Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • In a world where your most sensitive business content is being shared with more people outside of your organization, you fear losing visibility and control. Join us for this special edition webinar to learn how Syncplicity extends your enterprise security polices to protect your sensitive documents as they move beyond your corporate boundaries, giving you back security, visibility, and control.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.

    However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.

    During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Unlike hacktivists and cyberterrorists, who are motivated by promoting a cause or punishing an organization for some perceived wrong doing, cyber gangs’ motivations are more old-fashioned — money. While hacktivists and cyberterrorists use sophisticated, targeted attacks, cyber gangs target the path of least resistance and look for widespread vulnerabilities so they can breach more enterprises with less effort.

    Listen to the Get Inside the Minds of Cyber Gangs webinar to find out:

    -Why cyber gangs are so successful despite their unsophisticated methods

    -What enterprises can do to protect themselves from these damaging cyber gangs
  • Hot Topics and Key Takeaways from HIMSS15

    If you didn't make it to the HIMSS15 healthcare IT conference, but want to hear about the hot topics and key takeaways from this year's many informative sessions, mark this webinar on your calendar to get up to speed! This year's event was full of new and innovative technology solutions for the healthcare industry.

    Naveen Sarabu, Product Manager for Liaison Healthcare, was there and will be sharing some of the new trends and technologies he saw for the following hot topics:

    Data interoperability
    Population health
    Provider & patient engagement
    Health Information Exchange
    Clinical & business intelligence
    Changing payment models
    Mobile, connected health & telehealth
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • In this webinar you will learn more about the AddressDoctor spring release 5.7.0:

    •Improved Coverage of Business Names and Addresses in the United Kingdom
    •Building-Level Rooftop Geocoding for United Kingdom
    •Ability to Retrieve UPRN as Enrichment for United Kingdom Addresses
    •Ability to Retrieve Province ISO Codes in Batch, Interactive, and Fast Completion Results
    •Multi-Language support for localities in Switzerland
    •Ability to Retrieve NIS Code as Enrichment for Belgium Addresses
    •New point geocoding feature for Australia
    •Ability to Remove Locality and Province Descriptors from China and Japan Addresses
    •Improved Parsing and Validation of India Addresses
    •Ability to Retrieve FIAS ID as Enrichment for Russia Addresses
    •Introduction of Cyrillic Script for Bulgaria Addresses
    •Ability to Validate Slovakia Addresses that Contain Street Name Abbreviations
  • An Eyes-Wide-Open Approach to Cyber Security

    The last thing any organization wants is its name in a headline due to a cyber-breach. With cyber-crime on the rise, how do organizations ensure that they have their eyes open to the ever-changing threat landscape and that they’re taking the best steps to mitigate risk before a breach occurs?

    Watch this in-depth webcast to learn how the proactive measures of incident management benefit organizations more than reactive incident response alone. You’ll learn:

    - Why investing in preparation up front is more valuable than investing after a breach occurs
    - The key people, process and technology components of an effective incident management program
    - The difference between the wise way and the risky way to manage an incident, through real examples
    - How the evolution to proactive services will improve your security framework
  • Join Paul Roberts, editor of The Security Ledger, for this end-of-year discussion on how to create a culture of security within your security and development teams.
    •Veracode’s Chris Eng and Greg Nicastro each bring a unique point of view from their respective leadership roles – Security Research and DevOps.
    •Hear how their points of view come together to drive a culture of security into the product development and delivery cycle at Veracode.
    •Learn how you can forge your own path by adopting secure agile methodologies for product development.
  • Webcast highlights include learning how to:

    - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

    - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)
  • Join Gemalto on April 29th to hear Stan Mesceda, Senior Product Manager at Gemalto give his expertise on data in motion and the importance of High Speed Encryption
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks