Do you find yourself thinking “I don’t have time for all of these alerts? It just takes me too much time to collect the data per incident?” Or “Why are my tier 3 analysts dealing with so many manual tasks instead of hunting?” Join RSA to learn about how Security Automation and Orchestration can help reduce alert fatigue, make your SOC team more efficient, and better leverage existing security investments than “just” adding new tools.
Would you ride in an autonomous vehicle if you knew it did not know where other cars were located while in motion? This is akin to asking your users to share data on the network with no idea who, what or when that data is being shared and how secure it is. Join this webinar to explore how to give security analysts the visibility they need in order to properly understand the risks and potential threats to the network, ultimately protecting information and the business itself.
Get a first-hand look at the capabilities that make RSA NetWitness Platform® a unique threat detection and response solution. Ask the experts how these capabilities can help your team leverage the people you have to be more effective, accelerate threat investigations, understand the full scope of an attack, and more.
The number and significance of third party relationships continues to grow for organizations across all industries and geographies. When an organization falters in some way, the root cause of the problem is often linked to a third-party relationship. Unfortunately, many organizations that are hit by third party problems didn’t see them coming and had no chance to steer clear. In this webinar, we will explore proven methods to quickly get your third party governance program off the ground.
RSA conducted a study on the convergence of IT Security and Business Risk teams, to see if and how these teams collaborate to help reduce risk and strengthen threat detection and response. This webinar reviews key findings from a survey of 175 IT Security and 131 business risk (e.g. GRC, governance, risk, compliance, auditing, legal, IRM, integrated risk management) professionals. The findings highlight the challenges organizations face and the actions they’ve taken to improve collaboration—between people and also across goals, processes, tools and metrics—between their IT Security and Business Risk teams.
Customers across industries and around the world rely on RSA Identity Governance and Lifecycle to mitigate identity risk through a governance-first approach to access management. We’re excited to reveal several key enhancements and innovations designed to mitigate risk and strengthen security, governance and compliance during this live session. Join us to learn about these and other innovations and to get an inside look at our latest vision and roadmap for RSA Identity Governance and Lifecycle.
For many organizations, legacy and custom-built applications form the backbone of their businesses, powering core functions from finance to customer-facing systems. Yet often these applications are inadequately secured with just usernames and passwords, making them attractive targets for hackers and highly vulnerable to credential-based attacks. View part 5 of this 5-part webinar series to learn about an alternative approach to adding MFA to these custom and legacy applications.
With so many channels, both traditional and new, financial institutions are struggling with ways to offer a seamless customer journey while also managing digital risk. Join us for a live webinar where we will discuss current global trends in digital fraud, the market forces driving digital banking transformation, and success criteria for omnichannel fraud prevention, including case studies and demonstrated results.
Looking to make multi-factor authentication (MFA) more accessible to a wider range of users? View part 4 of this 5-part webinar series to find out how easy it is to use advanced mobile authenticators from RSA SecurID Access to provide your users with convenient, secure access to the VPN.
Organizations are turning to digital workspace platforms like VMware Workspace ONE to simplify users’ ability to gain access to the resources they need. Yet these digital workspaces—and the applications they support—also need to be secured without inconveniencing end users. View part 3 of this 5-part webinar series to find out how RSA SecurID® Access provides simple push or mobile biometric MFA for convenient access to these workspaces and applications.
How do you begin your journey to an Intelligent SOC? Start by evaluating where your dimensions of visibility, analytics, automation, and risk fall. With that knowledge you can build your roadmap in a sequence that delivers maximum impact and cost effectiveness. Join RSA experts to get tips on building your roadmap.
Protecting access to accounts and data is critical in today’s digital world. This is especially true for your organization’s most privileged accounts, which now extend beyond a root server or admin console to highly privileged users in the cloud. In part 2 of this 5-part webinar series, you will learn how multi-factor authentication from RSA SecurID Access can better protect privileged accounts across your enterprise, including admin access to critical infrastructure and privileged access management tools.
Gábor Varjas, the CISO of MOL Group, an international oil and gas company based in Hungary, speaks about his team’s journey to an intelligent security operations center (SOC) with members of the RSA Advanced Cyber Defense (ACD) Practice. Whether you have a full-blown SOC in place or a small security team, Varjas and the RSA ACD team share insights, best practices and “lessons learned” intended to help any security team improve its detection and response capabilities.
We all know we need more than just usernames and passwords to protect our organization’s data, especially data stored in the cloud. In part 1 of this 5-part webinar series, we will explore several concrete steps you can take to secure access to cloud applications—without impeding the user experience—using simple, convenient multi-factor authentication (MFA).
Join Patrick Potter, GRC Strategist for RSA Archer® for an interactive webcast where he will share why organizations with a strong focus on business resiliency will have a much better chance of not only enduring in the face of disruptions, but also find that they can use their ability to “bend but not break” as a competitive advantage.
3D Secure 2.0 is expected to have a profound impact on the payments industry by accelerating digital commerce and offering a better user experience with increased fraud protection for card-not-present transactions. Whether you have already started on the journey or are only just beginning, there are many considerations to help you get prepared to make a smooth transition. Tune in to this on-demand webinar to hear recommendations from a leading analyst for what you should be doing to prepare to move to 3D Secure 2.0.
Most security operations centers rely on a security information and event management (SIEM) system to understand what’s happening in their environment and detect malicious activity. However, traditional SIEMs were built for compliance and log management purposes, so they don’t give SOC analysts the full visibility or sophisticated capabilities they need to detect and respond to today’s advanced and targeted threats. Get tips for evaluating SIEM solutions.
In today’s perimeter-free world, deploying multiple, prevention-focused point products or focusing only on complying with regulatory guidelines is not sufficient to prove the comprehensive protection required by the government enterprise. Learn more about the five key function areas which define the Cybersecurity Framework (CSF): identify, protect, detect, respond, and recover.
Join us on April 4th for an informative and interactive webinar with the RSA SecurID team and see what’s new with RSA SecurID Access. You’ll see how RSA SecurID Access is strengthening its cloud offering with the integration of RSA Authentication Manager (AM) and Amazon Web Services (AWS). And, you’ll learn how to connect to anything with RSA SecurID Access and provide mobile optimized authentication methods including push notification, biometrics, FIDO, SMS/Voice and more.
Attend this webinar to discover what’s new with RSA Identity Governance and Lifecycle version 7.1, released February 2018. You’ll get a live demo of the solution in action plus you’ll learn about our new Recommended Practices and Implementation Blueprints that are designed to simplify key processes and integrations.
The process of securing public, private and hybrid clouds is not unlike training for a marathon. To be successful in either endeavor, preparation—having a training plan—is key. During this webinar, experts from RSA and Ixia will share strategies for securing your workloads in various cloud environments.
The market demands are more like “Have it your way!” for modern approach to authentication…that’s why many of the one-trick ponies that can only do one thing for certain apps will become obsolete or acquired as Access Management vendors will face the complex reality that enterprises who want modern authentication will also want access that’s pervasive, connected and continuous – not just 2FA or SSO.
The RSA Global Incident Response team will share a real-world, technical case study demonstrating how it used RSA NetWitness® Platform to contain and remediate a sophisticated attack perpetrated by the threat actor group Carbanak (also known as FIN7). You’ll come away with proven methods for threat hunting and incident response, as well as an in-depth understanding of how Carbanak intrusions tend to take place, so that you know what to look for in your own environment.
Let’s face it — when it comes to moving applications and data to the cloud, enterprises want to streamline operations and deliver a better user experience. However, they don’t want to sacrifice security or performance. In fact, modern enterprises expect a journey to the cloud that ultimately enables better security. Better access. Better performance. The question is: Is it possible?
RSA Web Threat Detection helps organizations respond faster to automated attacks, account takeover, fraudulent payments and many more high-impact cyber threats with zero impact on site performance. Join us for a live webinar where we will discuss the latest release of RSA Web Threat Detection which now offers enhanced flexibility for multi-tenancy enabling technology service providers to add it to their environment and provide it as a managed service to their customers.
As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this webinar.
Mass data breaches have created an abundance of verified credentials for sale and led to a spike in account takeover attacks. Join RSA as we peer into the dark web and explore the Sentry MBA toolkit, one of the most popular automated attack tools being used by cybercriminals to conduct account takeover on major popular websites.
The cost savings, agility and innovation capabilities associated with cloud computing are driving widespread adoption of cloud services among organizations of all sizes. At the same time, pressure to secure cloud environments is intensifying, and cybersecurity teams are feeling the heat from multiple sides: Not only are they under regulatory pressure, but securing the cloud often necessitates dramatic changes to the way they approach cybersecurity.
Every asset on your network and in the cloud has privileged accounts—everything from network devices like routers and switches to server operating systems to the databases and applications on those servers and, of course, all levels of cloud assets from IaaS to SaaS and in between. And with today’s risks, privileged sessions need more than passwords. If you pick and choose which assets to protect with multi-factor authentication (MFA), you are leaving layers of your network vulnerable.
As identity theft and credential-based attacks escalate, organizations wonder how this can be when they're investing so much time and effort deploying identity and access management solutions. Despite their best efforts, identity has become the most consequential attack vector to the modern enterprise. Organizations are essentially outmatched by increasing identity risks.
Each organization’s journey to the cloud is unique, but those journeys are more frequently being driven by business rather than technology needs. Consequently, security teams are put in an awkwardly reactive posture. The momentum driving organization’s deeper into the cloud, coupled with the need to secure a hybrid cloud and on-prem environment, present distinct challenges and threats.
Most organizations have implemented SIEM as well as identity and access management technologies. But, are these systems talking to each other? Join RSA and Ultimate Windows Security to learn about the event information generated by access management and authentication technologies and how that data can be leveraged once it’s in your SIEM.
Preparing for GDPR is no small task—the regulation places specific requirements on organizations, such as recording processing activities, demonstrating accountability and reporting a breach within 72 hours of discovery. In addition, organizations could be liable for fines of up to 4% of annual global revenue (or 20 million euros, whichever is greater).
The GDPR has important implications for every business, even for those that have no operations in Europe. However, Osterman Research has found that even with implementation of the GDPR just seven months away [at the time of the webinar], many businesses are not well prepared to meet the compliance obligations of this critical requirement. Join us to explore how the GDPR will impact your business and how you can comply with the key provisions of this landmark requirement before the May 25, 2018 deadline.
In today’s hyper expansive and unpredictable market, it isn’t sufficient to be ‘just good enough’ when it comes to managing risk. Every day, in organizations around the globe, risk, compliance, security and GRC champions are being asked questions they can’t answer. The pressure to provide your business with key insights into risk is building and, without a well thought out approach, you can unfortunately end up making insignificant progress and providing little value to the organization. View the on demand webinar for six major concepts you need to consider when building out your risk management strategy.
In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We need to find a way to embrace today’s boundaryless business world, while maintaining security confidence, ensuring that we meet increasing compliance demands, and doing so in a way that’s seamless and easy for our users.
Now that so many applications have moved to the cloud, and users continue to embrace mobility, your organization must work toward fully embracing the new opportunities this boundaryless world presents. It’s time to shift traditional thinking away from authentication as a static one-time event and move towards a more modern authentication strategy that doesn’t require a trade-off between security and convenience.
The EU (European Union) General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. Join us as we share practical insights to help organizations start to prepare for the GDPR and demo our two new RSA Archer use cases that are designed to directly support organizations’ efforts to establish robust data privacy and data protection programs to address requirements of the EU General Data Protection Regulation.
The release of 3D Secure 2.0, and more recently, the PSD2 directive in the EU, has raised many questions as to what influence each holds for digital transactions, e-commerce, and consumer authentication. Both are expected to have a major impact on global payments and come at a perfect time. This webinar highlights the latest developments in 3D Secure 2.0 and PSD2, the impact on consumer authentication, and recommendations for what issuers and merchants can do to prepare.
Dive into RSA NetWitness Platform, and see why it's so exciting for analysts and security leaders, including:
- User interfaces built to help analysts respond to attacks
- A non-siloed analytics engine to find attacks that could otherwise go undetected
- Behavioral analytics and machine learning to automate the correlation of massive volumes of disparate data
- Visibility across the enterprise – from the endpoint to the cloud
The landscape of user authentication is changing rapidly. A vanishing perimeter and the continuing explosion of cloud-based applications and mobile devices are blurring old boundaries—creating more islands of identity and forcing organizations to reimagine identity and access strategies.
Technology trends, such as mobile, IoT and the open API economy, are forcing organizations to take a fresh look at how they protect their customers. In addition, industry and regulatory drivers, such as 3D Secure 2.0 and the EU’s Payment Services Directive II (PSD2), are helping to propel the adoption of convenient consumer authentication. This webcast brings together an expert panel to discuss the five key considerations essential to designing and executing a consumer authentication strategy, what it needs to accomplish, and the role of user experience in increasing fraud protection.
The RSA Adaptive Authentication ecosystem approach enables organizations to allow data from other anti-fraud tools to improve performance of the RSA Risk Engine and make more informed decisions about the probability of fraud. Now, RSA Web Threat Detection offers yet another integration point for Adaptive Authentication to improve fraud detection. Learn more about the integration between Adaptive Authentication and Web Threat Detection and how you can get more value out of your existing RSA investments.
Organizations are beginning to understand the role incident response plays in their broader cybersecurity strategy: The faster they can respond to a threat, the sooner they can limit its business impact. In this webinar, RSA and Forrester Research discuss the incident response services landscape, and RSA incident responders share their real-world experiences tackling some of the most complex cybersecurity challenges.
Look at information security through the lens of business risk, and you’ll begin to make decisions about security in light of their impact on the business. A GRC framework for business risk management can help you identify key business priorities and align them with security information and decisions.
The General Data Protection Regulation (GDPR), taking effect in May of 2018, will be a game-changing regulation that will reset the best practice models for data privacy and protection globally. As a regulation, as opposed to a directive, it will directly impose a uniform data security law on all EU members and will also apply to non-EU companies if they process personal data of EU individuals. The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the new law.
Identity is today’s most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Organizations are working to protect this threat vector and enforce strong access controls, address legislative requirements and keep data from getting in the wrong hands. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.
Business Risk Management solutions are about more than security. They provide an accurate, aggregated and timely view of all enterprise risk—whether that risk is associated with people, processes, technologies, third parties or regulations —and provide a unified response to any security incident. View part one of this two-part webcast series to understand how organizations can make better risk management decisions by understanding and communicating information security in terms of overall business impact.
The General Data Protection Regulation (GDPR), taking effect in May of 2018, will reset best practices for data privacy and protection globally. Preparing for GDPR is no small task. This, in addition to the substantial penalties for non-compliance, has propelled data protection as a business risk directly into the boardroom. View the on-demand webinar for five tips to accelerate your GDPR readiness, improve your risk management strategies and help you fulfill GDPR obligations.
As the traditional network perimeters dissolve and users demand more convenient access to their applications and data, IT security teams are taking a new look at how authentication is delivered. Join Dave Taku, an RSA identity expert, to learn how to modernize your authentication strategy and take authentication to the next level with identity assurance.
Traditional identity and access management technologies leave IT security and operations teams ill-equipped to simultaneously ensure convenience and strong security without compromise. To address increasing security and compliance demands, organizations must ensure the identities of employees inside their protected network along with millions of users outside their walls. Join Jim Ducharme, VP of Identity Products at RSA, to learn how the right IAM technology can help you protect today’s most consequential attack vector.
While investigating a popular class of exploits, RSA Research detected a common thread running through multiple campaigns. Continued research led to the identification of a massive domain-shadowing operation underpinning numerous campaigns and a significant cross-section of criminal infrastructure. Join the RSA Research team as they discuss what they discovered and how they discovered it.
From cashout and account takeover services to digital currency exchange, fraud-as-a-service websites are offering a wide variety of cybercrime goods and services that have been traditionally thought to be reserved for underground marketplaces and forums. Learn about the phenomenon of fraud-as-a-service websites, the reasons for their increased popularity, and the most common goods and services for sale.
Across industries and at organizations of all sizes, CISOs are struggling with the scarcity of cybersecurity talent. With more than 200,000 security positions going unfilled in the U.S. alone, competition for the experienced analysts who can help keep your organization secure will remain high. In this webinar, a panel of experts will share their views on the cybersecurity skills gap and steps security leaders can take to address it.
Digital channels have become ground zero in the fight against fraud. However, translating the war against cybercrime into business metrics that senior leadership understands can be just as challenging as the battle against enterprise fraud threats. explore how organizations are addressing the respective challenges and motivations that come with defining success including the factors driving investment in fraud prevention technology and recommendations for measurin g fraud risk management performance.
From mobile devices and the Internet of Things (IoT) to public, private and hybrid clouds, the explosion in new technologies isn’t just transforming business; it’s also transforming traditional approaches to cybersecurity. This webinar highlights the security risks associated with four major technology trends: the cloud, mobile devices, IoT and third-party access.
Turning credentials into cash would not be possible without the help of money mules. Whether in the form of humans or accounts, fraudsters have built sophisticated mule networks, making them one of the most difficult parts of the fraud supply chain to detect. Learn how to write rules in RSA Web Threat Detection to uncover and investigate potential mule activity and how one organization is doing so with great success.
Defending against human ingenuity demands a new way of thinking. With countless dollars spent and infinite alerts you still don’t have a true picture of what is going on. So when a breach happens, can you answer THE question: “How bad is it?” The inability to do so is what RSA calls the “gap of grief.” To answer, you must connect your security strategy and business risks.
Money mules are a common fraud-as-a-service offering in the Dark Web and absolutely critical in enabling the cash out process. Whether in the form of humans or accounts, mules are one of the most difficult parts of the fraud supply chain to detect. Get an inside look at how fraudsters are running money mule businesses in the Dark Web and how RSA proactively seeks this intelligence on behalf of our customers.