Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • In this webinar you will learn more about the AddressDoctor spring release 5.7.0:

    •Improved Coverage of Business Names and Addresses in the United Kingdom
    •Building-Level Rooftop Geocoding for United Kingdom
    •Ability to Retrieve UPRN as Enrichment for United Kingdom Addresses
    •Ability to Retrieve Province ISO Codes in Batch, Interactive, and Fast Completion Results
    •Multi-Language support for localities in Switzerland
    •Ability to Retrieve NIS Code as Enrichment for Belgium Addresses
    •New point geocoding feature for Australia
    •Ability to Remove Locality and Province Descriptors from China and Japan Addresses
    •Improved Parsing and Validation of India Addresses
    •Ability to Retrieve FIAS ID as Enrichment for Russia Addresses
    •Introduction of Cyrillic Script for Bulgaria Addresses
    •Ability to Validate Slovakia Addresses that Contain Street Name Abbreviations
  • Join Paul Roberts, editor of The Security Ledger, for this end-of-year discussion on how to create a culture of security within your security and development teams.
    •Veracode’s Chris Eng and Greg Nicastro each bring a unique point of view from their respective leadership roles – Security Research and DevOps.
    •Hear how their points of view come together to drive a culture of security into the product development and delivery cycle at Veracode.
    •Learn how you can forge your own path by adopting secure agile methodologies for product development.
  • Webcast highlights include learning how to:

    - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

    - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Set aside 30 minutes on Wednesday, April 29th as we explain in more detail how your data is vulnerable as it moves across data networks. During our session, "Surveillance: You ARE being watched" we’ll uncover security issues and risks, as well as new features and affordable solutions.
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Does your company have a plan for responding to the next Heartbleed? These responses can be time-consuming and costly. Despite the fact that the vulnerability may be achieving mainstream awareness, enterprises need to balance responses against risk. Without a set of response guidelines in place, you could end up reacting rather than responding to the disclosure.
    During this webinar, Jessica Lavery, Rapid Response Process Manager, will outline the steps security and risk professionals can take to create a vulnerability response plan that minimizes risk and minimizes the impact to the organization.
    What you will learn:
    •The five steps to needed in a vulnerability response plan
    •How to create a vulnerability response program that reduces risk while minimizing the impact to the enterprise
    •How companies like Veracode think about vulnerability disclosures
    •Why we are seeing an increase in branded vulnerabilities
  • Please join us for a live Q&A session on Monday April 27th at 3:30pm AEST / 5:30pm NZST, with Steve Durbin, Managing Director of the Information Security Forum, on the ISF's Threat Horizon 2017 Report.

    Threat Horizon Report, released last month, is a detailed examination of potential current and future security threats facing organisations.

    Meticulously researched by the ISF, the report:
    •covers nine threats poised to overwhelm defences
    •identifies potentially significant business impacts
    •proposes actions that organisations can take to safeguard their reputation and wider business value

    Before the Q&A:

    •Read about the Threat Horizon Report in CIO Magazine: (http://www.cio.com/article/2898037/security0/9-biggest-information-security-threats-for-the-next-two-years.html#slide1)

    •Or view the BrightTalk Webinar: https://www.brighttalk.com/webcast/9923/140635

    •If you'd like, please send any questions you want to ask to Vicky Taylor, by Thursday April 23rd (vtaylor@shelde.com)

    Q&A Details:

    During the Q&A Session Steve will take any questions you have on the report and its findings.

    Date: Monday April 27th

    Time: 3:30pm to 4:15pm AEST / 5:30 - 6:15pm NZST
  • Data governance is a top strategic priority for financial institutions, and implementing a best-in-class framework requires investment in the right people, processes and technologies. FIMA, the Financial Information Management Association for reference data professionals, has compiled its first annual FIMA benchmarking report to further evaluate the challenges and opportunities present for optimizing a data governance strategy.
  • As Git gains in popularity and Subversion extends its features for enterprise development, the two often operate side-by-side. This session will outline the benefits of each system (centralized vs. distributed), and how to best support a hybrid deployment.
  • Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
    • Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
    • Deliver automated security across environments
    • Ease security deployment and management for lower cost of ownership
    • Automate security deployments while increasing protection for virtual environments.
  • Companies operating data center in areas prone to earthquakes need to take a systematic approach to quantifying and mitigating their risk. For several years, Molly managed disaster recovery planning for a large Southern California utility. During her tenure, she commissioned two "seismic audits" of three data centers located in the region. Through these studies, she was able to inform management about the level and probability of the risk of losing the use of all three locations following an earthquake. This presentation will describe the techniques used and the benefits the study brought.
  • Organizações de todos os setores estão investindo em Governança de dados para obter valor de seus dados e cumprir com as regulamentações da indústria: reduzir custos, aumentar as vendas e aumentar as margens de lucro.
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • Changing IT needs and complex infrastructures require flexible and dynamic solutions to help you transition your environment. The release of Symantec™ Backup Exec 15 is the perfect time for you to review your backup and recovery infrastructure to meet these changing demands. Whether you are an existing Backup Exec customer or not, now is the time to upgrade to a reliable choice; the leading-edge offering for virtual, physical and cloud platforms.

    Join us to understand how Backup Exec 15 provides the flexibility to protect confidently whatever your platform, technology or application need. Delivering the power to protect your information faster, restore what you need when you need it and the ease the time and burden of “doing backup.