Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Applications have become paramount in increasing business productivity. They allow us to access a wide range of information from different devices, taking advantage of advanced functionalities such as cloud or mobile ser..
Cloud computing and virtualization technologies have the potential to create an efficient, scalable and robust IT infrastructure, but only when they are implemented correctly. This isn’t as simple as it seems and the s..
As mobile devices are becoming more and more sophisticated in an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the hottest challenges in information security. Vulnerabilities in..
In the haze between satisfying compliance requirements and securing one's IT systems, organizations usually focus on compliance over security. However, compliance does not result in security. From data breaches to hacks,..
To understand data security is to understand your business, from where sensitive information is stored to how business critical information is accessed and used. To effectively protect this multi-faceted environment IT s..
Sophisticated attackers and a proliferation of new attack surfaces have made 2012 a dynamic year in IT Security. Perennial threats, like email phishing attacks and malware combined with the rise of mobile devices in the ..