Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία

Christos Ventouris, Information Security Specialist
Προσωπικά δεδομένα και πνευματική ιδιοκτησία στοχοποιούνται συνεχώς από εισβολείς προκειμένου να μετατρέψουν τις πληροφορίες σε κέρδος. Η νομοθεσία, στον Ευρωπαϊκό ορίζοντα, είναι κατακερματισμένη και καθόλου ομοιογενής. Σε αυτή την παρουσίαση θα περιγράψουμε την τρέχουσα κατάσταση στην Ευρώπη και στις ΗΠΑ καθώς και τι πρόκειται να συζητηθεί από τις Ευρωπαϊκές αρχές που θα καθοδηγήσουν τη μελλοντική ρύθμιση στην γεωγραφική περιοχή μας.EU and Data Protection: Future legislation outlook.
May 15 2012
32 mins
Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
security cloud
More from this community:

Cloud Computing

Webinars and videos

  • Live 5 and recorded (3239)
  • Upcoming (101)
  • Date
  • Rating
  • Views
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Join Tommy and Blain as they explore the entry point for provisioning open source servers on Microsoft’s Public Cloud services – Windows Azure. The same platform that runs on Hyper-V 2012 R2 with established performance with major workloads like Xbox Live, Bing, and Office 365. Check out Oracle on Windows or Linux, and WordPress sites all configurable within the Microsoft Datacenters. They’ll show you the VM DEPOT which is used for publishing Open Source packages as well as the VM Gallery for spinning up new virtual machines from templates(ours or yours!).
  • Join Tommy and Blain as they explore the entry point for provisioning open source servers on Microsoft’s Public Cloud services – Windows Azure. The same platform that runs on Hyper-V 2012 R2 with established performance with major workloads like Xbox Live, Bing, and Office 365. Check out Oracle on Windows or Linux, and WordPress sites all configurable within the Microsoft Datacenters. They’ll show you the VM DEPOT which is used for publishing Open Source packages as well as the VM Gallery for spinning up new virtual machines from templates(ours or yours!).
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Enterprises are realizing that the opportunity of data analytics is maximum when the data is fresh and represents the "current reality" of operations or customer experience. The business value of data dramatically falls with its age.

    As IT and line-of-business executives begin to operationalize Hadoop and MPP based batch Big Data analytics, it's time to prepare for the next wave of innovation in data processing.

    Join this webinar on analytics over real-time streaming data.

    You will learn about:
    •How business value is preserved and enhanced using Real-time Streaming Analytics with numerous use-cases in different industry verticals
    •Technical considerations for IT leaders and implementation teams looking to integrate Real-time Streaming Analytics into enterprise architecture roadmap
    •Recommendations for making Real-time Streaming Analytics – real – in your enterprise
    •Impetus StreamAnalytix – an enterprise ready platform for Real-time Streaming Analytics
  • To some, open source cloud computing and storage are inclusive, yet to others they can be exclusive of each other used for separate purposes. Likewise, some open source and cloud technologies, solutions and services are marketed as business enablers, yet are there technology concerns to be considered? On the other hand, the focus can be on the technology as an enabler, yet does it address business needs and concerns or become a barrier. The key to leveraging open source and cloud technologies is realizing what to use when, where, why and how, not to mention in new ways vs. simply as a replacement for doing things how they have been done in the past.

    Key themes:
    · What is your focus and why are you interested in Open Source and Cloud solutions
    · Software Defined Marketing vs. Software Defined Management and enablement
    · Balancing costs of for fee vs. for free (time, money, staffing, on-going support)
    · How to leverage hard products (hardware, software, valueware, services) to create your soft product (services)
    · Using various tools, technologies and solutions in hybrid ways
    · What are the major open source and cloud (computing and storage) solutions, technologies and services
    · Who is doing what and how you can leverage those activities
  • The foundation of success for any company is an outstanding customer experience, but we all know the journey toward creating an amazing service culture is a challenging one. While a great culture doesn’t happen overnight, it IS attainable (really!) with the right approach. Join Joel Daly, HOSTING’s COO, as he discusses HOSTING’s journey: the obstacles, the companies we admire, and the process we undertook to reach excellent service.
  • Questo è il primo episodio di una serie di webinar che illustreranno le diverse modalità in cui AWS viene utilizzato dai team di sviluppo agili. Tutti gli episodi faranno riferimento a una startup impegnata nell'apertura di una nuova area di business, illustrando i vantaggi offerti dall'utilizzo di AWS. La startup puo' essere una nuova realtà o un centro di innovazione all'interno di una azienda esistente, ad esempio per seguire il lancio di un nuovo prodotto.

    In questo episodio vengono descritti i principali vantaggi di AWS per le startup e i team IT agili, soffermandosi su come il team abbia sviluppato rapidamente un prototipo funzionante utilizzando i diversi servizi offerti dalla piattaforma.
  • Openstack has been gaining momentum in the IaaS space for some time now. It is a great example of Open Source collaboration and many contributors (more than 15,000!) coming together to make new technology.

    Often, large vendors and the organisations that represent them are seen as incompatible with the Open Source model, particularly in the storage arena. Big Tin is not required.

    In this presentation Glyn Bowden will show what SNIA can offer the Open Source community, the importance of standards and where SNIA are already contributing.
  • Channel
  • Channel profile
Up Down
  • Symantec Internet Security Threat Report (ISTR) 2014 May 16 2014 9:00 am UTC 60 mins
    En 2013, les attaques de sécurité ont été encore plus complexes. Même si le focus reste sur les attaques ciblées (en augmentation de 91%), la cybercriminalité est malheureusement toujours d’actualité pour les entreprises, les cybercriminels ayant mené les attaques les plus préjudiciables jamais enregistrées (+ 62% de violation de données).

    Pour en savoir plus, inscrivez-vous à ce webcast. Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France du Symantec Internet Security Threat Report, rapport annuel sur les menaces et tendances de sécurité concocté par nos analystes du Symantec™ Global Intelligence Network.
  • Nuevo Symantec Internet Security Threat Report (ISTR) 2014 May 14 2014 8:00 am UTC 75 mins
    Cada año Symantec ofrece una presentación del Informe de Symantec sobre Amenazas a la Seguridad en Internet, no se lo pierda este año.

    El informe sobre amenazas a la seguridad en Internet ofrece un análisis y los aspectos generales de la actividad mundial anual de las amenazas. El informe se basa en los datos recopilados por la Global Intelligence Network, utilizados por los analistas de Symantec para identificar, analizar y ofrecer comentarios sobre las tendencias emergentes en ataques, actividad de códigos maliciosos, phishing y spam.

    Registrese ahora al Webcast para conocer de primera mano los resultados y ultimas tendencias que pueden afectar a las medidas a adoptar y a considerar en sus entornos.

    Conectese para que se lo explique el experto de symantec en directo y pueda hacer las preguntas que desee.
  • Symantec Internet Security Threat Report (ISTR) avslöjar May 13 2014 8:00 am UTC 75 mins
    2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 8 2014 8:00 am UTC 75 mins
    Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 12:00 pm UTC 75 mins
    Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 8:00 am UTC 60 mins
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Cyber: The Catalyst to Transforming your Security Programme Recorded: Apr 2 2014 47 mins
    1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Partner with an information security leader for your email security. Recorded: Jul 17 2013 35 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries. Spam, phishing, and malware data is captured through a variety of sources. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers.
    This intelligence enables us to build protection technologies that can be leveraged across our products to ensure that we protect all of our customers’ people and information.
    In this webcast we will highlight some of the latest Internet attack trends and explain why you should partner with an information security leader for your email security.
  • Is cloud security right for your business? Recorded: Jul 16 2013 37 mins
    Symantec provides email and web security as a virtual appliance, a hardware appliance or a cloud service. We have expertise in all deployment platforms so, rather than driving you to purchase a specific product, we can help you determine which is best for you.
    During this 30 minute webcast we will help you to understand what questions you should be asking yourself to determine whether a move to the cloud is the right move for your business.
  • Symantec Cyber Week: La Protezione dei sistemi critici Recorded: Jun 27 2013 60 mins
    Perchè i Server? La Protezione dei sistemi critici
    La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la conformità è l’unico strumento per per ridurre il rischio in caso di attacco
    In questo webcast approfondiremo i vantaggi delle soluzione end point protection ed anche di server hardening
    Partecipa a questo webcast per pianificare al meglio la tua politica di Cyber Security.
  • Symantec Cyber Week: Le politiche di controllo Recorded: Jun 21 2013 39 mins
    Le politiche di controllo servono? Quali?
    Non pensare ad una politica di controllo, compreso il monitoraggio delle vulnerabilità, della correlazione degli eventi di sicurezza, e delle procedure di risposta in caso di attacco rende inefficaci gli investimenti fatti in sicurezza
    Se si vuole davvero ridurre il rischio di un attacco informatico, ogni organizzazzione deve monitorare lo stato della propria sicurezza con il corrispettivo rischio, deve avere una fonte di intelligence per una visibilità su cosa stia accadendo in tempo reale
    Partecipa a questo webcast per valutare quanto un’attività di intelligence sia utile realmente al tuo business.
  • Hardening de serveur ou comment diminuer rapidement vos risques Recorded: Jun 21 2013 42 mins
    De par la nature des informations que les serveurs hébergent, les services pour lesquels ils sont configurés, leurs contraintes d’accessibilité, il est temps de repenser la sécurité des serveurs et leur mise en conformité pour limiter les risques en cas d’attaque. Faites le point avec nos experts et découvrez les solutions adaptées à ces problématiques spécifiques.
  • Symantec Cyber Week: La Protezione degi End Point Recorded: Jun 20 2013 41 mins
    Gli End Point: tutto quello che devi sapere per proteggerli
    La sicurezza nel suo punto cardine: contrastare il malware e proteggere i dati
    Non è una novità che i codici malevoli siano ogni giorno sempre più complessi. Un partner come Symantec sa come pianificare una strategia di difesa. Da una soluzione fondamentale come Symantec EndPoint Protection alle funzionalià di crittografia, per una protezione del dato a tutto tondo
    Partecipa a questo webcast; scopri cosa ti da di più Symantec.
  • Symantec Cyber Week: Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH Recorded: Jun 18 2013 37 mins
    Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH
    Per proteggere le aziende da attacchi informatici, è importante capire come operano gli attacanti. Questo webcast descrive l’anatomia di un attacco nelle sue 5 fasi: Reconnaissance, Incursion, Discovery, Capture ed Exfiltration
    Verranno inoltre analizzate le principali tecniche impiegate e le soluzioni per prevenirle e/o contrastarle oltre al relativo impatto sul business (rilevato dalla ricerca “Cost of a Data Breach 2013”)
    Partecipa a questo webcast per vedere come si sono evolute le cyber minacce e come stanno influenzando le realtà produttive.
  • Symantec Cyber Week: Cosa sta DAVVERO succedendo? Il Security Threat Report Recorded: Jun 17 2013 45 mins
    Cosa sta DAVVERO succedendo? Il Security Threat Report
    Il Security Threat Report fornisce una panoramica e un'analisi di attività delle minacce a livello mondiale nel 2012. Dai dati della Global Intelligence Network, esperti di Symantec analizzano le tendenze emergenti negli attacchi, nelle vulnerabilità e negli obiettivi.
    Inoltre, l’ultima ricerca “Cost of a Data Breach Report 2013” traccerà gli impatti economici per le organizzazioni nel caso di attacchi informatici
    Partecipa a questo webcast per avere un aggiornamento sul panorama delle minacce e della sicurezza nel 2013 e sulle conseguenze nel business.
  • Supervision pour une cyber vision Recorded: Jun 14 2013 40 mins
    Pour limiter les risques d’une cyber-attaque, la politique de sécurité doit comprendre la mise en place d’une politique de supervision incluant la surveillance des vulnérabilités, la corrélation des événements de sécurité, les procédures de réponse en cas d’attaque… Lors de ce webcast, nous vous invitons à faire le point sur les solutions de SOC, SSIEM, Services Managés et leurs bénéfices.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • Transformational smart cities: cyber security and resilience 10:00 BST/11:00 CET Recorded: Jun 11 2013 52 mins
    Smart cities are on the increase worldwide, and especially within Europe there are many initiatives stimulated by the EC and the national governments. Local administrators and policy makers will be increasingly driven to make their cities competitive in order to attract businesses, talent and taxpayers, and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.
    Smart city deployments will involve multi-faceted developments, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology including critical and complex ICT implementations.
    Choosing reputable, experienced thought leaders as partners in conceiving such complex developments is an important step in the right direction towards building resilient smart cities for the twenty-first century.

    Attend our webcast to learn more!
  • Les 5 étapes d’une cyber-attaque Recorded: Jun 7 2013 33 mins
    Afin de protéger votre entreprise des cyber-attaques, il est important de comprendre comment les attaquants opèrent. Lors de ce webcast, nous vous proposons d’analyser les 5 phases d’une attaque (reconnaissance, incursion, découverte, capture, exfiltration), les principales techniques employées, ainsi que les solutions adaptées à chaque phase.
  • Mobile Threats (Internet Security Threat Report) Recorded: Jun 6 2013 60 mins
    Did you know that 32% of mobile malware is aimed at stealing information?
    The rapid increase in mobile working, the demand for higher levels of productivity and the growing trend of Bring Your Own Device puts you under new pressure, and exposes your critical business data to additional risk.
    Learn how solutions for enterprise mobility from Symantec can help you to enable, manage and secure mobile endpoints, apps and data.
    By attending our webinar we'll show you how the solutions for enterprise mobility protect business- critical data and apps – wherever they are accessed, whatever the smartphone, tablet or other device.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ευρωπαϊκή Ένωση και Προστασία Δεδομένων – Προοπτικές στην Νομοθεσία
  • Live at: May 15 2012 8:00 am
  • Presented by: Christos Ventouris, Information Security Specialist
  • From:
Your email has been sent.
or close
You must be logged in to email this