Hi {{ session.user.profile.firstName }}

Six Critical Elements to Ensure Pain-Free FISMA Compliance

Recorded Jan 21 2010 60 mins
Presented by
Michael Rasmussen, Corporate Integrity; Jeff Hughes & Steve Antone, Lumension
Presentation preview: Six Critical Elements to Ensure Pain-Free FISMA Compliance
Recommended for you:
  • Date
  • Rating
  • Views
  • According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
  • Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.

    He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.

    Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
  • Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
    Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
    Che benefici puoi ottenere con le appliance NetBackup di Veritas?
    Scoprilo partecipando al nostro Webcast del 7 ottobre.
  • The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.

    In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).

    After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
  • Comprenez ce qui s’est passé et rétablissez l’activité rapidement

    Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également

    Inscrivez-vous ici.

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • This webinar explores the best practices for distributing policies, determining when and how to provide education and how to build awareness campaigns. We often think that once a policy has been formally issued the job is done, but that is far from the truth. Properly communicating the policy is only the start.

    Attendees will learn the challenges, best practices, and benefits of a well thought out policy communication plan.
    Register now to join IT GRC industry expert, Michael Rasmussen as he discusses best practices in policy awareness and communication.
    Learning Objectives:
    - Define the key parts of a policy communication plan
    - Identify methods for tracking and delivering training and attestations
    - Determine ways to enable employee access to policies and related materials
    - The role of training and education
    - The policy portal – delivering an interactive employee experience for policy management
    - Getting employee questions answered
    - Attestations, read and understood, certifications
    - How technology enables employee engagement on policy
  • We caught up with F-Secure's Mikko Hyppoen to get his thoughts on the ever-relevant Privacy vs. Security debate.

    Mikko discussed the sensitive equilibrium required to protect data and ensure it's privacy; the influence that the EU's Safe Harbour ruling will have and how security should be the responsibility of all, not just the government.

    He also gave his one key piece of advice for keeping your data private and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Six Critical Elements to Ensure Pain-Free FISMA Compliance
  • Live at: Jan 21 2010 6:00 pm
  • Presented by: Michael Rasmussen, Corporate Integrity; Jeff Hughes & Steve Antone, Lumension
  • From:
Your email has been sent.
or close
You must be logged in to email this