Image 01 Image 02 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03

Webinars On-Demand

October 1, 2014 | Speakers: Peter Firstbrook, Vice President at Gartner Research and Yaron Dycian, Vice President of Products at IBM Security Trusteer

Every other day, a newly discovered breach or cyber-attack leads the headline news, taking an enterprise down with it. To properly defend against these sophisticated attacks requires new thinking, new approaches, and new solutions. In this program you will hear from two of the industry’s leading experts about the latest protection approaches used for advanced attacks and what organizations are implementing beyond traditional security controls.

September 23, 2014 | Speakers: Avivah Litan, Vice President & Distinguished Analyst at Gartner Research and Yaron Dycian, Vice President of Products at IBM Security Trusteer

Today’s fraud landscape is ever changing. Cybercriminals continue to evolve their attack techniques and develop innovative ways to evade detection. This webinar examines the latest attack methods used for account takeover fraud and new account fraud and reveals what organizations can do to help detect and prevent these online and cross-channel attacks.

July 17, 2014 | Speaker: Etay Maor, Senior Fraud Prevention Strategist, Trusteer

With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC. In this webinar, learn more about the emerging attack techniques used by cybercriminals in the mobile channel.

July 15, 2014 | Speakers: Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute and Christopher Beier, Sr. Product Marketing Manager, Trusteer

Advanced Persistent Threats can cause damage of seismic proportions to your organization. These targeted cyber-attacks are designed specifically to evade organizations' countermeasures by detouring firewalls, intrusion detection systems, and anti-malware programs rendering disastrous results. This session provides a unique look into the latest attack vectors, how APTs impact the enterprise’s fiscal results, and what measures can be taken to protect the organization.

June 17, 2014 | Speaker: Etay Maor, Senior Fraud Prevention Strategist, Trusteer

This session dives into the latest tools, techniques and threats developed and utilized by cybercriminals. The presentation includes a market overview of the latest offerings from the criminal underground, with a closer look at the newest malware attack and evasion techniques discussed by cybercriminals.

June 5, 2014 | Speakers: Mike Rothman, Analyst & President, Securosis and Andy Land, Program Director, Product Marketing, IBM Security Systems

Traditional endpoint protection solutions, including blacklisting and signature-based anti-virus, have not kept pace in combating advanced threats and zero-day attacks. A new approach is needed that understands the lifecycle of today’s advanced attacks, providing capabilities to assess devices, prevent attacks, detect compromise, investigate the incident and finally, remediate the environment.

April 03, 2014 | Speaker: George Tubin, Senior Security Strategist, Trusteer

Financial institutions are on a perpetual quest to improve customer engagement and satisfaction to drive increased transactions, account balances, loyalty, and ultimately profitability. Unfortunately, the fraud prevention solutions used by most banks interfere with the customers’ online experience. However, this no longer needs to be the reality. Strong, effective security can and should both enhance customers’ experience and lower operational costs. 

March13, 2014 | Speakers: Eve Maler, Principal Analyst at Forrester Research, Inc., and Christopher Beier, Senior PMM, Enterprise Products, Trusteer

Employee credentials are keys to a vast kingdom of intellectual property, personally identifiable information, and other valuable data. Key-loggers, phishing attacks and 3rd party hacks can lead to employee credentials theft and exposure. Investigations of current breaches reveal that compromised corporate credentials play a significant role in the attack enablement.

November 12, 2013 | Speakers: John Kindervag, Principal Analyst at Forrester Research, Inc. and Dana Tamir, Director of Enterprise Security at Trusteer

PCI recently released the latest version of its Data Security Standard (PCI DSS). What are the changes to the PCI DSS in light of increasingly sophisticated and dangerous advanced threats? How do the changes impact businesses? And how has PCI dealt with the latest hype around modern malware?

October 23, 2013 | Speakers: Trent Trimble, VP Business Integration, Texas Capital Bank and George Tubin, Senior Security Strategist, Trusteer

Texas Capital Bank is an $11 billion bank primarily serving commercial accounts in Texas. Its main driver for enhancing online banking security was the industry-wide increase in account takeover and attempted money transfer fraud through the online banking channel.