Search This Blog

Wednesday, May 15, 2013

Proactive Security Intelligence – Web Seminar Series


Learn more about HP Enterprise Security  |  web view
HP
Protect What Matters
See. Understand. Act.

Stay up-to-date on security intelligence and risk management by attending one of our valuable webinars. When you attend, you will learn the latest in the areas of information, application, and network security.
Why Your Cloud Provider Security Logo Doesn't Mean a
Thing | May 16, 10am PST/1pm EST

As more applications have moved to the cloud, the industry has seen a proliferation of application security issues. In 2012, several cloud service providers were breached as a direct result of application security vulnerabilities. Before you choose a cloud service provider, make sure that it answers the series of security questions created by the Cloud Security Alliance (CSA). CSA has created a checklist of industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings – creating more transparency for enterprises. The speakers will walk attendees through this blueprint, helping them to become more adept at identifying service provider security readiness. They'll also discuss some of the most common application vulnerabilities, including unencrypted passwords, SQL Injection, and those that impact poorly architected mobile apps.
Register now





How Attackers Identify and Exploit Software and Network Vulnerabilities | May 22, 8am PST/11am EST

Every attack on an enterprise begins with a single vulnerability - usually a hole in an application, an open port on a network, or a misconfigured device. But how do the bad guys find these vulnerabilities? What methods do they use to seek out potential entry points, and how do they use those flaws to crack your enterprise data?

In this fascinating webcast, top security experts look at the latest trends and techniques in vulnerability detection and offer a detailed look at the latest methods for exploiting vulnerabilities in enterprise applications.
Register now





Vulnerability Landscape: What's new in the HP 2012 Cyber Risk Report | May 30, 1pm Singapore time (GMT+8:00)

Cybercrimes are becoming more sophisticated and targeted, but organisations can create defenses with the right intelligence and benchmarks. Join Gab Gennai with HP Enterprise Security Products while he follows the trail of cyber criminals and the clues they leave behind to give us insights into today's technology weaknesses and how organisations can build better defenses:. You'll learn about new critical attacks to watch out for, top vulnerabilities that are being exploited, the rising complexity and sophistication in attacks, and the latest mobile threats.
Register now





Security Lessons from Cybercriminals | June 12, 11am BST

Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks' rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.

Join Simon Leech, HP's EMEA Technical Director, and hear about the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.
Register now





Gaining Threat Intelligence and Combating the Four Most Common Attack Vectors | June 12, 10am PST/1pm EST

The HP Security Research team (HPSR) is hard at work monitoring the threat landscape for new campaigns, profiling actors to understand their motivations, identifying the tools they use and determining how credible certain threats might be. Join Ted Ross, Director, Field Intelligence, HP Security Research as he shares HP's findings including injection flaws, DDoS, various phishing techniques and zero day vulnerabilities. How can you address the inevitable breaches that will occur? Find out when you attend.
Register now






Have questions? Get in touch with HP Enterprise Security now to discuss your security initiatives.


HP.com
Privacy
Unsubscribe
Update profile
Make sure your HP e-mails always go straight to your inbox. Add us-bulletins@info.hp.com to your address book!
Need Help?

HP respects your privacy. If you'd like to discontinue receiving e-mails from HP regarding special offers and information, please click here.

For more information regarding HP's privacy policy or to obtain contact information please visit our privacy statement or write to us at: HP Privacy Mailbox, 11445 Compaq Center Drive W., Mailstop 040307, Houston, TX 77070

Hewlett-Packard website

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP shall not be liable for technical or editorial errors or omissions contained herein.
PostScript is a trademark of Adobe Systems Incorporated.

No comments: