Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Cloud computing and virtualization technologies have the potential to create an efficient, scalable and robust IT infrastructure, but only when they are implemented correctly. This isn’t as simple as it seems and the s..
Sophisticated attackers and a proliferation of new attack surfaces have made 2012 a dynamic year in IT Security. Perennial threats, like email phishing attacks and malware combined with the rise of mobile devices in the ..
Calling 2011 the year of hackers would not be an overstatement. With high-profile system intrusions constantly making headlines worldwide, hackers, good and bad, exposed security system vulnerabilities across every indus..
Many businesses are neglecting to implement effective PCI DSS compliance when developing their security policies as IT compliance has no visible ROI in the short term. When looking at the long-term effects, however, thor..
Cyber security is now prominent in the mainstream media with news stories regularly getting in front of end users and boardrooms alike. The information security and risk market has responded with a range of solutions to ..
Personal devices are invading the workplace and IT departments need to find ways to manage the trend effectively. Having internal and external users accessing sensitive data through mobile applications and devices is no..