Browse communities
Browse communities
Presenting a webinar?

Information Management – Preserve or Perish; Destroy or Drown

Robert Brownstone; Law & Technology Director; Fenwick & West LLP
Information-Risk-Management (IRM) – Policies and Protocols Maximizing Preparedness for eDiscovery and Litigation

o Proactive day-to-day electronic information management (EIM) should address:

· retention/destruction policies and regimes;

· litigation-hold protocol;

· technology-acceptable-use (and lack of employee privacy) policies; and

· separation policies and checklists for departing employees.

o Then, on an ad hoc basis, when an organization is forced into reactive mode, it can many reap significant benefits, including”

· reduced risk of civil liability and criminal exposure;

· reduced expenses;

· minimized burden and stress on management;

· defensible, “real” policies, tethered to adequate employee education as well as in-the-trenches realities of the IT environment;

· improved information-security (via data encryption, metadata-scrubbing, appropriate electronic-redaction and employee sophistication, etc.);

· more efficient operations and data collections; and

· quicker analyses/assessments in incident-response situations, lawsuits and regulatory/enforcement requests.
Aug 27 2009
49 mins
Information Management – Preserve or Perish; Destroy or Drown
  • Channel
  • Channel profile
  • Optimize Customer Signup Flows Online and in Your Mobile App Apr 9 2015 4:00 pm UTC 45 mins
    Chris Morton, President, Block Score; Lisa Aguilar, Marketing Manager, Jumio; James Bickers, Senior Editor,Networld Medi
    In today’s online and mobile environment, financial service organizations are struggling to comply with a multitude of regulatory requirements that impede online and mobile customer signups. What is the best way to signup customers while still complying with regulations and mitigating fraud?

    Join us for a live webinar, “Optimizing customer signup flows in your mobile and web channels” and listen in as experts in ID authentication and identity verification discuss various strategies that will help you:

    · Quickly and safely signup customers through your mobile and online channels
    · Remain compliant with regulatory requirements without adding additional operational overhead
    · Reduce customer sign-up abandonment

    Don’t loose another customer because you can’t offer a real-time sign-up process through your online and mobile channels. Join us and learn how to optimize your sign-up flows, and enable anytime, anywhere through any digital channel customer account opening.
  • Looking Forward to HIMSS 2015: What are the latest trends? Apr 8 2015 5:00 pm UTC 60 mins
    Lysa Myers, Security Researcher III, ESET North America
    ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • How Mobile Data Protection Can Accelerate Top CIO Initiatives Apr 8 2015 4:00 pm UTC 60 mins
    Dave Packer, Director of Product Marketing & Seyi Verma, Sr. Product Marketing Manager
    The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection Apr 8 2015 4:00 pm UTC 75 mins
    Joe Weiss, Managing Director for ISA99; William Cotter, Systems Engineering Specialist; Delfin Rodillas, Sr. Manager of SCADA
    The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety. Patch management is one particular area of cybersecurity which requires special attention when applied to ICS. It is part of a comprehensive cybersecurity strategy that increases cybersecurity through the installation of patches that resolve bugs, operability, reliability, and cyber security vulnerabilities. The ISA-TR62443‑2‑3 technical report, developed by the ISA 99 Working Group 6, addresses the patch management aspect of ICS cyber security. Also part of an effective strategy is the use of compensating cybersecurity controls to protect ICS systems from exploits and malware in between often long patching cycles. Novel network and host based technologies have recently become available to address even zero-day threats which bypass conventional signature-based approaches.

    Attendees of this webinar will leave with a better understanding of:
    -The unique aspects of ICS that entail a different and more rigorous approach to patch management than that used in business networks
    - An overview of the ISA 99 standards efforts with detail review of the main aspects of the ISA-TR62443-2-3 Technical Report on Patch Management in IACS
    - Advancements in compensating cybersecurity controls for protecting systems from zero-day threats
  • Why DDoS Makes for Risky Business – And What You Can Do About It Apr 8 2015 3:00 pm UTC 60 mins
    Dave Shackleford, IANS Lead Faculty and Tom Bienkowski, Director of Product Marketing
    Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.

    It’s time to debunk some misconceptions about DDoS.

    Attend this webinar to learn:

    - Why a single layer of DDoS protection isn’t enough
    - How the impact of a DDoS attack is significantly more costly than protection options
    - The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
  • Your organization has been breached, now what? Mar 31 2015 5:00 pm UTC 45 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • UTM + USM: All you need for complete Threat Management Mar 31 2015 4:00 pm UTC 45 mins
    Patrick Bedwell, AlienVault; Neil Matz, Fortinet
    Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • Bridging the Trust Gap for Identity Services Based Market Growth Mar 30 2015 4:00 pm UTC 45 mins
    Joni Brennan, Executive Director, Kantara Initiative
    In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • Insights From CyberEdge’s 2015 Cyberthreat Defense Report Recorded: Mar 27 2015 44 mins
    Steve, CEO, CyberEdge Group
    CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • A Zero-Day Agnostic Approach to Defending Against Advanced Threats Recorded: Mar 26 2015 51 mins
    Eric Hanselman, Chief Analyst, 451 Research & Dave Karp, VP Technical Enablement, Digital Guardian
    As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • New Attack Intelligence Capabilities Coming Soon - Get a Sneak Peek! Recorded: Mar 26 2015 48 mins
    Todd Harris, Director of Product Marketing; Ray Suarez, Director of Product Management, Core Security
    Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • See something say something: A humanistic approach to security intelligence Recorded: Mar 26 2015 25 mins
    Ronnie Tokazowski, Senior Researcher and Shyaam Sundhar, Senior Researcher, PhishMe
    Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • From the SOC to the BOD: The Board’s Role in Cyber Security Recorded: Mar 26 2015 48 mins
    Donna Dabney, Executive Director of The Conference Board Governance Center; Bill Ide, Partner at McKenna Long & Aldridge
    As major breaches cause financial and reputational damage to businesses across all industries, there is a push for cyber security to become a board level issue. A recent survey from BDO International found 59% of board directors have become more involved in cyber security within the past twelve months. But how can board members unfamiliar with the ins and outs of network security effectively manage these risks?

    Join BitSight’s VP of Business Development, Jacob Olcott, Partner at McKenna Long & Aldridge, Bill Ide and the Executive Director of The Conference Board Governance Center, Donna Dabney on Thursday, March 26 at 11:00am EDT for an online roundtable discussion on board involvement in cyber security. The panelists will discuss how both security leaders and board members should approach the communication and management of cyber risks in the enterprise.

    Attendees will also learn:

    - What cyber security metrics are most important for the board
    - Methods for security leaders to communicate cyber issues across the enterprise
    - How BitSight’s platform enables communication on security performance throughout the enterprise
  • DNS Security: Safeguarding Your Online Presence Recorded: Mar 25 2015 19 mins
    Reynold Harbin, VP Product Management, Neustar; Rob O'Regan, Sr Digital Content Strategist, IDG Strategic Marketing Services
    Cyber security threats are persistent and constantly evolving. A vulnerable website puts a business’s reputation – not to mention its revenue – at risk. In this webcast, Reynold Harbin, VP of Product Management for Neustar, discusses exclusive new IDG research about DNS deployments, the importance of robust DNS security, and the best way to defend against a rising tide of threats.
  • Assessing Cloud Apps Risk Recorded: Mar 25 2015 27 mins
    Chris Hines, Product Marketing Manager, Bitglass
    Mirror mirror on the wall who's the riskiest of them all?

    It's no secret that companies are adopting cloud applications like Office 365, Google Apps, Dropbox and Salesforce to help improve their business. With the cost savings and increased scale and efficiency of the cloud, who could blame them? But what some companies tend to overlook is that there is a level of risk when it comes to each of these apps, and that it can differ based on each company's use case.

    Do you know what cloud applications are running in your infrastructure today? How about the ones putting your sensitive data at the most amount of risk? Do you have a way of finding out?

    In this webinar Chris Hines, Product Manager at Bitglass will teach you what's necessary when it comes to determining your company's riskiest cloud applications.
  • Content is Still King – How to Choose a Secure Collaboration Castle Recorded: Mar 25 2015 48 mins
    TJ Keitt, Senior Analyst, Forrester Research and Peter Brown, Director, Product Marketing, Intralinks
    The continued growth of the business networks that employees, partners and customers use to share information is driving the need for collaboration tools that are available beyond firewalls, on any device. With the cloud emerging as the preferred place for these technologies, and a crowded landscape of potential vendors, how can your organization make the right choice?

    Join Forrester Research Analyst TJ Keitt and Product Marketing Director Peter Brown of Intralinks as they review:

    - The emerging types of cloud collaboration technologies and the key considerations to think through
    - The inherent value in having a collaboration platform that connects people to information
    - How to align the organizational need to collaborate while keeping information secure at every touchpoint
  • How to Avoid Social Engineering Attacks Recorded: Mar 25 2015 39 mins
    Tyler Moffitt, Senior Threat Research Analyst, Webroot
    You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
  • BitSight Security Ratings Product Demo Recorded: Mar 24 2015 37 mins
    Mathew Cherian, Product Manager, BitSight
    BitSight Security Ratings are an automated, data-driven assessment of network security performance that are being used by leading organizations to:

    - Benchmark Security Performance: Measure the impact of your security program & communicate key performance metrics with the board.

    - Manage Third Party Cyber Risk: Continuously monitor security performance in third party networks and be alerted to potential security issues that put your information at risk.

    - Underwrite Cyber Insurance: Assess security performance of potential insureds to reduce underwriting risk.

    Join us to see how easily you can quantitatively monitor your security performance today.
  • Protection Against the Three Vectors of a Healthcare Cyberattack Recorded: Mar 23 2015 49 mins
    Ryan Witt, VP, Healthcare; Deena Thomchick, Director, Product Marketing
    The healthcare industry is undergoing a significant transformation in care provision. Increasingly, treatment is collaborative in nature thus relying on a distributed ecosystem to collect, transfer, and analyze vast amounts of clinical data. Unfortunately, the evolving nature of a digital health environment has also led to an unprecedented level of cyber-attacks. In order to successfully make this connected transformation, healthcare must be able to proactively secure patient data, devices and systems that make up the foundational technology infrastructure of patient care.

    Attend this webinar and learn how Fortinet solutions help solve the most pressing security needs of healthcare today. We will discuss industry leading solutions for securing the distributed healthcare environment, providing advanced threat protection for clinical data, and properly segmenting and securing internal networks and providing advanced threat protection.
  • FortiSandbox: The Almost Human Line Of Defense Recorded: Mar 20 2015 46 mins
    Paul Bowen, Architect, Fortinet
    If there is one thing hackers are after, it is, well everything! Your data, your customers data, the very lifeblood of your business and those you associate with. Advanced Persistent Threats or APT’s are constantly being adapted to get into your environments, and that is where the FortiSandBox or FSA stands out among the competition. A comprehensive strategy for the Enterprise, MSSP, and SMB business requirements alike, FSA combines multiple appliance capabilities into a single form factor making integration and configuration easy and effective.

    Fortinet is proud to present FortiSandBox: The Almost Human Line of Defense, a deep dive into the very best way to protect your organization, your partners and your customers from APT’s.

    - Learn how the FortiSandbox can scan file shares on Linux or Windows operating systems and sniff the wire @10GB for real-time protection

    - Discover the simplicity of integrating other Fortinet productions like NGFW, FortiMail and most SIEMS into the solution

    - Gain peace of mind, knowing your always on network is constantly being monitored and properly looking at every access point for what is malicious, what is suspicious and what is allowed access.

    Join Paul Bowen, architect for advanced threat solutions at Fortinet and discover why FortiSandbox is the APT’s worst nightmare and your best friend.

    Don’t miss FortiSandbox: The Almost Human Line of Defense.
trends, developments, and technology
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Information Management – Preserve or Perish; Destroy or Drown
  • Live at: Aug 27 2009 9:00 pm
  • Presented by: Robert Brownstone; Law & Technology Director; Fenwick & West LLP
  • From:
Your email has been sent.
or close
You must be logged in to email this