ISACA Online Events

Channel profile:

Monthly webcasts on governance, risk, security and compliance

Member only webcasts

Subscribers (49,211)
Stopping Threat Actors in their Tracks and Protecting Sensitive Data By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including state affiliated, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods and targets.

Join Roxana Bradescu, Director of Oracle Database Security as she examines:
•The three types of threat actors
•The industries they target
•How to protect sensitive customer and organizational data
Read more >
Apr 10 2014
63 mins
Play

Webinars and videos

  • Live and recorded (82)
  • Upcoming (3)
  • Date
  • Rating
  • Views
  • By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including state affiliated, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods and targets.

    Join Roxana Bradescu, Director of Oracle Database Security as she examines:
    •The three types of threat actors
    •The industries they target
    •How to protect sensitive customer and organizational data
  • Data - big, small, or the perfect size for Goldilocks - is revolutionizing the way we think about security. For some, it provides a way to identify risky behavior or activity and react quickly, with an opportunity for fewer false positives. To others, it represents a change in paradigms as they shift from a preventive model to one that strives for resilience. In all cases, the term can be ambiguous or hollow as people miscommunicate with each other about their needs and interests.
    This webcast will drill down into all of the different flavors of "big data." It will identify the sources and types of data that may be brought to bear on problems, the outputs and actions that are possible with a big data program, and the steps needed to get to a robust, data-driven security program.
  • Big Data is a valuable organizational asset, and with it, comes the challenges associated with data security and privacy. Join us for this informative webinar where Dr. Flavio Villanustre, CISSP from LexisNexis Risk Solutions will review the most relevant aspects of data security and privacy practices, and provide recommendations and suggestions to implement a reliable data governance process.
  • Next-generation firewalls have become the defense strategy of choice for data centers, branch offices, and perimeters. But before you make the move to next-generation firewall technology, you need to build a justification that addresses both financial considerations and security concerns.

    To provide you with guidance, we’ve invited Randy Perry, vice-president of business value strategy practice at International Data Corporation (IDC), to share his tips on determining the total cost of ownership and return on investment of next-generation firewalls. In this webcast, Randy will examine key criteria and considerations that will help you develop a rock-solid justification for business and financial stakeholders at your company.

    What you will learn:
    •Why establishing a baseline is critical and how to easily set it up.
    •Quick tips on assigning monetary value to the productivity loss, travel costs, and audits associated with cyberattacks.
    •The importance of documenting risk mitigation factors and the business impact of implementing next-generation firewall technology.
  • Acronyms are common in IT, but considering recent headlines, one stands out that has a direct impact on the value and performance of IT service providers: GEIT. Governance of Enterprise IT is the cornerstone of IT value contribution. Without it, many efforts to provide value in delivered services while providing a controlled environment are mute. As IT moves up the enterprise value contribution ladder, there are many areas which require enterprise level attention – but where do you start? Considering the primary goal of IT is to realize benefits while optimizing risks and costs, a continuous approach to adoption of good governance practices is required. In this ISACA webinar, you will understand the key drivers and elements of a GEIT initiative, why it is important, key benefits, and how to adopt and sustain an effective governance program. We will explore not only the essential elements, but provide proven and meaningful steps towards adopting an effective GEIT program.
  • El rapido crecimiento del uso de las redes sociales en los negocios ha establecido la necesidad para que las empresas entiendan los riesgos que estas representan cuando no son utilizadas de manera correcta. En esta presentación se discutirán los temas desde; que son las redes sociales, como funcionan, cuales son las ventajas y desventajas que ellas representan para el negocio así como cuales son las contramedidas que las empresas pueden implementar para minimizar los riesgos en sus usos.
  • Inherently, in most organizations, there is a natural fear of the word “Audit”. Most people initially think of the IRS or internal affairs; not a good impression, to say the least. As internal auditors, we must constantly manage the message to our organization and capture the benefits of internal audit; in essence, we must always actively market internal audit throughout the organization. Marketing internal audit is a significant undertaking that must be part of the foundation of any leading practices department.
    In addition to messaging the organization on the benefits of internal audit, all auditors must be able to effectively manage conflict. Wherever two or more people come together, there is bound to be conflict. This overview will give participants a seven-step conflict resolution process that they can use and modify to resolve conflict disputes of any size. Additionally, we will take attendees through a very simplistic, key point process to manage any heated situation. Dealing with conflict is important for every organization no matter what the size. If it is left unchecked or not resolved it can lead to lost production, absences, attrition, and even lawsuits.

    Key Objectives:
    •How to market internal audit inside any organization
    •How transparency and communication are the foundation to any affective marketing plan
    •Key roots of Conflict
    •Manage conflict of any size with a simple approach
  • Virtualization makes it possible to build and manage scalable, robust, resilient computing environments.
    Join EVault Cloud Disaster Recovery expert Peter Dyer as he explores how virtualization has revolutionized disaster recovery in the cloud. Peter will look at specific virtualization features, different techniques for providing disaster recovery, and the economic benefits associated with virtualization.
    You’ll learn how virtualization, as the foundation for DR in the cloud, can help businesses like yours find DR Utopia:
    1. Near-zero recovery point objectives (RPOs)
    2. Sub-one-hour recovery time objectives (RTOs)
    3. Guaranteed service levels (SLAs)
    4. Cost-effective data protection
    5. Operational resilience
  • Privacy is a highly debated subject due to the recent data breaches, NSA revelations and the critical EU regulatory process. Organizations are still struggling to become Privacy compliant against the Privacy legislation based on the current EU Data Protection Directive. Security controls are a critical component for this Privacy compliance process, but cannot achieve compliance entirely. On the other hand, strengthened Security solutions also increase Privacy risks (eg. ID usage, employee monitoring, biometrics, etc.).

    Please join Ronald Koorn, KPMG partner, to learn about the how to improve Privacy compliance by leveraging Security controls in the specification/design phase of projects and in key business processes.
  • Insecure database silos make protecting data challenging and costly. Increasingly organizations find that database consolidation and private cloud initiatives reduce complexity, risk, and drive down the cost of protecting data and meeting regulatory compliance. In this session, you will learn how to consolidate databases securely, address database security at the infrastructure level, and adopt a defense in depth strategy that includes the controls needed to safeguard your mission critical enterprise data.

Embed in website or blog