Hi [[ session.user.profile.firstName ]]

IT Security Pro

  • Date
  • Rating
  • Views
  • Understanding the real cost of data breaches
    Understanding the real cost of data breaches
    Pfr. John Walker, Nottingham Trent Uni.; Robert Bond, Speechly Bircham LLP; Mick Paddington, Trend Micro Recorded: Nov 21 2013 71 mins
    In October the European Parliament voted on the new Data Protection Directive - with approval for fines to be raised from 2pc to 5pc of global turnover...

    Put simply - if you suffer a data breach, and it's down to you or your staff's negligence, not only will your brand reputation suffer, but your annual profits could disappear in financial penalties. And that is before we factor in legal action from clients and customers...

    Do we have your attention yet?

    Are you worried?

    You are not alone!

    This Webinar can help - our panel of legal and commercial specialists will explain the challenges that lie ahead for UK PLC on the data protection front - and the strategy and solutions needed to robustly counter the tightened legislative landscape - and still come up smelling of roses...

    Join IT Security Pro for what promises to be a ground-breaking and thought-provoking set of presentations - as well a panel-led Q&A session in which you will have the chance the questions that matter to you - and your business - to our team.

    Can you afford not to attend this 60-minute event?

    Or do you really want to risk your annual profits?

    Please register here...
  • Windows XP: End of Life - are YOU ready?
    Windows XP: End of Life - are YOU ready?
    Clive Longbottom, Quocirca; Shane Columbo, affini; Peeush Bajpai, Kaseya Recorded: Oct 10 2013 73 mins
    April 8, 2014 is a red-letter day in the IT industry - it's then that Windows XP support ceases.

    And are the cybercriminals aware of this? They most certainly are - and reports suggest they are `saving' some of their most intense attack vectors up for next spring.

    So what are you doing about this? Do you have a Windows XP migration master plan in place?

    This Webinar can help. Our panel of experts will explain:

    How to plan - and undertake - an effective risk analysis process and ascertain exposure within your IT estate...

    How to analyse your organisation readiness for migration from WinXP

    What their organisation is doing to meet this challenge...

    How to plan for the worst - and rise above the challenges...

    Why effective migration strategy and planning can avoid a fire-fighting scenario...

    How to undertake en-mass WinXP upgrade in your IT-estate - without disrupting the business and users...


    We'll also have a live and interactive Q&A/panel discussion during which YOU will get the change to pose YOUR questions directly to our panel of experts...

    Please register for one of the key Webinars of 2013...
  • Enterprise File Sharing:  Protecting Your Digital Assets
    Enterprise File Sharing: Protecting Your Digital Assets
    Prof. John Walker, Ascot Barclay; Neil Hare-Brown, Blackthorn: Dave Butcher, Axway Recorded: Sep 17 2013 77 mins
    Enterprise File Sharing: Protecting Your Digital Assets


    One of the biggest challenges facing modern security professionals is the issue of secure file sharing, especially against the backdrop of attractive and free - yet highly insecure - consumer-grade file-sharing services available on the Web.

    Moving data outside of the company's direct control, no matter how cost-effective it might initially appear, is a definite no-no - especially data that must abide by the plethora of regulatory and best practice rules such as Basel III, the Companies Act, PCI DSS, Sarbanes-Oxley et al.

    The solution to these challenges is a highly secure business data sharing service that meets - and exceeds - the demands of these regulations, and also allows embedded policy controls.

    This Webinar can help - our panel of experts will look at the key challenges, and solutions to those challenges. Along the way, you'll hear about:


    How to create an effective data governance strategy...

    The need to encrypt data in transit - and at rest - to ensure full security and file fidelity...

    Security services such as an embedded policy engine to the need for full content inspection and policy enforcement...

    How `plug and play' can be a reality - even in a highly controlled file-sharing schema...

    The growing requirement to integrate with Active Directory/LDAP technologies...


    Register today for a unique opportunity to better understand this key security issue.
  • Virtualisation Security under the microscope
    Virtualisation Security under the microscope
    Rob Bamforth, Quocirca; Brian Shorten, CSF; Giovanni Alberici, Trend Micro EMEA Recorded: Jun 25 2013 65 mins
    Virtualisation has come a very long way in a very short space of time - and is even starting to enter the IT consciousness as a concept, in much the same way as Google has entered the general population's vocabulary...

    But virtualisation brings with it new challenges, not in the least when it comes to IT security. Can you be completely confident that your virtual infrastructure is secure?

    A new study into virtualisation practices across organisations in the UK has revealed that many companies are struggling to secure ever more complex IT infrastructures and that:

    Virtualisation is a major contributor to increased complexity...

    The majority of organisations felt the need to update their security model because of virtualisation...

    Two thirds have experienced a data breach - and only half were discovered by security tools...

    Almost all organisations are concerned that they will be victim to a security breach in the future...

    There is a worrying disconnect between those responsible for IT security and the data centre...


    Join us for an informative and entertaining Webinar when you will hear the full results of the study - and learn how best practice is the best way forward in ensuring that your organisation avoids the same pitfalls.
  • Understanding the End Point Governance Challenge
    Understanding the End Point Governance Challenge
    Sean Pollonais, Security Analyst; Richard Hollis, Risk Factory; Peeush Bajpai, Kaseya Recorded: Jun 20 2013 81 mins
    Securely governing the all your end points all of the time - and also proving compliance to the required audit and regulatory standards - has become a major IT security challenge, especially against an increasingly pro-active regulatory landscape.

    Security automation is often mentioned as the ideal solution to this challenge - but where do you begin? And even if you have an automated system in place, the system itself still needs reviewing on a regular basis.

    Technology may be a driver, but planning - as any IT professional will confirm - is everything.

    This Webinar can help - in the space of 60 minutes we will help you understand:


    How to harness the required technology and reporting tools to achieve compliance...

    Why the compliance landscape is getting more complex - and what challenges this creates...

    How automation software can generate its own cost efficiencies...

    Why automated reporting will ease your network admin burden...


    Along the way our panel of leading experts will explained how using automated security can assist you in achieving a higher level of confidence when it comes to the reliability and validity of your data.

    You could spend time, money and resources learning the hard way - or you could invest a little of your time to learn how to spend those resources more efficiently, and so gain an understanding of why the audit and governance landscape is changing...
  • Big Data: intelligence on tap - but who is tapping in?
    Big Data: intelligence on tap - but who is tapping in?
    David Turner, CTO CANDDi; Damien O'Dwyer, Business Growth; George Anderson, Webroot Recorded: Jun 6 2013 75 mins
    Big Data has become a key topic in a growing number of boardrooms - thanks to the fact that growing number of businesses are tapping into the almost-free marketing and allied information resources that your organisation's archival data offers.

    But along with the use of Big Data - which most companies produce, even if they are unaware of its power - comes the headache of securing that same data from prying eyes, as well as ensuring that only the correct people have access to the data they need.

    Just to make life interesting, some organisations are even storing their Big Data in the cloud.


    You need a primer to tell you:

    Where to start when tackling the governance challenge that Big Data presents...

    What Big Data is, what it can do, and how it fits into your IT framework...

    Detail the security and network analysis strategies you need to defend your Big Data...

    Educate you on the security challenges - and pitfalls - other organisations have experienced...

    Help you understand where to start when tackling the governance challenge that Big Data presents...


    This Webinar can help - ITSP and Webroot have assembled a panel of experts to answer these - and other key questions - which today's IT professionals are asking.
  • Raising your security bar: why automation of critical controls is so essential
    Raising your security bar: why automation of critical controls is so essential
    Sean Pollonais, Security Analyst; Peter Wood, First Base; Wolfgang Kandek, CTO Qualys Recorded: May 30 2013 79 mins
    Ensuring the confidentiality, integrity and availability of IT assets is now a central feature of effective security management, but - like many business requirements - it is usually easier said than done... This Webinar can help.

    In the space of 60 minutes we will give attendees a primer on the strategy needed to better your critical security controls.

    Along the way we will:

    Explain why automation is central to your critical security controls...
    Help you develop the required inventory and security configuration process...
    Assist you in planning the rigorous security automation your business needs...
    Educate you on the need for measured security risk...
    Detail the data recovery, pen testing and red team exercises required...

    This Webinar is for:

    C level security professionals wanting to raise their game...
    Audit and governance managers looking at automated risk analysis processes...
    Security professionals seeking to better their governance strategies...
    Any IT professional seeking a primer on automated critical controls...
  • It's a cyberheist - against your business!
    It's a cyberheist - against your business!
    Bob Tarzey, Quocirca; Rik Ferguson, Trend Micro; James Walker, Trend Micro Recorded: May 22 2013 83 mins
    Through the use of carefully planned and orchestrated targeted attacks, today's threat actors are seeking to monetise THEIR frauds with YOUR business data. It is clear that the dark science of cybercrime has become a danger for any business that does not have a proactive strategy in place, one specifically designed to protect against this new wave of sophisticated cyberheists.

    Countering these attacks - from cybercriminals, industrial espionage professionals and plain old fraudsters - is an imperative that can become crucial for the very future of your business.


    How do you defend yourself?

    This Webinar will assist you by...

    Explaining the nature and motivation behind the latest targeted attacks...

    Helping you understand the methodology employed by this new generation of threat actors...

    Assisting you in developing an effective strategy to counter the latest attack vectors...

    Allowing you to refine your security defence posture, both now and in the future...


    Targeted attacks are here to stay - make sure you're prepared
  • The evolution of cybercrime
    The evolution of cybercrime
    Peter Wood, CEO FIrst Base; Rolf von Roessing, ISACA; Grayson Milbourne, Webroot Recorded: May 8 2013 69 mins
    Cybercrime has come a long way in just a few decades - and along the way, has become a business, and a business that focused is monetising fraud against your organisation's data in all its various shapes and forms...

    And along with this evolution has come the arrival of hybrid and multi-vectored threat actors such as AETs and APTs - and IT professionals are sat in the middle of a constantly changing IT landscape, constantly looking for new approaches to defend the company gunnels against cybercriminals.

    This Webinar will give attendees a rundown on how the cybercrime landscape has changed over the last 25-years, as well as detailing the latest threats - and threat actors - that cause a growing number of IT security professionals more than a little angst.

    We'll also be looking at the latest strategies - and methodologies - with which you can better defend your organisation's IT and data resources.

    This online event will:


    Brief you on the latest cybercrime trends...

    Help you understand how the financial imperatives of cybercrime...

    Educate you on how to think like a cybercriminal - and work backwards to develop a more effective defensive strategy...

    Explain how effective data security is a state of mind...

    Assist you in getting more bang for your buck from security technology...
  • Meeting the Challenge of Advanced Persistent Threats
    Meeting the Challenge of Advanced Persistent Threats
    Tim Langley, CANDDi; Peter Wood, First Base Tech; Adrian Barrett, Exonar Recorded: Apr 16 2013 77 mins
    Cyber attacks sponsored by Nation States are on the rise. They have more executive visibility than any other security topic. With Big Data becoming a reality in modern businesses, - how do data security professionals meet the new challenge of defending ever growing volumes of information from the onslaught of advanced persistent attacks (APTs)?

    Join us for an interesting and thought-provoking Webinar in which we'll explore how Nation States steal information, what Big Data is, what challenges it creates for management and how it changes the business and IT data ballgame.

    Along the way you will...

    Understand how an APT attack avoids existing security
    Learn what Big Data is - and is not...
    Hear about the challenges Big Data creates for business and IT professionals alike...
    Develop a robust Big Data and APT defence strategy...
    Learn how to better defend the new data silos that Big Data creates...

Embed in website or blog