Hi [[ session.user.profile.firstName ]]

Aberdeen Group / IT Security

  • Date
  • Rating
  • Views
  • Implementing a Business-Driven Security Strategy
    Implementing a Business-Driven Security Strategy
    Dave Anderson (Voltage Security), Derek Brink (Aberdeen Group) Recorded: Oct 17 2013 66 mins
    **At the end of the session we're giving away a $2,950 guest pass to the Cyber Security & Digital Forensics Exchange (http://www.cyber-securityexchange.com). The pass is for the entire 3 day event, and includes meals and two night hotel accommodation. The winner will be chosen at random. To be entered into the draw you must attend this live webcast.**

    Today’s corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. Organizations often take a bottoms-up approach to security and continually build on top of their existing security investments. This technology-centric approach often creates an excessively complex and disjointed security infrastructure that is difficult to manage and prone to operational inefficiencies which can escalate IT costs.

    The need to be able to integrate security with business functions and operations exists more than ever. A Business-Driven approach can achieve end-to-end security that supports business goals such as driving innovation and reducing organizational costs, as well as operational requirements to address compliance measures, protect against internal and external threats, and prioritize the security risk management activities that make the most sense for their organization. In this webcast presentation we will address how to implement a solid Business-Driven security strategy within your organization.
  • Security in the Software Development Lifecycle
    Security in the Software Development Lifecycle
    Derek Brink, VP and Research Fellow IT Security and GRC, Aberdeen Group Recorded: Nov 15 2012 34 mins
    Aberdeen’s research finds that companies who pay attention to security for developed applications – if they pay attention at all -- leverage three distinct strategies:

    Inspection (“Find and Fix”)
    Additional layers of protection (“Defend and Defer”)
    Prevention (“Secure at the Source”)

    The trends towards a more dynamic user experience and integration with back-end services are powering even more complex web applications – a rise in enterprise mobile applications as well. All of which makes deciding which approach(es) to use for application security is a multifaceted business decision – one part context, one part judgment, and one part philosophy.

    Embedding security from the beginning of the software development lifecycle is not for everyone, but Aberdeen’s research confirms that it does yield the best results. This presentation provides insights into the benefits and tradeoffs of addressing security as part of the software development lifecycle.
  • Panel Session: Mobile App Security Strategies for Financial Services
    Panel Session: Mobile App Security Strategies for Financial Services
    Kevin Morgan, CTO, Arxan Technologies; John Steven, Internal CTO, Cigital; James Lynn, Practice Principal, HP Fortify Recorded: Nov 14 2012 46 mins
    This panel will tackle the unique challenges faced by businesses in Financial Services as they try to enter the growing mobile app market. We will bring together perspectives from vendors and researchers focusing on the topic and end users implementing the solutions and dealing with the day-to-day challenges.

    Moderator: Derek Brink, Research Fellow, Aberdeen Group
    Kevin Morgan, CTO, Arxan Technologies;
    John Steven, Internal Chief Technology Officer, Cigital
    James Lynn, Practice Principal - Fortify on Demand & Mobile Security Services, HP Enterprise Security
  • BYOD and Video: Analyst Q&A
    BYOD and Video: Analyst Q&A
    Andrew Borg and Derek Brink, Aberdeen Group Recorded: Nov 6 2012 15 mins
    In this short video session, Aberdeen analysts Andrew Borg and Derek Brink address questions about their recent research in the area of Bring Your Own Device (BYOD) and IT Security.
  • The Hidden Costs of BYOD
    The Hidden Costs of BYOD
    Andrew Borg, Research Director, Aberdeen Center of Excellence for Mobility Recorded: Sep 24 2012 30 mins
    BYOD's rapid adoption is widely discussed, but a thorough examination of its actual cost to the organization has been lacking. Expanding mobile access to the greatest number, within the constraints of capital equipment budgets, is one of the undeniable benefits of a well-managed policy. But BYOD also brings significant challenges: the increasing power and complexity of devices adds to the cost of support; cost controls are disaggregated; and new risks regarding security and compliance.

    Aberdeen Group describes a best practices approach to address these concerns, derived from its recent study of more than 560 organizations in 45 countries.
  • Right to Choose vs. Right to Wipe: The Division Triggered by BYOD?
    Right to Choose vs. Right to Wipe: The Division Triggered by BYOD?
    Derek E. Brink, CISSP, VP & Research Fellow for IT Security, Aberdeen Group Recorded: Sep 24 2012 13 mins
    "Right to Choose" vs. "Right to Wipe" – which sounds like a polarizing election-year issue – refers to the tension between enterprise end-users wanting to use their own smartphones and tablets to access enterprise resources, and enterprise IT departments wanting to ensure that they can centrally lock / erase / wipe enterprise data if the device is lost or stolen.

    This presentation summarizes an Aberdeen Group analysis of more than 430 organizations, which indicates that end-users are actually most productive and most satisfied when they have the freedoms of BYOD, but within certain boundaries and protections.
  • Get Ahead of the Next Flame Malware: How to Protect Your SSL Certificates
    Get Ahead of the Next Flame Malware: How to Protect Your SSL Certificates
    Eleanor Dallaway, Derek Brink, and Jeff Hudson Recorded: Aug 14 2012 61 mins
    Infosecurity Webinar
  • What's Stopping You? Removing the Barriers and Migrating to the Cloud
    What's Stopping You? Removing the Barriers and Migrating to the Cloud
    Derek Brink, Aberdeen; John Howie, CSA; Pravin Kothari, CipherCloud; Adam Swidler, Google Recorded: May 24 2012 58 mins
    Are your cloud concerns valid? This panel will focus on identifying the major perceived barriers to business adoption of cloud computing from the perspectives of security, compliance, privacy and policy. The goal is to separate founded and unfounded concerns and help IT security professionals and C-level executives make educated cloud decisions for their business.

    Panelists:

    Derek Brink, Vice President and Research Fellow, IT Security and IT GRC, Aberdeen Group (moderator)
    John Howie, COO, Cloud Security Alliance
    Pravin Kothari, Founder and CEO, CipherCloud
    Adam Swidler, Sr. Product Marketing Manager, Google
  • DLP, the Ideal Referee: Let the Game Go On!
    DLP, the Ideal Referee: Let the Game Go On!
    Derek E. Brink, Vice President and Research Fellow for IT Security, Aberdeen Group Recorded: Apr 5 2012 34 mins
    In its fifth annual study on best practices in data loss prevention (DLP), Aberdeen analyzed and compared the results from more than 600 organizations which have adopted one of four distinct approaches to the operational use of DLP technologies. The best approach, in terms of balancing enterprise risk and reward, is like the ideal referee in sports: one that makes good calls and enforces the rules regarding safety and fair play, but generally doesn't get in the way of the people playing the game.
  • Consumerization of IT: Enforcing Policies Without the Pain
    Consumerization of IT: Enforcing Policies Without the Pain
    Derek Brink, Aberdeen Group; Patrick Wheeler, Trend Micro: Mary Siero, Innovative IT LLC; Benjamin Robbins, Palador Recorded: Mar 15 2012 55 mins
    Consumerization of IT and BYOD represent an opportunity and a challenge for businesses. At the crux of the issue is the tension between enterprise IT professionals who are tasked with establishing and enforcing policies and end-users who care about mobility and freedom anytime, anywhere. This webinar will explore how establishing the right BYOD policy can help a company embrace the consumerization of IT while keeping their enterprise secure.


    Derek Brink, VP, Aberdeen Group; Patrick Wheeler, Sr. Marketing Manager Endpoint Security, Trend Micro: Mary Siero, CEO, Innovative IT LLC; Benjamin Robbins, Principal, Palador

Embed in website or blog