Atos Workplace Solutions and PCs with Intel vPro Technology
By: Intel Corporation View more from Intel Corporation >>
Download this next:
Case Study: French national research centre insources with Rubrik backup
By: TechTarget ComputerWeekly.com
Type: Case Study
France’s national research organisation wanted to insource IT back from Atos and built its private cloud on VMware across two locations with Rubrik appliances for backup.
These are also closely related to: "Atos Workplace Solutions and PCs with Intel vPro Technology"
-
APAC webinar: Understanding the Threats and Gaps in Commerce
By:
Type: Talk
Join us for this English-only webinar to decode the distinctive cybersecurity landscape of the Asia-Pacific (APAC) region from recent research findings: ATO Attacks: 73% of APAC organizations faced ATO threats last year. However, with a deployment rate for ATO solutions at just 60%, is APAC lagging behind in safeguarding its assets? Bots and Their Impact: APAC saw bot attacks lower than the global average, yet the region's deployment and benefit rates for combating these threats also remain the lowest. Discover why. Script Protection and Audience Hijacking: Understand the depth of the challenge with malicious scripts and audience hijacking, and why the region is under-equipped to tackle them.
-
Protect against account takeover attacks with Barracuda CAP
By: Barracuda
Type: Replay
Protect your web applications and APIs from cybercriminals, including Account Takeover (ATO) attacks against personal and business email accounts. Don’t miss this informative new webinar about all the benefits of Barracuda Cloud Application Protection (CAP). Be in the know about evolving ATO attacks and how to protect against them See how machine learning identifies and stops even the most sophisticated bots Get a first-hand look at the new Privileged Account Protection capabilities that detect risky logins and block attacks in real time Join Barracuda application security experts for this webinar about Barracuda CAP and all the latest strategies, solutions, and suggestions to defend your business from bots and ATO attacks.
Find more content like what you just read:
-
Cybersecurity Awareness 2021: #BeCyberSmart about Account Takeover Attackers
By:
Type: Replay
Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. Attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. How can companies that are the intended targets for ATO innovate to learn from attacks, anticipate attackers’ next moves, and apply new techniques and detections to stop them? You’ll gain an understanding of: · Underground criminal economy of stealing and selling credentials and accounts · Purpose-built ATO attack tools that bot operators use to target your business · Innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover
-
How to prevent GenAI attacks on your IT Helpdesk
By:
Type: Video
Ori Eisen will describe the new threat that Gen AI presents to IT Helpdesk and showcase Trusona’s ATO Protect tool that can quickly and easily prevent such attacks 1. Understand the nature of Gen AI attacks on IT helpdesks 2. Know who is on the other end of the call, wherever in the world the call comes from 3. Detect sophisticated ATO attacks like Man-In-The-Middle and SIM Swap
-
Prevent Account Takeover Fraud and Keep Customer Trust
By:
Type: Video
It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO
-
Prevent Account Takeover Fraud and Keep Customer Trust
By:
Type: Replay
It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO
-
Prevent Account Takeover Fraud and Keep Customer Trust
By:
Type: Replay
It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO
-
Prevent Account Takeover Fraud & Keep Customer Trust
By:
Type: Replay
It's alarming to see how sophisticated organized cybercriminals are getting. Your adversaries continue to evolve advanced strategies that bypass traditional security and fraud defenses, evading detection and leading to account takeover (ATO), loss, and customer frustration. By better aligning and integrating your security and fraud teams, you can help stop ATO and other malicious activity before it leads to fraud, lost revenue, and damage to customer loyalty. With the right countermeasures, you can securely embrace innovation—like open banking—and successfully compete for customer loyalty. Join this webinar discussion to gain insights into: - Protecting customers by aligning your security and fraud strategies - Blocking tactics used by criminals to bypass defenses like CAPTCHAs and browser fingerprints - Neutralizing cybercrime retooling attacks that lead to ATO Register Today
-
Cyber Monitoring & Defense for Critical Infrastructure
By:
Type: Talk
This talk will detail the tools we use to develop a NIST CSF-compliant platform and set of ATO-supporting artifacts and discuss how they can improve the cybersecurity of the manufacturing process.
-
Changing the Future: Outmaneuver Sophisticated Bots and ATO Attackers Now
By:
Type: Replay
Akamai Customer Panel: Automated attacks and account takeovers (ATO) continue to rise in sophistication, severity, and pervasiveness. And attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. Companies that are the intended targets can anticipate attackers’ next moves and apply new technologies and detections to stop them. In this panel session with customers from various industries (e.g. CTS Eventim, Zalando SE, and Next PLC), we’ll discuss the underground criminal economy of automated scraping and buying, as well as stealing and selling credentials and accounts. We’ll also talk about innovations that organizations use to change the future from one where attackers have the upper hand to one where they fight back against the disruptive nature of automated threats and ATO.
-
10-Min Webinar: How Identity-Focused Security Can Drive Digital Business
By:
Type: Replay
Alongside the rise in remote work, there’s been a staggering increase in security threats, in particular account takeover (ATO) attacks. Even minor incidents can threaten monetary loss, chargebacks, regulatory fines, and reputation loss. Many organizations see the looming threat that ATO attacks pose to their business, but don’t understand the most important place to start for prevention: identity security. Join this webinar with IDG and Okta, where you’ll learn: • Why identity-focused security is a critical element in driving digital business • Survey insights on global IT leaders’ identity and access management objectives, practices, and challenges • The perceived threat of account takeover attacks and methods of prevention
-
Making Sustainability a Successful Strategic IT Initiative
By:
Type: Talk
As environmental matters remain increasingly relevant, it's crucial that organizations adapt their business strategies to prioritize environmental, social, and governance (ESG) principles. In a recent survey conducted by Enterprise Strategy Group*, nearly a third of respondents already had mature ESG programs in place that impacted their purchasing and operational decision making. Through streamlined data management, organizations can achieve an integrated data strategy to measure and verify their ESG commitments. While data transformation is key to achieving operational efficiency and net zero ambitions, it can be difficult to navigate existing programs and align departments to realize ESG goals. Join this panel to learn more about how Veeam and Atos can help organizations further their ESG initiatives as guest panelists discuss: - The benefits of adopting ESG data protection practices for hybrid cloud environments - How Veeam and Atos work together to enhance your organization’s existing digital transformation initiatives and ensure sustainable digital interactions - How Veeam and Atos can help organizations create an end-to-end sustainable IT strategy to modernize infrastructure and reduce carbon emissions *ESG Complete Survey Results: The Role of ESG Programs in IT Decision Making, SEPT 2022
-
How to Stop Account Takeover and Human Fraud
By:
Type: Replay
The use of stolen payment details remains the largest fraud cost to online businesses. Emerging quickly from its shadow, however, is account takeover (ATO), which has increased significantly since the pandemic began — with a 134% increase in malicious login attempts detected on our platform during 2020. This webinar will take a deep dive into how to stop ATO before it happens by detecting and mitigating attacks, credential stuffing, and account hijacking. It will also include a demo of Akamai’s new account protection feature, which is a forthcoming extension of our industry-leading bot management solution. What we will cover: • Details of the fraud kill chain • How to get smarter bot detection using machine learning • What a risk score is and how to apply it on credentials usage • How to mitigate fraud by preventing account takeover attacks
-
Managing account takeover risks
By: Barracuda
Type: Replay
How is your business defending against the massive rise of Account Takeover (ATO) attacks? Don’t miss this informative webinar with everything you need to know to protect against sophisticated email threats that can wreak havoc if they aren’t detected and mitigated right away.
-
Imperva: Protección contra bots y account takeover: Casos de Usos (Español)
By:
Type: Video
n esta sesión exclusiva para nuestros socios y distribuidores en español, cubriremos como capitalizar y detectar oportunidades con estas dos tecnologías de imperva, y sobre todo poder distinguir los casos de uso para Account Takeover y Advanced Bot Protection. La sesión no es para usuarios finales o prospectos. Cubriremos los siguientes tópicos: -Definición y tipos de ataques de apropiación de cuentas, o Account Takeover. -¿Cuáles son las verticales y organizaciones que son más vulnerables a los ataques de ATO? -Detección de oportunidades para Account Takeover (ATO) y Advanced Bot Protection. Las diferencias entre ambas tecnologías y casos de uso. -Cómo hacer demostraciones para prospectos y/o clientes: para protección contra bots (ABP) y del modulo de account takeover, sobre los clientes de base instalada de Cloud WAF y prospectos nuevos. -Modelos de licenciamiento para el modulo de ATO, y de Advanced Bot Protection.
-
Employee Experience of HR - Where Real Impact Can Be Made
By:
Type: Video
We invited Atos' Global Director for Employee Experience, Sam Ellis, to explore the pitfalls many organisations make in focusing efforts in the wrong places, and how prioritising areas of accountability and influence can transform employee engagement, encourage better tool and process adoption, save money as well as valuable time and effort.
-
Outmaneuver ATO Attackers Now
By:
Type: Replay
Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover
-
Outmaneuver ATO Attackers Now
By:
Type: Replay
Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones. In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover
-
Vença os invasores de ATO agora mesmo
By:
Type: Video
As ATOs (apropriações indevidas de contas) continuam aumentando em gravidade e disseminação, principalmente em setores em que os objetos de valor digitais estão sendo criados com mais velocidade que os objetos físicos. Além disso, os invasores estão sempre inovando para tentar aumentar suas taxas de sucesso, esforçando-se para contornar as tecnologias de detecção e mitigação em sua cadeia de destruição. Mas o futuro não é constituído apenas por ataques. As empresas que são os alvos desejados de ATO também podem inovar e aprender com ataques, prever os próximos movimentos dos invasores e aplicar novas técnicas e detecções para detê-los. Nesta sessão, exploraremos: A economia criminosa e clandestina de roubo e venda de credenciais e contas Ferramentas específicas para ataques de ATO que os operadores de bot usam para atingir empresas Inovações que sua organização pode usar para mudar o futuro, fazendo com que os invasores percam sua vantagem e passando a lutar contra a natureza disruptiva da apropriação indevida de contas.
-
Understand Cross-Platform Account Takeovers & How to Protect Your Organization
By:
Type: Talk
Recent research from Abnormal Security shows that account takeovers (ATOs) are a top concern for security leaders, with 77% ranking it among their three most concerning threats. To boot, 83% of Abnormal survey participants reported that their organization had been directly impacted by an ATO attack within the past year, and nearly 1 in 5 have been impacted more than 10 times. Given the frequency of these attacks you likely have a few questions: 1. How and why are account takeovers increasing? 2. Which applications are the most vulnerable? 3. And why is it difficult to detect and remediate compromised accounts? Abnormal Security CISO Mike Britton and Enterprise Strategy Group Principal Analyst Dave Gruber tackle these queries in the following 2024 RSA Conference session. Register and watch the session for Britton and Gruber’s indispensable takeaways, as well as an explanation of how Abnormal Security’s unified Account Takeover solution detects malicious activity to kick out hijackers across dozens of cloud applications.
-
Digital Panel Series #4 Digital Ecosystems
By:
Type: Replay
This is the third event in the digital panel series looking at how businesses have and will continue to change through digitisation. During this live panel webinar, we will explore how digital ecosystems create value, the challenges they can present, and what examples we can learn from. This episode was hosted by Worldline’s David Daly who was joined by Rob Price from Worldline, Sophie Proust from Atos and Stephen Ingledew from FinTech Scotland.
-
Atos' Winning New Business through Deal-Based Marketing
By:
Type: Replay
ITSMA’s Marketing Excellence Awards (MEA) webcast series showcases programs we awarded in 2020 for best performance in marketing B2B services and solutions in categories including, account-based marketing, brand & reputation, driving strategic growth, executive engagement, sales collaboration, and thought leadership. Join ITSMA’s Vincent Rousselet, Senior Associate, as he introduces guest speaker, Catherine Dutton, Global Vice President, Marketing, Atos, for the fifth presentation in this series. Learn about Atos' 2020 diamond award-winning program, Enabling Sales to Accelerate Growth, in the Enabling Sales to Accelerate Growth category. Hear how their deal-based model has delivered extraordinary business growth and has elevated the marketing function to align more closely with sales. ITSMA’s MEA program honors the pursuit of excellence in strategy and planning, innovation, execution, and business results—key criteria for success in any marketing program. The 2021 MEA Program will be open for submissions on March 2.
-
Supere a los atacantes de ATO tácticamente ahora mismo
By:
Type: Video
La apropiación de cuentas (ATO, por sus siglas en inglés) sigue aumentando en gravedad y dominancia, especialmente en industrias en las que los bienes digitales se crean a un ritmo más rápido que los físicos. Además, los atacantes innovan constantemente para intentar aumentar sus índices de éxito a medida que trabajan para evadir las tecnologías de detección y mitigación en la cadena de ataque. Pero el futuro no se trata solo de más y más ataques. Las empresas que son los objetivos previstos para ataques de ATO también pueden innovar, mediante el aprendizaje a partir de los ataques, la anticipación a los próximos movimientos de los atacantes y la aplicación de nuevas técnicas y detecciones para detenerlos. En esta sesión, exploraremos lo siguiente: Economía delictual alternativa que permite el robo y la venta de credenciales y cuentas. Herramientas de ataque de ATO especialmente diseñadas para que los operadores de bots ataquen a su empresa. Innovaciones que su organización puede utilizar para cambiar el futuro, de modo que los atacantes ya no tengan la ventaja y pueda combatir la naturaleza disruptiva de la apropiación de cuentas.
-
Digitalisation des ventes en période de crise sanitaire
By:
Type: Talk
En cette période de crise sanitaire et économique, les consommateurs ont recours en masse à l'utilisation des services en ligne pour leurs besoins. PSA Finance a accéléré le développement de la vente et du financement de véhicules en ligne en transformant son SI. Pour se faire, Atos a développé un framework d’optimisation de la plateforme d’intégration webMethods de Software AG. Ce webinaire vous permettra de découvrir comment une plateforme d’intégration innovante peut venir enrichir les systèmes d’information traditionnels et répondre aux nouvelles attentes des clients. Avec les interventions de Matthieu Cantais, Responsable de la Stratégie Digitale, PSA Banque - Jean-Pierre Couderc, Architect solutions, Atos - Fabrice Hugues, Directeur Innovation & Solutions, Software AG.
-
How to Achieve Faster ATO on Cloud Native Applications
By:
Type: Talk
Grounding containerized apps on a fully-integrated, DISA STIG certified, Kubernetes stack can speed the process of gaining ATO, achieving FedRAMP approval, and bringing secure, performant, high-quality software and services to public sector and adjacent demanding markets. In this webinar, Michael Tillman, Mirantis Principal Cloud Architect for Public Sector, explains the new DISA Kubernetes STIG for Mirantis Kubernetes Engine, and its relation to current STIGs for stack components like Mirantis Container Runtime and Mirantis Secure Registry. Michael will then illustrate how this fully-integrated, STIG-certified container orchestration stack -- backed by Mirantis engineering expertise -- can help software makers and service providers deliver value faster for demanding Public Sector, FinTech, and other customers. You will learn: - What a DISA STIG for a Kubernetes architecture represents, and how STIGs for Kubernetes, container runtime, and other components relate to one another. - What having a Kubernetes STIG means in terms of asserting fundamental platform characteristics and capabilities. - How to map these fundamental capabilities to specific requirements of your use-cases involved in gaining ATO, FedRAMP approval. - How to work with the platform provider to ensure approval, and what to expect from the process.
-
Ping Office Hours - PingOne Protect: Getting Started & Maximizing Use
By:
Type: Talk
Join us Wednesday, August 23rd, 10 AM MT while we walk through the step-by-step process of getting started with PingOne Protect and maximizing its value in your platform. Agenda: 1. Short intro to PingOne Protect 2. Expanding beyond Risk-based authentication to New Account Fraud and ATO 3. PingOne Protect new capabilities 4. PingOne Protect demo 5. PingOne Protect roadmap 6. Integration and implementation options 7. Q/A
-
The top cybersecurity lessons learned from last year’s biggest headlines
By:
Type: Replay
In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learned? And how can we better protect ourselves from cybercriminals? This webinar takes a deep dive into some of the year’s biggest security stories, including: • The continued rise of credential stuffing attacks and ATO • New phishing techniques and strategies • In the headlines: Ransomware and malware attacks that gained international attention • What the future threat landscape looks like • And more
-
Goodbye, Passwords. Hello, Passkeys!
By:
Type: Video
Passwords are not only annoying from a user experience standpoint, due to the number of passwords we need to remember, but they are also one of the weakest forms of authentication. According to a recent study more than 60% of breaches are due to weak / compromised credentials. So why haven’t we moved away from passwords? Introducing Passkeys, a more secure passwordless solution to authentication that improves both user experience as well as security. Join this webinar to learn about: · The different types of password-based account take over (ATO) attacks · Passkeys and how they work · How you can enable a passwordless experience for your users
-
How CTS Eventim Keeps Fraudsters Out and Trust Intact
By:
Type: Replay
Trust is everything. Protect your customers from fraud. Want to find out who’s really logging in, account owners or impostors? Then register for this live webinar where we discuss with CTS Eventim, a leading international provider of ticketing and live entertainment, the challenge of account takeover and the steps they have put into place to protect their customers. You will learn how to: - Detect impostors and in turn stop human-driven fraud - Challenge fraudulent login attempts without impacting legitimate users - Recognise the steps in the ATO cyber kill chain and how to respond.
-
Unlocking reCAPTCHA’s Full Potential: Top 5 ways to maximize your bot & fraud protection
By:
Type: Video
Join us for a webinar designed exclusively for reCAPTCHA customers and learn how to fortify your bot and fraud defenses at every stage of the attack lifecycle. In this session, we'll unveil the top five proven methods to maximize the effectiveness of your existing reCAPTCHA implementation, enhancing your protection against evolving threats. Discover how to: > Improve Bot Protection > Protect Against Account Takeovers (ATO) > Detect Breached Accounts > Protect Against SMS Toll Fraud > Protect Against Payment Fraud By implementing these strategies, you'll gain a comprehensive understanding of how to leverage reCAPTCHA's full potential, empowering your business to combat sophisticated bot and fraud attacks effectively.
-
Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
-
F5 Shape Enterprise Defense Demo
By:
Type: Video
F5 Shape Enterprise Defense protects your business from sophisticated cybercriminals that abuse applications in order to commit account takeover (ATO) and fraud. By defending the world’s most valuable brands, F5 has unique visibility into automated and human traffic. Using AI and machine learning algorithms trained on attack profiles and risk surfaces, F5 can accurately and reliably protect against motivated attackers and fraudsters that retool to bypass your security countermeasures. In this demo, you’ll learn how Shape Enterprise Defense protects organizations from sophisticated attacks that would. Watch '5' min demo video
-
FIPS Enabled Ubuntu Pro on AWS (FedRAMP, GovCloud and more)
By:
Type: Talk
Developing and running Linux workloads in regulated and high-security environments require a long and expensive validation process. As a result, U.S. government agencies and companies that are required to meet government standards and/or deploy to meet their RMF, ATO or FedRAMP or GOVCloud demands will typically need to make large investments, ensuring that they run on robust and secure infrastructure platforms. Thanks to Ubuntu Pro and AWS you can have highly secure and FIPS enabled Open Source Linux instances running in no time. Having confidence in your federally regulated CVE’s not only for your Ubuntu Linux O/S, but also your Installed Application packages is something that many have asked for in the Open Source community. The flexibility and instant elasticity offered by the Ubuntu Pro within AWS will give you peace of mind while quickly scaling your cloud infrastructure. In this webinar, we will look at Ubuntu Pro with FIPS and additional security controls we provide at a higher level for agencies or missions to help you meet your security and compliance requirements. The session will also include a demo that shows how easy it is to start securing the Ubuntu Operating System within the AWS cloud. The webinar will cover the following topics: What does it mean to have a FIPS enabled Operating System? Application of FIPS, FedRAMP, DevSecOps, RMF, ATO and/or GovCloud What is Ubuntu Pro with CVE updates in relation to the Repo’s? Security for the O/S and your Application Packages How can you start using Ubuntu Pro on AWS How security controls and processes are used within agency missions Demonstrate how easy some of these controls are implemented
-
FIPS Enabled Ubuntu Pro on AWS (FedRAMP, GovCloud and more)
By:
Type: Talk
Developing and running Linux workloads in regulated and high-security environments require a long and expensive validation process. As a result, U.S. government agencies and companies that are required to meet government standards and/or deploy to meet their RMF, ATO or FedRAMP or GOVCloud demands will typically need to make large investments, ensuring that they run on robust and secure infrastructure platforms. Thanks to Ubuntu Pro and AWS you can have highly secure and FIPS enabled Open Source Linux instances running in no time. Having confidence in your federally regulated CVE’s not only for your Ubuntu Linux O/S, but also your Installed Application packages is something that many have asked for in the Open Source community. The flexibility and instant elasticity offered by the Ubuntu Pro within AWS will give you peace of mind while quickly scaling your cloud infrastructure. In this webinar, we will look at Ubuntu Pro with FIPS and additional security controls we provide at a higher level for agencies or missions to help you meet your security and compliance requirements. The session will also include a demo that shows how easy it is to start securing the Ubuntu Operating System within the AWS cloud. The webinar will cover the following topics: What does it mean to have a FIPS enabled Operating System? Application of FIPS, FedRAMP, DevSecOps, RMF, ATO and/or GovCloud What is Ubuntu Pro with CVE updates in relation to the Repo’s? Security for the O/S and your Application Packages How can you start using Ubuntu Pro on AWS How security controls and processes are used within agency missions Demonstrate how easy some of these controls are implemented
-
2021 - A Year in Review
By:
Type: Talk
The top cybersecurity lessons of 2021 In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learnt? How can we better protect ourselves from cybercriminals? Join us for a lively discussion of some of the year’s biggest security stories, including: - How credential stuffing attacks and ATO continued their rise following growth in 2020 - How criminals developed new techniques and strategies in their various phishing attacks - How ransomware and other malware also gained international attention, as the actors behind many of those groups became front-page news We'll also offer thoughts about what the threat landscape might look like in 2022.
-
State of the Internet / Security – 2021: A Year in Review
By:
Type: Talk
In a year that witnessed a digital pandemic of breaches, widespread supply chain attacks, and ingenious uses of human engineering to compromise enterprise systems, what were the key lessons learnt? How can we better protect ourselves from cybercriminals? Join us for a lively discussion of this year’s top security stories, where we’ll talk about … -The lasting impact of the transition to a virtual world -How credential stuffing attacks and ATO continued their rise following growth in 2020 -How ransomware and other malware also gained international attention, as the actors behind many of those groups became front-page news -The zero-day vulnerability in Log4j We'll also offer thoughts about what the threat landscape might look like in 2022.
-
Stop Account Takeover with Okta and PerimeterX
By:
Type: Replay
80% of login attempts are from bad bots. Cybercriminals use malicious bots that bypass CAPTCHAs and legacy defenses to execute account takeover (ATO) attacks that result in fraudulent purchases and stolen loyalty points and personal data. IT and security professionals will want to stay ahead of these malicious attacks to protect brand reputation and competitive edge. Register for this live webinar brought to you by Okta and PerimeterX to learn how to: -Stay ahead of bot attacks with Okta’s strong identity engine -Beat bad bots with PerimeterX’s proprietary algorithmic modeling -Customize with wide range of infrastructure, including cloud-services, middleware, load balancers, and CDN solutions
-
Stop Fraud Without Friction: How to stay ahead of motivated attackers
By:
Type: Video
Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud
-
Stop Fraud Without Friction: How to stay ahead of motivated attackers
By:
Type: Replay
Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud
-
Stop Fraud Without Friction: How to stay ahead of motivated attackers
By:
Type: Replay
Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few. Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses: - Attacker economics and the attractive ROI of cyber crime - Where attacks originate – automation - How attackers adapt – imitation and human fraud - How to defeat your adversaries and protect your business from online fraud Register Today
-
Standardize and Automate Security Compliance in Public Sector Agencies
By:
Type: Talk
Federal agencies are improving their cybersecurity posture to some degree, particularly as they develop better basic cyber hygiene and modernize their legacy systems. At the same time, hackers are getting better at finding new ways to attack and access federal IT. Yet certain pain points remain, particularly around managing compliance and achieving Authority to Operate (ATO) while implementing the Risk Management Framework (RMF) principles. This session will discuss current challenges faced in dealing with emerging threats, securing a more remote workforce and sharing strategies for staying ahead of adversaries. • Building efficiencies in your existing Risk Management Framework • Automating the implementation of security control to achieve a continuous Authority to Operate process • Hearing how your peers are implementing new ways to expedite compliance and audit lifecycles
-
Thinking Beyond User MFA: Digital Identities for Secure Networks
By:
Type: Video
Public Key Infrastructure (PKI) is the industry-proven, most secure, and cost-effective way of implementing security solutions for machine authentication, digital signatures, and encryption. It helps the organization to authenticate their digital identities of the users, which can range from individuals to computer systems to servers. It also prevents falsified entities and manages the life cycle of any given number of digital certificates within the system. However, there are some common misconceptions and problems to avoid while evaluating and implementing your own PKI solution. Join our webinar and learn more around: • The industry best practice for machine identity management and the critical benefits for PKI implementation. • How to adopt a scalable and future-proof PKI solution that can support your enterprise growth every step of the way. • Insights from a case study demonstrating how Axiad and Atos implemented their joint solution to protect our customers.
-
The Future of Customer Identity and Access Management (CIAM)
By:
Type: Replay
What if you could combine a seamless user experience with application security? Okta and Fastly have reimagined customer identity and access management (CIAM), combining solutions to protect your users’ identities without adding friction. Our next-gen web application firewall (WAF) integrates with Okta’s Risk Ecosystem API, creating a secure, seamless digital identity layer. The continuous risk assessment model correlates suspicious IP addresses with end-user accounts — this empowers security teams to assess user risk and block attacks in real-time. Join us to learn: • What is continuous authentication? • How to identify risk signals and analyze attack data • How to block identity-level threats like account takeover (ATO) Speakers: Swaroop Sham, Product Marketing Manager, Okta Julie Rockett, Director of Product Marketing, Fastly Tom Chang, Director of Global Technology Partnerships, Fastly
-
How Business Processes & Non-IT Services Must Change For A Post-COVID Workforce
By:
Type: Video
There is no longer such a thing as ‘normal’. The world has changed. Full stop. Many of the changes of the last 18 months are now permanent, particularly in our workforces. Digital disruption in our workplaces happened in 2020 along with a forced change in service mentality, particularly in parts of companies that didn’t see themselves as service providers before the pandemic. The COVID-19 springboard meant that companies had to reinvent and redesign services to be ready for the workplace now. Join our 4 experts - Andrea Kis, Principal Consultant and Christina Biangslev from Devoteam, ServiceNow's Melanie Lougee, and Sam Ellis from Atos - as they discuss how hybrid working and digitisation is now driving the future of Enterprise Service Management and what the priority for IT and non-IT leaders should be for 2022. Under the spotlight will be how IT leaders can extend a helping hand and support their enterprise counterparts such as HR and finance in their digital transformation journey and service management journeys.
-
Understanding Bots: Protecting your Customer Experience… and Bottom Line
By:
Type: Talk
Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedented shift to life online, retailers and specifically those in ecommerce have struggled to gain visibility into their online traffic – both legitimate and malicious. That’s why being able to quickly detect and block malicious bot activity – like credential stuffing, content scraping and inventory hoarding – not only improves customer experience during the path to purchase but also protects against online revenue loss. Join us as we discuss: - Why enhancing visibility into online traffic is critical for safeguarding customer trust - The damaging effect of malicious bot activity on customer experience and conversions. - The latest tools available today to combat malicious bots - Understanding the account takeover (ATO) kill-chain to prevent fraud - The benefits of real-time analysis into bot traffic - Reducing the risk of being impacted by malicious bots
-
Understanding Bots: Protecting your Customer Experience… and Bottom Line
By:
Type: Replay
Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedented shift to life online, retailers and specifically those in ecommerce have struggled to gain visibility into their online traffic – both legitimate and malicious. That’s why being able to quickly detect and block malicious bot activity – like credential stuffing, content scraping and inventory hoarding – not only improves customer experience during the path to purchase but also protects against online revenue loss. Join us as we discuss: - Why enhancing visibility into online traffic is critical for safeguarding customer trust - The damaging effect of malicious bot activity on customer experience and conversions. - The latest tools available today to combat malicious bots - Understanding the account takeover (ATO) kill-chain to prevent fraud - The benefits of real-time analysis into bot traffic - Reducing the risk of being impacted by malicious bots
-
Securing Government Contractors under CMMC with Phishing-resistant MFA
By:
Type: Talk
Over the past year, complex cyberattacks have skyrocketed—and it is no surprise that the U.S. defense industrial base and government contractors are primary targets. In this context, following the DoD Cybersecurity Maturity Model Certification (CMMC) is now more important than ever. Typically seen as phishing and account takeovers targeting digital identities, these attacks result in data exposure, denial of service, erosion of data integrity, and risk to critical assets. What if the solution was not to make passwords stronger, but rather to remove them entirely? Join Axiad and Atos on April 14th to learn why passwordless phishing-resistant Multi-factor Authentication is the most secure and practical defense. We’ll discuss: 1) General challenges of implementing CMMC identification and authentication controls 2) Actions to validate your workforce and machine identities in compliance with CMMC 3) What to look for in a phishing-resistant Multi-factor Authentication solution
-
Modernizing Rail Systems for Interoperability, Scalability and Safety
By:
Type: Talk
Despite investments in the latest equipment, many rail systems continue to face challenges in managing and optimizing connectivity. How can rail operators design one system to collect and monitor data from fast-moving trains operating through remote terrain; close interoperability gaps between countries and rail carriers; share data between legacy and modern equipment; and push out critical system updates to assets in motion? On March 15, join SYSGO and RTI to learn how a data-centric architecture built on a safety-certified foundation enables the necessary connectivity, flexibility and scalability needed for modern rail systems. The speakers will discuss and demonstrate a safety-certified approach to system design using standards-based, Commercial Off-the-Shelf software. This integrated, scalable connectivity solution enables legacy and ATO sub-systems to be seamlessly integrated regardless of system hardware. The demonstration will illustrate how to break down communication silos for faster uptake and deployment of projects that enable technological leadership and system-wide optimization in rail.
-
Combating Costly Account Takeover: the Fastest Growing Threat in Fraud
By:
Type: Replay
Account takeover attacks (ATO) are in many ways the driver of the wider fraud ecosystem. Compromised accounts are leveraged in downstream fraud with more sophisticated and costly attacks. The economic impact of fraud goes beyond just the immediate costs of remediating the attack. There are many ancillary costs of failing to stop these attacks as well, such as impacting customer loyalty, negative brand association, negative news headlines and more. In this session, we'll examine how effective fraud prevention prevents immediate and downstream costs. With the proliferation of apps that have adopted anti-bot technologies such as Shape Enterprise Defense, attackers are finding it difficult to identify soft targets. Instead of expending resources in an attempt to circumvent anti-automation technologies, fraudsters are pivoting and attacking unprotected email servers that become the steppingstone to the ultimate goal: your customer accounts. This, in turn, has resulted in a change in the credential marketplace landscape. Shape Security has been protecting our customers from automated attacks for years and has observed that fraudsters are left with no option but to revert to manual (i.e., human-driven) fraud methods. For this reason, we've developed machine learning models that protect our customers applications.