief Product Strategist, Imperva

    The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

    This webinar will cover:

    • Detailed results and considerations of the report
    • Effective deployment options to meet enterprise demands
    • Success stories and implementation options you can leverage within your own environment
    Sign up for this webinar today to hear Terry Ray, Imperva Chief Product Strategist at Imperva, discuss the Gartner MQ for WAF.

  • Technical Deep Dive: Securing Office 365 with Imperva Cloud Access Security Broker

    Presented by Norv Leong, Sr. Director, Product Marketing, Imperva | Guillermo Rodriguez, Sr. Security Engineer, Imperva

    When moving to Office 365 the spotlight is turned on securing access and protecting sensitive and regulated information in the cloud. Understanding the native Office 365 security limitations and recommended implementations for common security use cases is critical. Join us for a 30-minute live product demonstration and Q&A with a security expert as we discuss defining and developing an Office 365 security strategy and how a CASB such as Skyfence can factor into your plans.

  • Get More from Your CASB—The CASB of Choice for Imperva Customers

    Presented by Frank Cabri, Vice President Marketing, Imperva | Norv Leong, Senior Director Product Marketing, Imperva

    A cloud access security broker (CASB) doesn’t need to be yet another point solution in your IT infrastructure. Get more value with Imperva Skyfence—the only CASB integrated with Imperva products delivering unmatched security and data protection for cloud apps like Office 365, Dropbox, Salesforce and more.

    Watch this webinar and learn:

    • Why CASBs are considered required infrastructure by Gartner
    • Top customer use cases for Skyfence CASB – from BYOD access to data leak prevention
    • New features for monitoring and controlling access from Tor networks, anonymous proxies, and malicious IPs
    • How integrations with Imperva Incapsula, CounterBreach, and ThreatRadar make Skyfence the best CASB choice for Imperva customers

  • Technical Deep Dive: Imperva Data Audit and Protection - How to Improve Database Security and Simplify Compliance

    Presented by Cheryl O'Neill, Dir. Product Marketing, Database Security, Imperva | Ian Forrest, Sr. Security Engineer, Imperva

    Monitoring database transactions for compliance and regulations can be complicated and expensive for many organizations. Understanding what to monitor, how to monitor it, for how long, and what to report on is a critical part of the compliance process. Join us for a 30-minute live product demonstration and Q&A with a security expert for an inside look at how SecureSphere ensures your organization is within compliance of mandates such as PCI, SOX, HIPAA, and internal security controls.

  • How to Accurately Identify Compromised Insiders

    Presented by Sagie Dulce, Team Lead, Insider Threat Research, Imperva | Carrie McDaniel, Sr. Marketing Product Manager of Emerging Products, Imperva

    Insider threats have many faces. Your internal users can be careless or flat out malicious; other times, they fall victim to external attackers. Cybercriminals gain access to your network and data by exploiting people on the inside, often by means of social engineering and phishing. Without proactive detection technologies in place, sophisticated attackers exploit insiders and operate under the radar for months. View this webinar to:

    • Learn how to accurately identify insider threats and protect enterprise data
    • Discover a multi-layered approach to identify compromised users
    • Gain insight into the latest developments in deception technology

  • Next-Generation Insider Threat Protection

    Presented by guest speaker John Kindervag, VP, Principal Analyst, Forrester Research and Morgan Gerhart, VP, Product Marketing, Imperva

    View a webinar where guest speaker John Kindervag, VP, Principal Analyst Serving Security and Risk Professionals at Forrester Research, and Morgan Gerhart, VP, Product Marketing, Imperva, will walk through what you need to know to protect your organization and customers from insider threats.

    During this webinar they will:

    • Discuss new research on the trends and challenges for detecting insider threats
    • Break down the cause of recent, high-profile data breaches
    • Introduce a new data security strategy that pinpoints insider threats

  • Security Briefing Part 3: The Rise of Automated Attacks – Dissecting the Event

    Presented by Nabeel Saeed, Product Marketing Manager, Imperva | Brandon Dunlap, Moderator, (ISC)²

    The volume, size, and sophistication of DDoS attacks have increased rapidly over the years. Is your organization prepared for today’s modern, multi-vector DDoS offensives? Join Imperva and (ISC)² for the final part of a three-part Security Briefing series where we’ll specifically explore the anatomy and timeline of a complex DDoS attack, as well as the steps used to mitigate each phase of the assault.

  • BrightTalk Defend Against Attacks from the Inside

    Presented by Carrie McDaniel, Product Marketing Manager, Imperva

    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk. In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies.

    Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time

  • Imperva CounterBreach 101: Protect Your Data from Insider Threats

    Presented by Carrie McDaniel, Product Marketing Manager and Dror Shemesh, CounterBreach Engineering Lead

    Learn how to detect and mitigate insider threats with Imperva CounterBreach. CounterBreach is a powerful new product that seamlessly integrates with Imperva SecureSphere database and file security solutions and Imperva Skyfence to pinpoint critical anomalies across databases, file servers, and cloud apps. You’ll see how the solution helps security teams save time by proactively pinpointing the most dangerous user data access incidents.

    In this session you will be shown:

    • How CounterBreach takes data security to the next level with advanced machine learning, peer group analysis and deception technology which work together to accurately detect insider threats
    • Key product functionality that will help you perform faster security investigations
    • An interactive demo of the product

  • Security Briefing Part 2: The Rise of Automated Attacks – Take Back Control of Your Web Accounts

    Presented by Narayan Makaram, Director Product Marketing, Imperva | Brandon Dunlap, Moderator, (ISC)²

    During every hour of every day, cybercriminals launch Web application attacks that silently bypass traditional perimeter controls. They use millions of stolen user credentials to take over Web application accounts, access sensitive applications, steal confidential data, and conduct fraudulent transactions. Stop account takeover attacks, right in their tracks. Join Imperva and (ISC)² for the second part of a three-part Security Briefing series where we’ll examine the types of automated attacks that impact business operations today and the importance of globally, crowd-sourced threat intelligence to defend against such threats.

  • More Databases. More Hackers. More Audits

    Presented by Terry Ray, Chief Product Strategist and Cheryl O'Neil, Product Marketing Director

    Exploding data growth doesn’t mean you have to sacrifice data security or compliance readiness. The more clarity you have into where your sensitive data is and who is accessing it, the easier it is to secure and meet compliance regulations.

    Watch this webinar to learn how to:

    • Detect and block cyber security events in real-time
    • Protect large and diverse data environments
    • Simplify compliance enforcements and reporting
    • Take control of escalating costs.

  • Protect Your Data and Apps in the Public Cloud

    Presented by Lior Lukov, Senior Product Manager, Imperva | Narayan Makaram, Director Product Marketing, Imperva

    Organizations continue to move their data and apps to the cloud and cybercriminals see this move as a huge opportunity. Both Amazon Web Services and Microsoft Azure provide basic security measures to protect infrastructure resources. But, did you know it’s the customer’s responsibility to secure their assets hosted in both environments? Watch this webinar and learn what security measures you should take to protect your data and apps hosted in AWS and Azure.

  • Security Briefing Part 1: The Rise of Automated Attacks - Stop Botnets at the Gate

    Presented by Deepak Patel, Director of Security Strategy, Imperva | Brandon Dunlap, Moderator, (ISC)²

    The elimination of bots may seem more difficult than the eradication of Polio. When one botnet gets taken down, another botnet with more sophistication takes over and does not miss a beat. As long as there are profit-driven organized cyber-crime rings, then there will be malicious activity that threatens business-critical applications. Join Imperva and (ISC)² for the first part of a three-part Security Briefing where we'll examine the types of automated attacks that impact business operations today and the importance of globally, crowd-sourced threat intelligence in the defense against such threats.

  • Learn What Trends in 2016 Will Transform Cyber Security

    Presented by Matt Gurr, Head of Security Engineering, Imperva

    “In this world nothing can be said to be certain, except death and taxes.” And, now breaches? With breaches like Kmart Australia, VTech, and David Jones, all within the past 12 months, chances are your data has been targeted.

    What does this mean for 2016? Matt Gurr, Head of Security Engineering, as he shares how to stay ahead of hackers. Attend this webinar and learn:

    • Why attacks have increased in sophistication, magnitude and velocity?
    • What trends will have the largest and smallest impact?
    • Why cloud-based apps and the Internet of Things have transformed cyber security?
    • How you can protect your organization from attacks from the inside?

  • Insights from 2016 Cyberthreat Defense Report

    Presented by Mark Bouchard, COO, CyberEdge Group and Deepak Patel, Director of Security Strategy, Imperva

    You know the bad guys are up to no good, but did you know the greatest threat to your organization comes from the inside? In this live webinar, CyberEdge and Imperva will discuss key insights from the new 2016 Cyberthreat Defense Report. 

    Watch this webinar and learn answers to your most pressing questions:

    • Do critical gaps exist in your cyberthreat defense posture?
    • How does your security spend compare to other organizations?
    • What can you do to minimize risk against the internal and external threat?
    • Is your business critical data protected from cybercriminals?

  • Defend Against Attacks from the Inside

    Presented by Carrie McDaniel, Product Marketing Manager, Imperva

    Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk. In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies. Attend this webinar to:

    • Learn why insider threats are tough to detect, even when monitoring technologies are in place
    • Understand what differentiates good data access from bad data access
    • Find out how visibility into insider activity reduces risk, and cuts down on incident detection and remediation time
    • Learn how Imperva keeps data safe from compromised, careless and malicious internal users, with a sneak peek at our new CounterBreach solution
    Register now for the webcast “Defend Against Attacks from the Inside” and find out how to protect your organization’s valuable data from internal misuse.

  • Top Cyber Security Trends for 2016

    Presented by Amichai Shulman, CTO and co-founder, Imperva

    With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016? Join Imperva CTO and co-founder, Amichai Shulman, as he reveals the top trends that will impact cyber security practices across the globe.

    Watch this webinar and learn:

    • Why cyber attacks continue to increase in sophistication, magnitude and velocity
    • What trends will have the largest and smallest impact on cyber security in 2016
    • Why cloud-based apps and the Internet of Things have transformed cyber security
    • How you can protect your organization from attacks from the inside

  • Database Surveillance and Protection: 3 Ways to Stop Hackers

    Data thieves are opportunistic, looking for unprotected databases in the forgotten digital corners of your company. They are content to steal any data that lies within easy reach.

    Large companies are especially vulnerable. With hundreds or even thousands of databases spread throughout business units and across multiple geographies, it is only a matter of time until your unprotected data is accessed and stolen.

    Fortunately, it doesn’t have to be complicated, tedious or expensive to protect all of your sensitive data with a database monitoring solution. The right database monitoring solution can also provide visibility into data usage and simplify compliance audits.

    Join us for this webinar to learn:

    • Benefits of database monitoring over native audit tools
    • Factors to consider before investing in database audit and protection
    • 3 specific ways to leverage database monitoring for improved security

  • The State of Application Security: Hackers On Steroids

    Presented by Itsik Mantin, Director of Security Research, Imperva

    Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.

    This webinar will detail key insights from the Imperva Defense Center annual Web Application Attack Report. Attend this webinar for an in-depth view of the threat landscape for the year. We will:

    • Discuss hacking trends and shifts
    • Provide breach analysis by geography, industry, and attack type
    • Detail next steps for improved security controls and risk management processes

  • Database Monitoring: First and Last Line of Defense

    Presented by Cheryl O’Neill, Director of Product Marketing, Imperva

    In the battle to defend your data you have an edge over the hacker that can prevent or minimize the damage of a database breach. You have the advantage of operating within your own environment and can deploy automated surveillance capabilities to watch sensitive data. When a hacker breaches the firewall or compromises a privileged user they are beyond the reach of most security measures. Only a data centric solution that directly monitors data access will be able to spot and stop the abnormal activity.

    Join us to learn how SecureSphere data protection solutions can help you improve your security profile and protect your company against a database breach.

  • Understanding ‘Man in the Cloud’ Attacks: The Hidden Threat in Cloud File Sharing Services

    Presented by Amichai Shulman, CTO, Imperva and Frank Cabri, Vice President of Marketing for Imperva Skyfence, Imperva

    Already widely adopted by enterprises, use of cloud file sharing services such as Office 365, OneDrive, Dropbox, Box and Google Drive is on the rise. As adoption increases, so does the motivation for attack. The Imperva Defense Center recently announced new research on a new type of attack we call “Man in the Cloud” (MITC). These attacks rely on common file synchronization services as their infrastructure for command and control, data exfiltration and remote access. Without using any exploits, a bad actor can turn them into a devastating attack tool undetected by traditional security measures. 

    Join Imperva CTO Amichai Shulman and Frank Cabri, Vice President of Marketing for Imperva Skyfence, to learn about:

    • Cloud file sharing application trends, adoption and risk
    • The anatomy of a MITC attack and how to identify it
    • How traditional endpoint and perimeter security measures are insufficient to protect against these threats
    • Recommendations for securing and protecting cloud apps and data

  • Why Network and Endpoint Security Isn’t Enough

    Presented by Cheryl O'Neill, Dir. Product Marketing, Database Security, Imperva | Narayan Makaram, Dir. Product Marketing, Web Application Security, Imperva

    The rise in high-profile breaches demonstrates that traditional security defenses are no longer enough. Endpoint and network security cannot defend against sophisticated attacks or compromised insiders.

    View this webinar and learn:

    • Why traditional security measures fail to stop web attacks and data breaches
    • How modernized best practices safeguard against web application attacks
    • What strategies enable scalable data protection and simplified audits

  • How to Balance Ecommerce Security with Performance

    Presented by Nabeel Hasan Saeed, Product Marketing Manager, Imperva Incapsula | Ryan McElrath, Chief Technology Officer, American Eagle | Armando Roggio, Senior Editor, Practical Ecommerce

    Cyber criminals’ ability to attack and penetrate ecommerce sites has never been more sophisticated. The threats merchants face today include automated bot access, malware injections, DDoS attacks, and many more. How can you protect your ecommerce site? Can all threats be prevented? And how will prevention measures affect your site’s performance and the experience of your customers?

    Attend this webinar and learn:

    • What threats ecommerce providers face
    • Why traditional protection measures affect website performance
    • How to protect your website without compromising performance

  • More databases. More hackers.

    Presented by Cheryl O’Neill, Director Product Marketing, Database Security, Imperva

    Is your database environment growing rapidly? Is your organization at greater risk from outside hacks and compromised user accounts? An organization needs to know how to effectively monitor databases in order to prevent data loss, and significantly reduce the time to discover security risks and minimize potential damage.

    View this webinar and learn how to:

    • Detect and block cyber security events in real-time
    • Protect large and diverse database environments
    • Extend data monitoring to your Big Data and AWS environments
    • Simplify compliance enforcements and reporting

  • Proven Strategies for Streamlining Cloud App Access and Security

    Presented by Norv Leong, Senior Director, Product Marketing for Imperva Skyfence, Imperva and William Greenlee, Technical Alliance Manager, Centrify

    As apps like Salesforce, Office 365, Google for Work, and ServiceNow become the norm, securing access to and maintaining compliance of the data accessed by these cloud apps is a necessity.

    Join experts from Imperva and Centrify as they share best practices on enabling the safe and productive use of cloud apps. Attend and learn how to:

    • Provide secure single sign-on and user-friendly multi-factor authentication
    • Secure and monitor SaaS access from login to logout
    • Detect and block cyber threats such as account takeovers
    • Simplify, centralize and automate access management – across apps and devices

  • Stop Account Takeover Attacks, Right in their Tracks

    Presented by Narayan Makaram, Director Product Marketing, Web Application Security, Imperva

    During every hour of every day, cyber criminals silently bypass traditional perimeter controls. They use millions of stolen user credentials to takeover Web application accounts, access sensitive applications, steal confidential data, and conduct fraudulent transactions. According to the latest Verizon DBIR report, over 50% of Web application attacks launched by organized crime in 2014 involved stolen credentials.

    View this webinar to learn why real-time threat intelligence is the key to preventing Web account takeover attacks. We will discuss:

    • The anatomy of an account takeover attack
    • Best practices to protect Web applications
    • The need for real-time threat intelligence

  • Securing Office 365 through Cloud Access Security Brokers

    Presented by Norv Leong, Senior Director, Product Marketing for Imperva Skyfence, Imperva

    Microsoft Office 365 is quickly establishing itself as the go-to productivity suite used in organizations today. However, even Microsoft maintains that Office 365 security is a shared responsibility between itself and the customer. Office 365 provides some capabilities natively, but at the end of the day, Microsoft does not take responsibility for managing mobile access, enforcing access policies, and meeting compliance requirements.

    Watch this informative webinar where you’ll learn how to define, develop, and execute an Office 365 security plan while meeting all of your compliance obligations.

  • Now You Can Defend Against the High Risks of Shadow IT

    Presented by Frank Cabri, Vice President, Imperva Skyfence Marketing, Imperva, and Jim Fulton, Senior Director, Product Marketing, Raytheon|Websense.

    The bring-your-own cloud app trend – so-called “Shadow IT” – has brought new risks to your data that traditional security controls can’t detect or defend against.

    The good news is that Raytheon|Websense and Imperva have partnered to bring organizations a robust reporting and risk intelligence tool that identifies the security risks of cloud apps like Box, Dropbox, Google Apps and hundreds of others.

    View this webinar and learn:

    • How to extend your Websense platform to obtain visibility of cloud apps
    • The different aspects of risk as it relates to cloud apps
    • How to generate a cloud discovery report in a few short steps
    • Deployment considerations, tips and tricks

    • Play Video
  • BrightTalk Incident Response and Data Protection Summit: Sophisticated Incident Response Requires Sophisticated Activity Monitoring

    Presented by Mike Sanders, Principal SE and Team Lead, Imperva | Bryan Orme, Principal, GuidePoint Security

    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:

    • Discover sensitive data, risk, and vulnerabilities
    • Detect and block cyber security events
    • Investigate incidents and automate remediation
    • Demonstrate consistent policy application across all sensitive data

  • BrightTalk Incident Response and Data Protection Summit: 10 Audit Trail Tips for Better Data Security

    Presented by Mike Sanders, Principal SE and Team Lead, Imperva

    Every day, hackers unleash massive attack campaigns designed to steal confidential data. Database servers are the primary targets of most of these breaches. Understanding how to effectively monitor databases can prevent data loss, significantly reduce the time to discover the risk, and minimize the damage.

    Attend this webinar and learn how to:

    • Detect and block cyber security events
    • Identify sensitive data, risks, and vulnerabilities
    • Automate risk remediation
    • Ensure consistent and complete compliance

    You will leave this session with tips on how to add an effective database audit and protection plan to your data security and compliance program.

  • Making DLP Work for Cloud Apps

    Presented by Norv Leong, Sr. Director Product Marketing, Imperva Skyfence

    Today, file sharing and collaboration apps are among the most used by employees, creating a blind spot and opportunity for PII, PCI, HIPAA and other sensitive data to be leaked from the organization.

    Understand the fundamental issues, mobile access considerations and proven approaches for securing your valuable data residing in cloud apps. Learn how Cloud Data Loss Prevention (DLP) from Imperva Skyfence enables you to complement your on-premises DLP solution and truly secure ALL your data.

    • Play Video
  • Database Security, Better Audits, Lower Costs

    Presented by Terry Ray, Chief Product Strategist, Imperva | Cheryl O’Neill, Director Product Marketing, Database Security, Imperva

    The complexity of implementing and maintaining IBM Guardium or a native audit solution within an enterprise environment can quickly run into trouble. Escalating costs, manularity, and gaps in coverage put your company at risk of a failed audit or data breach. This webinar will share the experiences of Imperva customers who have moved from native audit or Guardium to Imperva SecureSphere for database audit and protection (DAP).

    Attendees will leave with an understanding of:

    • Security and compliance factors that organizations should consider
    • The methods of deployment within an enterprise environment
    • The monetary and human costs associated with each DAP architecture

  • BrightTalk Hackers and Threats Summit: Extend Enterprise Application-level Security to Your AWS Environment

    Presented by Chris Grove, Director of Solution Architecture, Imperva | Matt Yanchyshyn, Senior, Manager of Solutions Architecture, AWS

    When organizations shift to a public cloud environment, security and compliance must remain top of mind. While Amazon Web Services (AWS) provides robust infrastructure-level protections, today’s attackers target the applications themselves.

    This webinar will:

    • Discuss inherent AWS security capabilities
    • Review attack types that target the applications and why traditional security approaches can’t stop them
    • Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure in the cloud and on-premise

  • Securing Access and Protecting Your Data in Office 365

    Presented by Orin Thomas, Contributing Editor, Windows IT Pro | Norv Leong, Senior Director of Product Marketing, Imperva Skyfence

    The rapid adoption of Office 365 has turned the spotlight on securing access and protecting sensitive corporate data that’s residing in the cloud. Coupled with the proliferation of mobile devices and BYOD in general, IT organizations that adopt Office 365 are now having to cope with a new breed of security challenges different from those they faced with a strictly on-premises deployment.

    In this webinar, you'll learn:

    • How to monitor access to ensure Office 365 services are limited to authorized users and approved devices
    • How to protect against threats, such as Office 365 account hijacks
    • How to protect against the leakage of sensitive data through Outlook, OneDrive for Business, and SharePoint Online

    • Play Video
  • BrightTalk Hackers and Threats Summit: An Inside Look at a Sophisticated, Multi-vector DDoS Attack

    Presented by Orion Cassetto, Director Product Marketing, Imperva Incapsula

    This webinar will explore the current DDoS attack landscape, it will cover the basics of DDoS attacks, current trends including the most recent results from the newly published 2015 Imperva Incapsula DDoS Report. We will also discuss a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, the talk will explore the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault. This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.

  • Remediate before it's too late - Stop intruders from exploiting holes in your web apps.

    Presented by Illena Armstrong, VP, Editorial, SC Magazine and Mark Kraynak, Chief Product Officer, Imperva

    With mega breaches coming one right after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen. For instance, last year Russian hackers called CyberVor were able to pilfer 4.5 billion unique records, the majority of which were credentials such as IDs and passwords. Reportedly, the thieves took advantage of pre-existing holes in website code to launch SQL injection attacks to prompt web apps to execute malicious commands. In this instance, about 400,000 sites were vulnerable to the assault. But this is just one type of offensive cybercriminals enlist by exploiting well-known and sometimes long-standing vulnerabilities in applications on which companies rely -- even though there are readily available mitigations for them. So what can organizations do to take care of the myriad holes on which online thieves seem to rely? We review some of the more common attacks used by cybercriminal rings, and identify the techniques and over-arching best practices to block them.

    • Play Video
  • How a Low Risk Cloud App Can Become a Big Threat

    Presented by Norv Leong, Sr. Director Product Marketing, Imperva Skyfence

    Can you identify which ex-employees have access to your cloud data? Would you like to benchmark your cloud app security settings against best practices or compliance standards like PCI, HIPAA and others?

    Most organizations are aware of the dangers presented by unauthorized, high-risk cloud apps. But what about your authorized apps like Office 365, Salesforce, Google Apps and Amazon Web Services? Your specific users and implementations are invaluable in assessing the true risk for your company. Listen to this on-demand webinar and learn about contextual risk factors and approaches that can:

    • Enable you to see how your cloud environment stacks up against industry best practices
    • Mitigate threats from previously authorized users
    • Identify ex-employees and unauthorized users with access to your cloud apps
    • Simplify risk remediation and policy administration

    • Play Video
  • 5 Cyber Security Predictions for 2015

    Presented by Anthony Bettencourt, President & CEO, Imperva | Mark Kraynak, Chief Product Officer, Imperva

    We’ve combined the data collected from our products with the insights gathered from our customers to come up with some meaningful commentary and helpful guidance for 2015. Check out our predictions for the year ahead and make sure you’re ready.

    • Play Video
  • Computerworld Webinar: How to Secure Your Big Data Environment

    Presented by Sam Heywood, Director Product Management, Cloudera | Raphael Reich, Senior Director of Product Marketing, Imperva

    Securing big data can be a large undertaking. With the amount of data constantly expanding, how can IT leaders secure their big data environments? A 2014 Poneman Institute study found that 43% of companies said they experienced a data breach in the last two years. Join Cloudera, Imperva and IDG as they discuss how you can have a strategy for your big data that keeps it secure and compliant.

  • Anatomy of the Compromised Insider

    Presented by Terry Ray, Chief Product Strategist, Imperva

    Statistics show that organizations face an ever increasing threat from compromised insiders. These trusted end users routinely have their endpoint security tested by malware and viruses.

    Industry analysts are now questioning the current and future capability of anti-virus and anti-malware solutions to mitigate these insider threats. There have been numerous high profile events over the past two years to demonstrate the problems of prioritizing security at the end-point. This webinar will:

    • Walk through the process of identifying targets for infection
    • Expose tools used to infect and exploit the compromised end-point
    • Provide recommendations to mitigate the effects of compromised insiders and data theft

  • Top Five Security Must-Haves for Office 365

    Presented by Shan Zhou, Senior Director, Security Engineering, Skyfence | Frank Cabri, VP Marketing, Skyfence

    Whether you’ve already deployed Office 365 or have plans to, security considerations around moving your business-critical apps to the cloud are paramount. From Exchange, Yammer, and SharePoint to OneDrive and the Administrator Portal, monitoring activity and securing access is critical to mitigating threats and protecting confidential data.

    Join Skyfence, an Imperva company, for an educational webinar on Office 365 to:

    • Understand access control issues and their impact for employees, mobile workers and contractors
    • Learn about new account-centric attacks that are targeting Office 365 and other cloud apps
    • Discuss strategies for reducing excessive permissions for administrators
    • Hear about privacy laws around cloud data
    • Learn how to discover and manage the trend toward unauthorized file sharing and Shadow IT apps

  • The Non-Advanced Persistent Threat

    Presented by Sagie Dulce, Security Research Engineer, Imperva

    Advanced Persistent Threat (APT) is a term given to attacks that specifically and persistently target an entity. The security community views this type of attack as a complex, sophisticated cyber-attack that can last months or even years. However, new research indicates that these attacks are actually being achieved by much simpler methods.

    The Imperva Defense Center has discovered that data breaches commonly associated with APT require only basic technical skills. As a result, security teams need to fundamentally shift their focus from absolute prevention of intrusion to protecting critical data assets once intruders have gained access to their infrastructure. This webinar will:

    • Expose some powerful, yet extremely simple techniques that allow attackers to efficiently expand their reach within an infected organization
    • Show how attackers achieve their goals without resorting to zero-day vulnerabilities and sophisticated exploits
    • Discuss how organizations can protect themselves against the advance of such attacks

  • The Anatomy of Comment Spam

    Presented by Shelly Hershkovitz, Security Research Engineer, Imperva

    Comment spammers are most often motivated by search engine optimization for the purposes of advertisement, click fraud, and malware distribution. By spamming multiple targets over a long period of time, spammers are able to gain profit, and do harm.

    Comment spam attacks can cripple a website, impacting uptime, and compromise the user experience. Quickly identifying the source of an attack can greatly limit the attack’s effectiveness and minimize its impact on your website. This webinar will:

    • Present an attack from both points of views – the attacker's and the victim’s
    • Identify tools utilized by comment spam attackers
    • Discuss mitigation techniques to stop comment spam in its early stages

  • Hacking Encounters of the 3rd Kind

    Presented by Barry Shteiman, Director of Security Strategy, Imperva

    As the software world evolves, more and more companies rely on 3rd party applications and software components as part of their infrastructure. However, this approach does not come without risks.

    The implementation of 3rd party applications has its advantages, chief among them shortened development time frames and increased software maturity. Despite these obvious benefits, organizations must remain aware of potential security implications. This webinar will:

    • Explain how 3rd party software vulnerabilities might lead to a data breach
    • Deliver examples of incidents and how they occur
    • Discuss the effectiveness of patching

  • Preparing for the Imminent Terabit DDoS Attack

    Presented by Orion Cassetto, Sr. Product Marketing Manager, Incapsula

    With the rapid growth of volumetric DDoS threats, even the largest networks, equipped with carrier grade hardware and with huge amounts of bandwidth at their disposal, are at risk of being taken down by a large DDoS attack.

    Volumetric DDoS threats are leading many financial institutions, service providers, and other large organizations on a search for solutions that can scale DDoS protection beyond their existing network capabilities, and into the Terabit level. Attend this webinar to learn about:

    • Expected trends in the evolving DDoS landscape over the next 12-36 months
    • Important considerations when selecting your DDoS protection technology
    • How to prepare your organization to detect and respond to a DDoS attack

  • Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities

    Presented by Terry Ray, VP of Global Security Engineering, Imperva

    As noted in the 2014 Verizon Data Breach report, “Web applications remain the proverbial punching bag of the internet.” Today’s hackers ruthlessly target Common Vulnerabilities and Exposures (CVEs) to launch multi-site attacks that take control of Web servers and allow their perpetrators to flee with valuable data assets.

    HeartBleed stands as the most notorious example of a known vulnerability attack, but with a CVE database running in the thousands, attackers have ample opportunity to profit from unsecure Web applications.

    Join us to learn more about the vulnerability landscape and the steps your organization can take to protect yourself against these known vulnerabilities. This webinar will:

    • Discuss the latest data breach stats to identify where the most dangerous attacks are coming from
    • Explore the attack perpetrators and reveal how they’re being successful
    • Present the anatomy of a HeartBleed attack
    • Provide mitigation techniques to protect against known vulnerabilities

    • Play Video
  • The 6 Most Surprising SharePoint Security Risks

    Presented by Carrie McDaniel, Product Marketing Manager, File Security, Imperva

    As SharePoint gains traction in your organization, users quickly create new sites and add data to help them share information and work more efficiently. Before you know it, sensitive files are spread throughout SharePoint and security becomes crucial. Are you aware of - and prepared to stop - all the SharePoint security risks that are out there?

    SharePoint is a complex, far-reaching system that's exposed internally and externally. With increased reliance on SharePoint comes multiple security risks, some obvious and some you wouldn't have imagined.

    Join us for a webinar to learn about some of the most surprising risks in SharePoint, uncovered by Imperva's security experts. This webinar will:

    • Discuss the six most surprising SharePoint threats including compromised insiders and search engine data leakage
    • Offer real-world examples of each threat
    • Provide practical methods for addressing these risks

    • Play Video
  • CUSRF | It's Pronounced "See You Surf" and It's Dangerous

    Presented by Amichai Shulman, CTO, Imperva

    Cross USer Request Forgery (CUSRF: pronounced "See You Surf") is a new and emerging type of Cross-Site Request Forgery (CSRF) attack that affects users of collaboration platforms and applications, such as LinkedIn and Google Docs.

    CUSRF exploits vulnerabilities in social networks to reveal a victim's true identity. Due to special technical characteristics of CUSRF attacks, most traditional counter-measures are irrelevant to the attack's mitigation. This webinar will:

    • Give a brief intro of CSRF
    • Examine the anatomy of a CUSRF attack, with examples
    • Discuss mitigation techniques for both consumers and platform providers

    • Play Video
  • How to Stop Web Application Attacks

    Presented by Tim Wilson, Editor, Dark Reading | Barry Shteiman, Director of Security Strategy, Imperva | Robert Hansen, Director of Product Management, WhiteHat Security

    Like the doors and windows in a building, your Web applications are the most visible points of entry for cyber attackers to target.

    Learn how to better understand how attackers find weaknesses in your Web applications, and how you can stop them. What methods do they use to crack those applications? How do they identify vulnerabilities, and what are the latest exploits they use to penetrate Web applications and steal the data behind them? This webinar will show you how to:

    • Identify potential attacks on your Web applications
    • Recognize vulnerabilities in your Web applications
    • Remediate websites and Web applications that have been compromised

    • Play Video
  • Cyber Side-Effects - Cloud Databases and Modern Malware

    Presented by Amichai Shulman, CTO, Imperva

    Database as a Service (DBaaS) offers a self-service model for provisioning databases, without the cost of setting up servers and burdening IT teams. However, DBaaS also offers cyber criminals easier access to your data, from both inside and outside the service.

    Apart from offering criminals a cheap and safe playground, DBaaS itself introduces new security issues. When an organization's internal data is stored in the cloud, an attacker no longer needs to gain access to the organization's network before compromising high-value data. This webinar will:

    • Show how attackers are exploiting cloud database services in their operations
    • Discuss key implications to internal databases
    • Identify the hidden risks of DBaaS
    • Re-asses the severity of database vulnerabilities in a hosted environment

    • Play Video
  • Top Security Trends for 2014

    Presented by Amichai Shulman, CTO, Imperva

    The Imperva Defense Center, a dedicated research organization, constantly monitors attackers - and their attack methods - to isolate the most relevant attack campaigns. Based on this research data, the Imperva Defense Center has identified the top trends poised to have the most significant impact on the security landscape in 2014. 

    Join Imperva CTO and head of the Imperva Defense Center, Amichai Shulman as he presents the security trends that will resonate across the globe in the upcoming year. Below is a sneak peak of top security trends:

    • Return of Compromised Web Servers: attackers are now infiltrating networks via external facing servers
    • Rise of Cloud Platform Breaches: long a concern, large-scale attacks in the Cloud are fast becoming a real problem
    • Spread of 3rd Party Application Vulnerabilities: these application attacks are growing in size, scope, and volume

    • Play Video
  • Hiding in Plain Sight: The Danger of Known Vulnerabilities

    Presented by Tal Be'ery, Web Security Team Leader, Imperva

    While a lot of attention is devoted to the mitigation of previously unknown attack methods ("0 days"), many of today's high-profile breaches are caused by "Known Vulnerabilities" in the application's components, also referred to as "vulnerabilities in third-party components." Attackers are quickly moving to exploit applications built with vulnerable components and are inflicting serious data loss and/or hijacking entire servers in the process.

    The rising popularity of third-party components in application development enables attackers to quickly and repeatedly locate and exploit vulnerabilities in application components - making these attacks widespread and extremely hazardous. This webinar will:

    • Explore the recent growth of "Known Vulnerabilities" and examine the scope of the problem
    • Examine how attackers are able to quickly "weaponize" these vulnerabilities for immediate profit
    • Reveal techniques for limiting the damage resulting from "Known Vulnerabilities" exploitation

    • Play Video
  • PCI 3.0 Revealed - What You Need to Know Today

    Presented by Barry Shteiman, Director of Security Strategy, Imperva

    On November 7th, the PCI Security Standards Council will unveil v3.0 of the Payment Card Industry Data Security Standard (PCI DSS). On the same day the new version is released, Imperva's Director of Security Strategy, Barry Shteiman, will deliver a free webinar focusing on the most significant changes to the standard.

    Imperva is a participating organization in the PCI Council and has helped hundreds of organizations improve data security and demonstrate compliance with PCI DSS. Please join Barry in this informative webinar as he discusses:

    • The historic development of the PCI DSS standard
    • Key changes introduced in PCI DSS 3.0
    • Lessons learned - compliance as risk mitigation

    • Play Video
  • Detect and Remediate Advanced Targeted Attacks

    Presented by Ruby Sharma, Technical Alliance Manager, FireEye & Raphael Reich, Sr. Director Product Marketing, Imperva

    Despite huge investments in anti-virus software, next-gen firewalls, and IPS platforms, companies are still getting hacked. The new generation of advanced targeted attacks bypasses traditional defenses and put sensitive data at risk. It takes just minutes from the time an organization is compromised to the exfiltration of sensitive data.

    What's needed is a security solution that can detect and block data center threats while allowing easy, appropriate access to the assets essential to running your business. Join Imperva and FireEye for a webinar addressing data center security requirements and solutions. We'll discuss how to:

    • Protect data and applications from modern, advanced attacks
    • Enable business to continue while remediation takes place
    • Provide Incident Response teams with actionable forensic information
    • Support a risk-based approach to malware remediation

    • Play Video
  • Protecting Against Vulnerabilities in SharePoint Add-ons

    Presented by Carrie McDaniel, SharePoint Security, Imperva

    As the pace of Microsoft SharePoint adoption continues, most organizations are turning to third party add-ons to support demands for functionality. It's for these reasons that experts compare SharePoint without add-ons to an iPhone without apps. Third party add-ons, however, arrive pre-packaged with unique security risks -- vulnerabilities that IT cannot directly fix.

    Join Imperva's Carrie McDaniel to learn how organizations can offset vulnerabilities found in SharePoint add-ons by applying a multi-layered defense strategy. This webinar will:

    • Identify risks associated with using SharePoint plug-ins and web parts developed by third parties
    • Describe how hackers target and exploit third-party code using attacks such as SQL injection
    • Introduce a three-layered approach to securing SharePoint

    • Play Video
  • A Blueprint for Web Attack Survival

    Presented by Kasey Cross, Imperva | Nick Silver, WhiteHat Security

    Is your organization prepared to face a large-scale attack from hacktivists or cybercriminals? This webinar provides a step-by-step plan to protect web applications using proven strategies from application security consultants that have been on the front lines of attack.

    Join security experts from Imperva and WhiteHat Security to see what steps your organization can take to implement a comprehensive strategy for repelling web attacks. This webinar will:

    • Describe the modern attack methods and tools used by hacktivists and cybercriminals
    • Explain the processes and technologies you can use to safeguard your website
    • Help you prioritize security efforts and identify security tips and tricks you might have overlooked

    • Play Video
  • PHP SuperGlobals - Supersized Trouble

    Presented by Tal Be'ery, Web Security Team Leader, Imperva

    Used in over 80% of all websites, PHP is the most popular Web application development platform in the world. The widespread use of PHP, however, makes it an attractive target for malicious hackers. By focusing attacks on vulnerabilities found in popular third party components, such as PHP, hackers are able to expand their reach to countless unsuspecting websites.

    • Play Video
  • Targeted Attacks - 8 Step Plan to Safeguard Your Organization

    Presented by Barry Shteiman, Director of Security Strategy, Imperva

    Is your business safe from malware and targeted attacks? Cyber security experts suggest that it's likely your organization's data has already been breached. So rather than asking "what if?", it's time to ask "now what?".

    Sophisticated attacks leverage social engineering techniques and malware to compromise those individuals already on the inside of your enterprise, and then steal your data. By targeting your trusted employees, attackers can circumvent conventional defenses like firewalls and IPS solutions to penetrate your network and compromise your data center. This webinar will:

    • Examine why attackers looking to steal sensitive data targeted your data center
    • Explain how targeted attacks, often using spear phishing and malware, consistently defy perimeter and endpoint defenses
    • Present an eight step incident response model to help prevent, detect, and respond to targeted attacks

    • Play Video
  • CMS Hacking 101

    Presented by Barry Shteiman, Sr. Security Strategist, Imperva

    With the rise of blogs, forums, online magazines, e-commerce, and corporate websites, many organizations are turning to Content Management Systems (CMS), such as Joomla or SharePoint, to create rich websites. CMSs simplify website delivery - but they also expose your organization to a new set of vulnerabilities.

    Join Barry Shteiman, Imperva Sr. Security Strategist, to see how malicious hackers exploit vulnerabilities found in popular Content Management Systems to systematically identify and attack unsuspecting organizations. This webinar explores:

    • What a CMS based site is and examples of recent CMS originated hacks
    • Trends in automated CMS hacking
    • How to secure your website against vulnerabilities found in CMS systems

    • Play Video
  • 4 Security Guidelines for SharePoint Governance

    Presented by Carrie MacDaniel, File Security Team, Imperva

    82% percent of organizations use SharePoint to store secure content. Over half worry that their deployments do not meet security or compliance requirements. This sentiment is indicative of the growing concern among organizations that their SharePoint deployments are a security disaster waiting to happen.

    SharePoint governance can seem like a daunting task and leave many organizations wondering where to start. This webinar provides a four step program for establishing SharePoint governance and security.This webinar will:

    • Identify drivers for governance, including regulatory compliance, Web attack protection, and data security
    • Provide four steps for securing SharePoint through governance efforts
    • Outline a risk-based approach for aligning priorities and investments

    • Play Video
  • The Value of Crowd-Sourced Threat Intelligence

    Presented by Amichai Shulman, CTO, Imperva

    On April 3, CNBC reported the details of a large-scale attack campaign targeting the banking industry. As a result of this campaign, multiple U.S. banks experienced website outages totaling 249 hours over a six week period. Would the damage from the attack campaign have been reduced if the banks had the ability to share crowd-sourced threat intelligence?

    The Imperva Defense Center recently analyzed real-world traffic from sixty Web applications to identify attack patterns. The results of the study demonstrate how sharing attack patterns across a community of Web applications can significantly mitigate the risk of large-scale attack campaigns. This webinar will:

    • Identify how cross-site information sharing (crowd-sourcing) creates security intelligence
    • Demonstrate the value of adding crowd-sourced intelligence to Web application security
    • Provide real-world examples of attack patterns that can be shared for community defense

    • Play Video
  • Top 10 Database Threats

    Presented by Raphael Reich, Director Data Security Solutions, Imperva

    96% of all records breached are stolen from databases, according to a 2012 Verizon Data Breach Report. Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most.

    The risk of a database breach can be mitigated by implementing internal controls and following industry best practices - but you must first understand the shifting threat landscape. This webinar will:

    • Present the top 10 threats to your database in 2013
    • Define a layered defense strategy for preventing database breaches using industry best practices
    • Demonstrate a successful defense against data theft with a customer case study

    • Play Video
  • Lessons Learned From the Yahoo! Hack

    Presented by Amichai Shulman, CTO, Imperva

    In December 2012, Yahoo! Inc. suffered a high profile data breach at the hands of a lone hacker. Using SQL injection attacks, the hacker gained full access for the server of the affected domain. Alarmingly, the exploited vulnerability likely belonged to a third party application that was neither coded nor hosted by Yahoo!.

    Yahoo! was responsible for the third party application's security, yet it only had limited control of the code. Join Imperva's Amichai Shulman as he discusses the key lessons learned from the Yahoo! breach. This webinar will:

    • Analyze the tools and methodology employed by the attacker to bypass security
    • Explore the dangers of hosting third party code inherited from partners, vendors, or via acquisitions
    • Provide procedural and technical steps for securing third party code

    • Play Video
  • Assessing the Effectiveness of Anti-virus Solutions

    Presented by Amichai Shulman, CTO, Imperva

    According to a recent study conducted by Imperva's research arm and students from The Technion – Israeli Institute of Technology, as little as 5% of newly created viruses are detected by anti-virus solutions. Moreover, it can take as long as four weeks after the introduction of a virus before it is detected by anti-virus solutions.

    How well do anti-virus solutions defend against newly created viruses? The answer may surprise you. Join us in a live webinar as we examine the effectiveness of anti-virus solutions. This webinar will:

    • Evaluate the ability of anti-virus solutions to react to newly created viruses
    • Explore the window of opportunity created before anti-virus solutions begin to detect new viruses
    • Illustrate how targeted malware of limited distribution can elude detection for months or years
    • Explain how misguided compliance mandates create over-investment in anti-virus solutions within security budgets

    • Play Video
  • Top Security Trends for 2013

    Presented by Mark Kraynak, SVP WW Marketing, Imperva

    Looking at the security landscape for 2013, we predict that previous security investments made by larger, well-funded organizations will serve as a partial deterrent to hackers. However, those same hackers, armed with sophisticated malware and cloaked in a dangerous anonymity provided by the Cloud, will turn their collective eyes to a new, more vulnerable target: small companies.

    Join Imperva Senior Vice President Mark Kraynak as he reveals the four super-sized security trends that will impact business security practices across the globe in 2013. Below is a sneak peak at each trend:

    • Government Malware Goes Commercial: tactics historically tied to "state sponsored" attacks move to the mainstream
    • Black Clouds on the Horizon: profit-driven hackers leverage the Cloud to unleash fraud and business logic attacks
    • Security Strength in Numbers: business and government will combine individual protection data to create collaborative defenses
    • APT Targets the Little Guy: cyber criminals employ traditional, enterprise-size APT methods to pillage smaller businesses

    • Play Video
  • How Targeted Attacks Evade Anti-Virus Software

    Presented by Rob Rachwald, Director of Security Strategy, Imperva

    Are your employees unknowing victims of targeted attacks? Sophisticated attacks now leverage social engineering techniques and malware to compromise those individuals already on the inside of your enterprise. The objective of these attacks is clear: target and compromise specific individuals within an institution to obtain high-value data. Even though these threats are not mass automated attacks, the effects on a compromised organization can be long-lasting. This webinar will:

    • Discuss the rise in malware and targeted attacks
    • Highlight why anti-virus software is powerless against sophisticated attacks
    • Provide mitigation strategies for the compromised organization

    • Play Video
  • Deconstructing Application DoS Attacks

    Presented by Tal Be'ery, Web Security Team Leader, Imperva

    As one of the most discussed topics on hacker forums, denial of service (DoS) attacks continue to move up the stack from the network to the application level. Since many anti-DoS solutions focus on the lower layers, hackers are targeting specific Web servers, such as IIS or Apache, or applications, such as SharePoint, in order to reduce the likelihood of attack detection. Join Imperva's Tal Be'ery as he discusses the latest trends, techniques, and technologies deployed by hackers and provides security professionals with specific steps to mitigate this threat. This webinar will:

    • Summarize the general characteristics of application DoS attacks
    • Discuss how and why hacktivists utilize distributed denial of service (DDoS)
    • Highlight real-world incidents from OpColumbia, OpBahrain, and OpRussin
    • Examine how black-hat hackers conduct attacks with white-hat testing tools

    • Play Video
  • A CAPTCHA in the Rye

    Presented by Tal Be'ery, Web Security Team Leader, Imperva

    In J.D. Salinger's The Catcher in the Rye, main character Holden Caulfield is a confused teenager who views anyone he meets, or knows, as a "phony." This attitude, among other factors, contributes to Holden's dysfunctional nature. How are today's hackers blurring the line between real and "phony" and compromising CAPTCHA security in the process?

    A CAPTCHA, or Completely Automated Public Turing test to tell Computers and Humans Apart, is a common security measure used to distinguish between humans and a "phony." However, with hackers now deploying numerous methods to bypass CAPTCHAs, the line between real and phony isn't clear and security professionals are forced to present CAPTCHAs sub optimally. This webinar will:

    • Review the use of CAPTCHAs as a security mechanism against malicious automation
    • Examine the threat human-based CAPTCHA solving services pose to Web security
    • Analyze four case studies of CAPTCHA bypassing in the wild
    • Provide recommendations to improve the efficiency of existing CAPTCHA mechanisms by integrating with other automation detection measures

    • Play Video
  • Applications Under Siege - Defending Against Attack Outbreaks

    Presented by Amichai Shulman, CTO, Imperva

    "The typical Web application experiences attack incidents 274 times per year, with one target experiencing as many as 2,766 attack incidents. While under attack, the average Web application attack incident lasts 7 minutes and 42 seconds with the longest attack incident reaching one hour and 19 minutes," Imperva Web Application Attack Report, 2012. Planning protection based on the average Web application attack can leave your organization exposed to a crippling upper limit attack. Like a flood bursting through a levy, a large scale Web application attack will overwhelm and immobilize the unprepared organization. Based on the findings of our semi-annual Web Application Attack Report, this webinar will discuss:

    • Cumulative characteristics of Web application attack vectors, such as SQLi, XSS, RFI and LFI
    • Seasonal trends in Web application attacks
    • Intensity of attacks and how organizations can prepare for "battle days"
    • Proven defense solutions and procedures to combat attack bursts

    • Play Video
  • Shaping-Up SharePoint Security in Five Steps

    Presented by Amichai Shulman, CTO, Imperva

    The use of Microsoft SharePoint is growing rapidly inside most enterprises; however, native functionality fails to address critical security risks. For organizations, this shortcoming poses a tremendous challenge: How do you balance the need for collaboration with the need for security? Join Imperva CTO, Amichai Shulman, as he addresses the key technical aspects of SharePoint security. In particular, this webinar will identify the most important steps to securing SharePoint, including:

    • How SharePoint is architected and the inherent security gaps
    • How to protect SharePoint from insider threats
    • How to stop hackers from breaking externally facing SharePoint deployments

    • Play Video
  • Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground

    Presented by Amichai Shulman, CTO, Imperva

    Research attributes nearly half of a typical website's traffic to automated bots. This puts the odds of falling victim to a cyber attack at 100%. With the press of one key, an unskilled, inexperienced hacker can attack hundreds of applications within minutes. Automation tools, such as SQLMap and Havij, open new avenues for amateur and professional hackers to evade security defenses. How will your team prepare for, and stop, malicious, automated site traffic and defend against zero-day attacks? This webinar will:

    • Highlight observed trends in the automation of SQLi and RFI attacks
    • Reveal the warning signs of an automated attack
    • Suggest identification methods and proven countermeasures to stop attacks

    • Play Video
  • The Insider's Guide to Insider Threats

    Presented by Rob Rachwald, Director of Security Strategy, Imperva

    Did you know 70% of employees plan to take sensitive business data with them when they leave their job? Further, did you know over 50% feel they have rights to this data? If you think your organization has avoided the insider threat, you may need to look deeper.

    Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This webinar presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals. This presentation will:

    • Define the insider threat
    • Quantify the prevalence of the problem
    • Uncover controls that have proven most effective at minimizing the risk of insider threats

    • Play Video
  • How to Prevent Remote & Local File Inclusion Attacks

    Presented by Tal Be'ery, Web Security Research Team Leader, Imperva

    Did you know remote and local file inclusion (RFI/LFI) was among the four most prevalent Web application attacks in 2011? Why is RFI/LFI so attractive to hackers? Quite simply, with RFI/LFI a hacker can take over a Web server.

    RFI and LFI attacks primarily affect Web applications written in the PHP programming language. PHP is the most popular server-side programming language. In fact, PHP is used by 77.2% of today's Web sites. Are you aware of the underlying technology that powers your website? For example, if you install WordPress, PHP code will end up on your server making it vulnerable to an RFI/LFI attack. This webinar will discuss:

    • How hackers use RFI/LFI, including how one vulnerability compromised 1.2M WordPress blogs
    • The anatomy of an RFI/LFI attack and how hackers avoid traditional detection techniques
    • How to successfully mitigate RFI/LFI attacks

    • Play Video