How a Low Risk Cloud App Can Become a Big Threat
Presented by Norv Leong, Sr. Director Product Marketing, Imperva Skyfence
Can you identify which ex-employees have access to your cloud data? Would you like to benchmark your cloud app security settings against best practices or compliance standards like PCI, HIPAA and others?
Most organizations are aware of the dangers presented by unauthorized, high-risk cloud apps. But what about your authorized apps like Office 365, Salesforce, Google Apps and Amazon Web Services? Your specific users and implementations are invaluable in assessing the true risk for your company. Listen to this on-demand webinar and learn about contextual risk factors and approaches that can:
- Enable you to see how your cloud environment stacks up against industry best practices
- Mitigate threats from previously authorized users
- Identify ex-employees and unauthorized users with access to your cloud apps
- Simplify risk remediation and policy administration
5 Cyber Security Predictions for 2015
Presented by Anthony Bettencourt, President & CEO, Imperva | Mark Kraynak, Chief Product Officer, Imperva
We’ve combined the data collected from our products with the insights gathered from our customers to come up with some meaningful commentary and helpful guidance for 2015. Check out our predictions for the year ahead and make sure you’re ready.
Anatomy of the Compromised Insider
Presented by Terry Ray, Chief Product Strategist, Imperva
Statistics show that organizations face an ever increasing threat from compromised insiders. These trusted end users routinely have their endpoint security tested by malware and viruses.
Industry analysts are now questioning the current and future capability of anti-virus and anti-malware solutions to mitigate these insider threats. There have been numerous high profile events over the past two years to demonstrate the problems of prioritizing security at the end-point. This webinar will:
- Walk through the process of identifying targets for infection
- Expose tools used to infect and exploit the compromised end-point
- Provide recommendations to mitigate the effects of compromised insiders and data theft
- Download Slides
The Non-Advanced Persistent Threat
Presented by Sagie Dulce, Security Research Engineer, Imperva
Advanced Persistent Threat (APT) is a term given to attacks that specifically and persistently target an entity. The security community views this type of attack as a complex, sophisticated cyber-attack that can last months or even years. However, new research indicates that these attacks are actually being achieved by much simpler methods.
The Imperva Defense Center has discovered that data breaches commonly associated with APT require only basic technical skills. As a result, security teams need to fundamentally shift their focus from absolute prevention of intrusion to protecting critical data assets once intruders have gained access to their infrastructure. This webinar will:
- Expose some powerful, yet extremely simple techniques that allow attackers to efficiently expand their reach within an infected organization
- Show how attackers achieve their goals without resorting to zero-day vulnerabilities and sophisticated exploits
- Discuss how organizations can protect themselves against the advance of such attacks
- Download Slides
The Insider's Guide to Insider Threats
Presented by Rob Rachwald, Director of Security Strategy, Imperva
Did you know 70% of employees plan to take sensitive business data with them when they leave their job? Further, did you know over 50% feel they have rights to this data? If you think your organization has avoided the insider threat, you may need to look deeper.
Pinpointing the source and scope of data theft is often hard to quantify, especially since your largest internal threat may actually be one of your most loyal employees. This webinar presents the findings of the first-ever global insider threat study that catalogs common practices used by leading organizations across numerous verticals. This presentation will:
- Define the insider threat
- Quantify the prevalence of the problem
- Uncover controls that have proven most effective at minimizing the risk of insider threats