Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • Join Gemalto on April 29th to hear Stan Mesceda, Senior Product Manager at Gemalto give his expertise on data in motion and the importance of High Speed Encryption
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Webcast highlights include learning how to:

    - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

    - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)
  • In this webinar you will learn more about the AddressDoctor spring release 5.7.0:

    •Improved Coverage of Business Names and Addresses in the United Kingdom
    •Building-Level Rooftop Geocoding for United Kingdom
    •Ability to Retrieve UPRN as Enrichment for United Kingdom Addresses
    •Ability to Retrieve Province ISO Codes in Batch, Interactive, and Fast Completion Results
    •Multi-Language support for localities in Switzerland
    •Ability to Retrieve NIS Code as Enrichment for Belgium Addresses
    •New point geocoding feature for Australia
    •Ability to Remove Locality and Province Descriptors from China and Japan Addresses
    •Improved Parsing and Validation of India Addresses
    •Ability to Retrieve FIAS ID as Enrichment for Russia Addresses
    •Introduction of Cyrillic Script for Bulgaria Addresses
    •Ability to Validate Slovakia Addresses that Contain Street Name Abbreviations
  • Information is the lifeblood of any business. If the data required to operate and maintain market presence becomes inaccessible, compromised, or worse – unrecoverable, the business impact could be devastating. Learn about the existing and emerging risks to your critical data infrastructure and business operations. What mitigation strategies are available and what considerations do you need to assess? How does the changing landscape for consumption of IT such as cloud, on-premise, and hybrid solutions effect survivability and securitization of your prized assets?
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.

    However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.

    During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • In a world where your most sensitive business content is being shared with more people outside of your organization, you fear losing visibility and control. Join us for this special edition webinar to learn how Syncplicity extends your enterprise security polices to protect your sensitive documents as they move beyond your corporate boundaries, giving you back security, visibility, and control.