IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.

Webinars and videos

  • Every application, email, web page and Internet connection relies on information encapsulated into a data packet that can be easily distributed across networks. These packets include information about the sender and receiver, as well as the actual contents, or payload. By manipulating pieces of the packet data, criminals can infiltrate networks, applications, data centers, and individual computers.
    How do you defend your network against advanced threats that manipulate data at the packet level? Join McAfee for a revealing presentation on the current state of threat prevention. Find out why you should be using deep packet inspection (DPI) for protocol identification, normalization, and data stream-based inspection to detect and block threats, in both clear-text and encrypted connections. And stop Advanced Persistent Threats (ATP) that rely on packet manipulation to thwart most common firewall and IPS defenses.
  • Next generation endpoint security. Security and Management beneath the operating system.
  • Nos puissantes solutions de gestion des événements et des informations de sécurité (SIEM) associent des données sur les événements, les menaces et les risques pour offrir une connaissance approfondie de l'état de la sécurité, une réponse rapide aux incidents, une gestion transparente des journaux ainsi qu'une fonction de génération de rapports de conformité extensible. Produit phare de notre offre SIEM, McAfee Enterprise Security Manager assure la consolidation, la corrélation, l'évaluation et la hiérarchisation des événements de sécurité pour les solutions McAfee et d'autres éditeurs. Composant essentiel de notre cadre d'implémentation Security Connected, McAfee Enterprise Security Manager s'intègre en toute transparence avec le logiciel McAfee ePolicy Orchestrator (McAfee ePO), McAfee Risk Advisor et Global Threat Intelligence afin de fournir le contexte nécessaire à une gestion des risques de sécurité autonome et adaptatif.
  • As additional details on the Target breach - and other retail attacks - leak out, we see that Point of Sale (POS) malware continues to be a significant threat. There are several attack methodologies at play and many forms of new malware, including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer and others. All continue to compromise organizations large and small. In this webinar, Curt Wilson, Senior Research Analyst for Arbor's Security Engineering and Response Team (ASERT) will explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.

    Additionally, this talk will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including ecommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.

    Attend this webinar to learn about:

    • The various types of POS malware threats and the implications of experiencing an attack

    • The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks

    • Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
  • Businesses in the Financial Services sector are some of the most obvious targets for cyber-attacks. After all, “that’s where the money is.”

    And recent technological advances have brought about the dark side of innovation – the ability of criminals to stealthily attack users and businesses in new ways. Hence, financial institutions around the world are even more at risk to breaches and cyber-attacks than ever before. Are financial institutions in Asia Pacific ready for these threats? What are the areas that financial services should look into for continuous threat protection?

    Bryce Boland will touch on these issues in this webcast; bringing insights from his experience as a former Security CTO in the financial sector.

    Topics that will be covered are:

    1.The Dark Side of Innovation
    2.Recent FSI breaches
    3.Enterprise Threat Report on FSI
    4.FSI Supply Chain Risks
    5.Managing Advanced Threats
    6.Questions & Answers

    This webinar is for both business and IT professionals, interested to have a better understanding of the current state of cyber risks in the financial sector, and how to manage these risks.
  • Join this webinar on Endpoint Security as we:
    •Understand what AMT-enabled hardware offers
    •Hear how AMT hardware can improve our ability to manage an endpoint
    •Highlight important use cases that are enabled when management extends beyond the operating system
    •Discuss how ePO can be used to easily configure AMT
  • Envisioning how mobility will transform your business in the near future and beyond can be difficult, however there are practical strategies you can adopt today that will help accelerate your mobility transformation.

    Join Arun Bhattacharya, Sr. Director, Product Marketing, Enterprise Mobility, CA Technologies as he discusses the core tenants of a successful enterprise mobility strategy and provides practical guidance for business and IT Leaders on how to manage their businesses’ mobile future.
  • The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Aaron Landgraf, Product Marketing, MuleSoft and DJ Deng, Enterprise Mobility Leader, Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • McAfee Drive Encryption version 7.1 with new and enhanced features for: User Directory, Hardening your Modern Windows Systems from Cold Boot Attacks, TPM Auto Boot, McAfee Endpoint Assistant companion app for iOS and Android and many more.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Aaron Landgraf, Product Marketing, MuleSoft and DJ Deng, Enterprise Mobility Leader, Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • Whether your company is large, small or somewhere in between, business systems, applications and third-party IT services often require significant corporate investments in effort and cost. But because these purchases are infrequent and technology evolves so quickly, many approach these projects with trepidation and employ a myriad of resources to aid in their decision. Although every situation is different, there are some basic actions that every company can take to effectively prepare to choose the options that best meet their needs.

    Whether you are trying to rationalize the continued use of a current tool, identify a new tool to deploy or select a third- party vendor to serve your needs, this webinar will provide you with a helpful roadmap! By utilizing a proven, systemic and phased approach, any size decision can become more objective and manageable – and place more responsibility on prospective vendors to “prove” they are the right choice for your company’s unique requirements.

    By attending this webinar, participants will:
    • Understand the steps of systemically conducting a business application and / or third-party vendor selection assessment in the following phases:
    - Preparation
    - Selection
    - Post-Selection (Implementation Planning)
    • Quantify the benefits of a methodical and objective process
    • Review “Lessons Learned” in order to avoid process pitfall
  • *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on June 24-26*

    2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.

    As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
    The need to protect private information being communicated by email between customers, prospects, patients, loan applicants, and clients is now the norm. Unfortunately, many enterprise email solutions are several years old and using outdated and ineffective security technology.

    This session will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security. Hear from two email security experts and learn:

    - Best practices for securing sensitive email communications.
    - When is the right time to replace your legacy email security.
    - How to protect sensitive email information as it flows to and from the enterprise.
    - Latest insights on Identity-Based Encryption and Stateless Key Management.
    - How other enterprises deploy the world’s most popular email security solution.
    - How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.
  • According to CIO Insight, 43% of IT executives believe a failure to integrate with legacy systems is the biggest perceived barrier to future mobile initiatives. These legacy systems contain a tremendous amount of business data and processes that don’t easily align with emerging technologies, specifically mobile devices. In this webinar, Aaron Landgraf, Product Marketer at MuleSoft and DJ Deng, leader of the Enterprise Mobility practice at Pactera will outline a strategy for how to unlock legacy investments to deliver world-class mobile experiences.
  • 评估或实施主数据管理(MDM)技术可谓是一项艰巨的工作。MDM的道路上充满了成功和失败。尽管一些公司已经在项目每一阶段成功实施MDM,但很多公司都在经历了痛苦的初步实施之后,将主数据技术束之高阁。怎样做才能保证成功?与普通MDM相比,一流的MDM技术具备哪些能力?如何计划实施细节从而避免项目失败?

    成功的企业做了两件事:(1)在MDM技术评估阶段,确保所评估的MDM技术能够满足企业的需求;(2)从团队成员选择到建立项目里程碑及建立数据治理整个过程中,都参照最佳实践。

    在本次研讨会中,您将了解:
    • MDM技术的十个最佳实践,确保成功
    • 来自成功MDM客户的六大最佳实施经验
    • 应该注意并避免的雷区
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • In an increasingly connected world, your data gets around - often times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information

    Join the webinar on DLP and learn about:
    •The new cool features in the latest DLP release.
    •How to stay ahead of threats without guesswork or trial and error.
    •Use cases on leveraging the synergy between the different McAfee Data Protection technologies.

    Don't miss out the opportunity to hear from data protection experts on how to protect your data in the modern organization!
  • From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That’s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization.