Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.
The New IT - How the World of Work is Changing and What IT Needs to Do to AdaptJacob Morgan, Co-Founder Chess Media Group; Ben Haines, VP/CIO, Box; David Baker, CSO, OktaThe future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.Read more >
Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.
Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.
Attend this webcast and learn:
- Best practices for protecting data in today’s complex security landscape
- Latest updates to compliance mandates pertaining to data encryption
Once upon a time, a knowledge worker accessed proprietary
documents on a company-owned desktop computer within the corporate
firewall. Today's work environment is dramatically different - sensitive
data and proprietary documents are increasingly produced and accessed
outside the firewall, on employee-owned devices. Virtual collaboration is
growing, and the cloud is redefining security paradigms even further. Yet,
some things remain the same. Intellectual property must be protected,
regulations must be complied with, and individual identities,
authentication and privileges must be dynamically managed. This panel will
look at how changing use cases and scenarios are changing the threat
landscape for corporate IP, and how leading vendors are rising to the
occasion to help enterprises meet these challenges. It will also discuss
best practices in developing and executing a forward-looking IP protection
The webinar will explore the challenges facing security professionals concerning the prevalent and ever-increasing risks to Big Data Security, recommended strategies for closing the gaps, and tools and techniques for keeping Big Data secure.
The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering.
Join Stephen Boyer, CTO and co-founder of BitSight Technologies, and Oliver Brew, Vice President of Professional Liability at Liberty International Underwriters (LIU) for this webinar to discover:
- Why measuring security risk is difficult and how some assessment methods leave organizations vulnerable to threats and financial loss
- How forward-looking organizations are using Big Data to reduce risk, increase transparency and address new regulatory requirements
- Case Study: How LIU is using Security Ratings to mitigate risk
Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.
The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:
-Cut storage requirements by up to 80%
-Save on storage costs and performance hits to your network.
-Leverage near-instant recovery technology for protected virtual machines or servers.
-Automate application-aware backups and testing for data corruption.
Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?
How do I collect the right data?
What kinds of new detections can I do?
How do I get enough context to overcome false positives?
How do I automate more of my security intelligence, or the intelligence of others?
What should I look for in a solution?
How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?
These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.
What You Will Learn
Why packet filtering and IPS aren’t the only performance metrics that matter
The performance impact of running multiple security services
How to select in-line security products that meet today’s multi-function security needs
Patrick and Mike discuss the importance of focusing on the complete security life-cycle: prevention, detection and response. They will also discuss the four essential pillars of incident response and how you can strengthen your security strategy across all endpoints, without getting buried in data.