Browse communities
Browse communities
Presenting a webinar?

ISACA Online Events

Channel profile:

Monthly webcasts on governance, risk, security and compliance

Member only webcasts

Subscribers (64,783)
LA PRIVACIDAD DE MI EMPRESA (NO) ESTA A SALVO SIEMPRE Roberto Soriano, CISM, CRISC, CISA, PMP, ISO27K, PRINCE2-F, COBIT-F, ITIL v3-F La privacidad es una realidad que las compañías tienen que asumir para prevenir daño a su imagen, sanciones económicas y asegurar la información de sus interesados, por otro lado, los avances tecnológicos (BYOD, Cloud, redes sociales, Big data y otros) incorporan vulnerabilidades a nuestras organizaciones con alto impacto en la privacidad.
Debemos comprender el estado de la privacidad en las compañías, considerando ejemplos históricos y recientes, para analizar los riesgos de las compañías, hablaremos sobre que se debería esperar tras la publicación del reglamento Europeo y la legislación en Latino América y algunos caminos para resolver el gap entre necesidades de privacidad y la realidad.
Read more >
Mar 25 2015
60 mins
Play
  • Live and recorded (114)
  • Upcoming (2)
  • Date
  • Rating
  • Views
  • La privacidad es una realidad que las compañías tienen que asumir para prevenir daño a su imagen, sanciones económicas y asegurar la información de sus interesados, por otro lado, los avances tecnológicos (BYOD, Cloud, redes sociales, Big data y otros) incorporan vulnerabilidades a nuestras organizaciones con alto impacto en la privacidad.
    Debemos comprender el estado de la privacidad en las compañías, considerando ejemplos históricos y recientes, para analizar los riesgos de las compañías, hablaremos sobre que se debería esperar tras la publicación del reglamento Europeo y la legislación en Latino América y algunos caminos para resolver el gap entre necesidades de privacidad y la realidad.
  • Standalone network security products don’t share threat data, preventing you from seeing the complete threat landscape. As part of the US Government’s Cyber Intelligence Sharing and Protection Bill, they are clearing a path for the means of sharing critical threat information between the intelligence community and cybersecurity entities. But it shouldn’t stop there; your network security infrastructure should be doing the same. Learn how sharing threat intelligence between security devices assembles the big picture needed to block threats across your entire network, including branch offices and remote locations.
  • Our target audience: Young Professionals who have worked for a few of years and have acquired a first level of technical expertise but are aspiring for management opportunities that have taken them outside their traditional comfort zone.

    What’s it about: So you love the idea of transferring to another country or seeking a role outside your traditional comfort zone and potentially stepping outside your own culture. How could your work life change? What would your social life be like? Join two workplace adventurers who have experienced work and life outside their traditional cultural comfort zones and have a wealth of experience to share with you.

    Matthias Kraft, until 2014 had, in fact never worked in his native Germany and has two foreign born children who are now experiencing life in their dad’s country of origin and Jo Stewart-Rattray who spent years working in Germany, the UK, Canada and Singapore.

    Matthias and Jo will provide attendees with practical advice on working abroad and how to not only be effective but how to succeed in a different cultural environment. They will share personal stories and examples as well as cluing you into some of the potential pitfalls for the newly arrived including cultural awareness; differing customs; communication styles; appearance and gender differences.

    At the end of what will surely be a spirited discussion, attendees will have a chance to pose questions to these two workplace adventurers!
  • A lot has changed in the banking industry since introduction of technology helped create the 1st ATM machines in 1960's. However, one largely unchanged aspect of all tech powered payments platforms is authentication. Uid/PW, have served the industry for a long time and the attractiveness of this mechanism's intrinsic property - "something you know', has enjoyed people's unwavering support for a long time. However, the time has come for this technology to rest in peace. The technology, the attacks, and the processes using challenge-response gate have all evolved to a point where there can be a much stronger and secure solution without compromising on the user experience or cost.

    In this seminar we will introduce you to the FIDO Alliance and the frameworks created by this industry consortium to help bring online authentication, especially in payments into the current century and beyond.
  • The concept of the Internet Of Things is nothing new, with the term first being introduced over 15 years ago. Since then, the supporting technology has advanced at lightning speed; whereas the understanding of the challenges faced with this concept has developed at a snail's pace.

    This presentation will hope to provide an insight into the background & evolution of the IOT concept and the future challenges & responsibilities faced to ensure that the opportunities outweigh the potential threats.
  • The greatest threat of a data breach –intentional or not - continues to be from employees, contractors and partners – people you are supposed to be able to trust. This presentation explores policies, technology and best practices to manage, monitor and audit the use of mobile devices as part of a larger Identity Management strategy.
    This presentation will look at how mobile is changing the concept of enterprise security. We want to look at what implications that mobile adds to the security challenge, and what processes and steps can be put in place to mitigate these risks.
  • This session will discuss data protection and privacy. You will learn commonality and fundamental differences across the three primary regional approaches to privacy, how these differences present challenges for your organization, and basic steps that organizations can take to overcome these challenges. You will gain insight into the potential impact from disconnects in governance and risk management and how the quest for technical solutions to process problems can make your challenges worse. You will better understand key steps to take that can help your organizations to create an environment in which privacy enables business and innovation through maturation of governance and risk management processes.

    •What is Privacy
    •Regional Approaches
    •Fundamental Differences
    •Overcoming Challenges
    •Symptoms of Poor Program
    •Building Responsive Programs
    •Risk management is the goal and compliance is a performance measurement
    •Privacy Resources
  • The endpoint is where the security war is now taking place; attackers are getting more advanced, deploying unknown exploits and unique malware that current day security is simply not equipped to prevent or even detect. Join Palo Alto Networks as we walk you through the shortcomings of existing endpoint security, and why it's leaving your enterprise vulnerable to sophisticated and zero-day attacks, waiting for detection and remediation to step in, which is too little too late.
  • In line with the global trends, the Indian government has drawn up ambitious initiatives for significantly leveraging on the deployment of information and communication technologies in achieving efficient delivery of government services while managing the political and operational risks thereof.

    With e-governance systems, world over, being targets of cyberattacks, the root cause is often traced to the lack of cyber security being a key consideration in e-governance strategy and technology architecture.

    This session seeks to discuss the importance of cybersecurity strategy in e-governance strategy and how COBIT 5 alongwith the NIST framework can be effectively combined in laying a strong foundation for building security, privacy and trust in e-governance.
  • In today's rapidly evolving world, information is coming from everywhere, 24 hours a day, 7 days a week. But how do you sort the wheat from the chaff? How do we meet and develop of professional communities? How does one network in this new era? How do you connect and then manage your relationships? Robert Stroud, ISACA International President and a social networker, will share his thoughts on these topics and others as our business and social world converge.

Embed in website or blog