• GDPR and What It Means for Security Teams

    The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.

  • Tech Demo - Addressing Data Across Borders for the GDPR

    This is part 3 in our demo series focused on GDPR. One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.

  • Tech Demo - Pseudonymization and Data Masking for the GDPR

    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

  • Technical Deep Dive: Imperva Breach Prevention - How to Detect Insider Threats with Machine Learning

    Presented by Dror Shemesh, Engineering Group Lead, Imperva | Carrie McDaniel, Sr. Product Marketing Manager, Imperva

    Internal users that perform careless actions, become compromised or have malicious intent put enterprise data at risk. Detecting inappropriate or abusive access to data is challenging without the right tools in place. Join us for a 30-minute live product demonstration and Q&A for an inside look at Imperva machine learning technology. The session will discuss advanced data compression techniques, unsupervised baseline development, incident detection capabilities and solution architecture.

  • The State of Application Security: Hackers On Steroids

    Presented by Itsik Mantin, Director of Security Research, Imperva

    Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.

    This webinar will detail key insights from the Imperva Defense Center annual Web Application Attack Report. Attend this webinar for an in-depth view of the threat landscape for the year. We will:

    • Discuss hacking trends and shifts
    • Provide breach analysis by geography, industry, and attack type
    • Detail next steps for improved security controls and risk management processes

  • Database Monitoring: First and Last Line of Defense

    Presented by Cheryl O’Neill, Director of Product Marketing, Imperva

    In the battle to defend your data you have an edge over the hacker that can prevent or minimize the damage of a database breach. You have the advantage of operating within your own environment and can deploy automated surveillance capabilities to watch sensitive data. When a hacker breaches the firewall or compromises a privileged user they are beyond the reach of most security measures. Only a data centric solution that directly monitors data access will be able to spot and stop the abnormal activity.

    Join us to learn how SecureSphere data protection solutions can help you improve your security profile and protect your company against a database breach.

  • Why Network and Endpoint Security Isn’t Enough

    Presented by Cheryl O'Neill, Dir. Product Marketing, Database Security, Imperva | Narayan Makaram, Dir. Product Marketing, Web Application Security, Imperva

    The rise in high-profile breaches demonstrates that traditional security defenses are no longer enough. Endpoint and network security cannot defend against sophisticated attacks or compromised insiders.

    View this webinar and learn:

    • Why traditional security measures fail to stop web attacks and data breaches
    • How modernized best practices safeguard against web application attacks
    • What strategies enable scalable data protection and simplified audits

  • More databases. More hackers.

    Presented by Cheryl O’Neill, Director Product Marketing, Database Security, Imperva

    Is your database environment growing rapidly? Is your organization at greater risk from outside hacks and compromised user accounts? An organization needs to know how to effectively monitor databases in order to prevent data loss, and significantly reduce the time to discover security risks and minimize potential damage.

    View this webinar and learn how to:

    • Detect and block cyber security events in real-time
    • Protect large and diverse database environments
    • Extend data monitoring to your Big Data and AWS environments
    • Simplify compliance enforcements and reporting

  • BrightTalk Incident Response and Data Protection Summit: 10 Audit Trail Tips for Better Data Security

    Presented by Mike Sanders, Principal SE and Team Lead, Imperva

    Every day, hackers unleash massive attack campaigns designed to steal confidential data. Database servers are the primary targets of most of these breaches. Understanding how to effectively monitor databases can prevent data loss, significantly reduce the time to discover the risk, and minimize the damage.

    Attend this webinar and learn how to:

    • Detect and block cyber security events
    • Identify sensitive data, risks, and vulnerabilities
    • Automate risk remediation
    • Ensure consistent and complete compliance

    You will leave this session with tips on how to add an effective database audit and protection plan to your data security and compliance program.

  • 5 Cyber Security Predictions for 2015

    Presented by Anthony Bettencourt, President & CEO, Imperva | Mark Kraynak, Chief Product Officer, Imperva

    We’ve combined the data collected from our products with the insights gathered from our customers to come up with some meaningful commentary and helpful guidance for 2015. Check out our predictions for the year ahead and make sure you’re ready.

    • Play Video
  • Computerworld Webinar: How to Secure Your Big Data Environment

    Presented by Sam Heywood, Director Product Management, Cloudera | Raphael Reich, Senior Director of Product Marketing, Imperva

    Securing big data can be a large undertaking. With the amount of data constantly expanding, how can IT leaders secure their big data environments? A 2014 Poneman Institute study found that 43% of companies said they experienced a data breach in the last two years. Join Cloudera, Imperva and IDG as they discuss how you can have a strategy for your big data that keeps it secure and compliant.

  • Anatomy of the Compromised Insider

    Presented by Terry Ray, Chief Product Strategist, Imperva

    Statistics show that organizations face an ever increasing threat from compromised insiders. These trusted end users routinely have their endpoint security tested by malware and viruses.

    Industry analysts are now questioning the current and future capability of anti-virus and anti-malware solutions to mitigate these insider threats. There have been numerous high profile events over the past two years to demonstrate the problems of prioritizing security at the end-point. This webinar will:

    • Walk through the process of identifying targets for infection
    • Expose tools used to infect and exploit the compromised end-point
    • Provide recommendations to mitigate the effects of compromised insiders and data theft

  • The Non-Advanced Persistent Threat

    Presented by Sagie Dulce, Security Research Engineer, Imperva

    Advanced Persistent Threat (APT) is a term given to attacks that specifically and persistently target an entity. The security community views this type of attack as a complex, sophisticated cyber-attack that can last months or even years. However, new research indicates that these attacks are actually being achieved by much simpler methods.

    The Imperva Defense Center has discovered that data breaches commonly associated with APT require only basic technical skills. As a result, security teams need to fundamentally shift their focus from absolute prevention of intrusion to protecting critical data assets once intruders have gained access to their infrastructure. This webinar will:

    • Expose some powerful, yet extremely simple techniques that allow attackers to efficiently expand their reach within an infected organization
    • Show how attackers achieve their goals without resorting to zero-day vulnerabilities and sophisticated exploits
    • Discuss how organizations can protect themselves against the advance of such attacks

  • Cyber Side-Effects - Cloud Databases and Modern Malware

    Presented by Amichai Shulman, CTO, Imperva

    Database as a Service (DBaaS) offers a self-service model for provisioning databases, without the cost of setting up servers and burdening IT teams. However, DBaaS also offers cyber criminals easier access to your data, from both inside and outside the service.

    Apart from offering criminals a cheap and safe playground, DBaaS itself introduces new security issues. When an organization's internal data is stored in the cloud, an attacker no longer needs to gain access to the organization's network before compromising high-value data. This webinar will:

    • Show how attackers are exploiting cloud database services in their operations
    • Discuss key implications to internal databases
    • Identify the hidden risks of DBaaS
    • Re-assess the severity of database vulnerabilities in a hosted environment

    • Play Video
  • Top Security Trends for 2014

    Presented by Amichai Shulman, CTO, Imperva

    The Imperva Defense Center, a dedicated research organization, constantly monitors attackers - and their attack methods - to isolate the most relevant attack campaigns. Based on this research data, the Imperva Defense Center has identified the top trends poised to have the most significant impact on the security landscape in 2014. 

    Join Imperva CTO and head of the Imperva Defense Center, Amichai Shulman as he presents the security trends that will resonate across the globe in the upcoming year. Below is a sneak peak of top security trends:

    • Return of Compromised Web Servers: attackers are now infiltrating networks via external facing servers
    • Rise of Cloud Platform Breaches: long a concern, large-scale attacks in the Cloud are fast becoming a real problem
    • Spread of 3rd Party Application Vulnerabilities: these application attacks are growing in size, scope, and volume

    • Play Video
  • The Value of Crowd-Sourced Threat Intelligence

    Presented by Amichai Shulman, CTO, Imperva

    On April 3, CNBC reported the details of a large-scale attack campaign targeting the banking industry. As a result of this campaign, multiple U.S. banks experienced website outages totaling 249 hours over a six week period. Would the damage from the attack campaign have been reduced if the banks had the ability to share crowd-sourced threat intelligence?

    The Imperva Defense Center recently analyzed real-world traffic from sixty Web applications to identify attack patterns. The results of the study demonstrate how sharing attack patterns across a community of Web applications can significantly mitigate the risk of large-scale attack campaigns. This webinar will:

    • Identify how cross-site information sharing (crowd-sourcing) creates security intelligence
    • Demonstrate the value of adding crowd-sourced intelligence to Web application security
    • Provide real-world examples of attack patterns that can be shared for community defense

    • Play Video
  • Top 10 Database Threats

    Presented by Raphael Reich, Director Data Security Solutions, Imperva

    96% of all records breached are stolen from databases, according to a 2012 Verizon Data Breach Report. Why do databases have the highest rate of breaches among all business assets? The answer is simple: they house the sensitive business data that malicious insiders and hackers want most.

    The risk of a database breach can be mitigated by implementing internal controls and following industry best practices - but you must first understand the shifting threat landscape. This webinar will:

    • Present the top 10 threats to your database in 2013
    • Define a layered defense strategy for preventing database breaches using industry best practices
    • Demonstrate a successful defense against data theft with a customer case study

    • Play Video
  • Lessons Learned From the Yahoo! Hack

    Presented by Amichai Shulman, CTO, Imperva

    In December 2012, Yahoo! Inc. suffered a high profile data breach at the hands of a lone hacker. Using SQL injection attacks, the hacker gained full access for the server of the affected domain. Alarmingly, the exploited vulnerability likely belonged to a third party application that was neither coded nor hosted by Yahoo!.

    Yahoo! was responsible for the third party application's security, yet it only had limited control of the code. Join Imperva's Amichai Shulman as he discusses the key lessons learned from the Yahoo! breach. This webinar will:

    • Analyze the tools and methodology employed by the attacker to bypass security
    • Explore the dangers of hosting third party code inherited from partners, vendors, or via acquisitions
    • Provide procedural and technical steps for securing third party code

    • Play Video
  • Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground

    Presented by Amichai Shulman, CTO, Imperva

    Research attributes nearly half of a typical website's traffic to automated bots. This puts the odds of falling victim to a cyber attack at 100%. With the press of one key, an unskilled, inexperienced hacker can attack hundreds of applications within minutes. Automation tools, such as SQLMap and Havij, open new avenues for amateur and professional hackers to evade security defenses. How will your team prepare for, and stop, malicious, automated site traffic and defend against zero-day attacks? This webinar will:

    • Highlight observed trends in the automation of SQLi and RFI attacks
    • Reveal the warning signs of an automated attack
    • Suggest identification methods and proven countermeasures to stop attacks

    • Play Video
  • The Insider's Guide to Insider Threats

    Presented by Rob Rachwald, Director of Security Strategy, Imperva

    Did you know 70% of employees plan to take sensitive business data with them when they leave their job? Further, did you know over 50% feel they have rights to this data? If you think your organization has avoided the insider threat, you may need to look deeper.

    Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This webinar presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals. This presentation will:

    • Define the insider threat
    • Quantify the prevalence of the problem
    • Uncover controls that have proven most effective at minimizing the risk of insider threats

    • Play Video