Browse communities
Browse communities
Presenting a webinar?

Enabling Your Mobile Security Strategy for eGRC

Kelley Vick, Brandon Dunlap (Brightfly), Daniel Ford (Fixmo), Brian Reed (BoxTone) Scott Gordon (ForeScout)
The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

Organizations need to address these challenges by defining policies that regulate the usage of consumer and personal mobility for employees, and they need the appropriate tools to enforce policies, regulate behaviors and manage risks, across multiple device platforms. In addition, they need to choose the appropriate management approach and the products and services that can help to enforce those policies in a cost-effective way.
Join this expert panel for insights on:

* Understanding your mobile device management requirements;
* Identifying the risks and benefits of introducing support for corporate applications on personal devices;
* Defining policies that regulate the usage of mobile devices for employees and address BYOD;
* Tools to effectuate policies, regulate behaviors and manage risks across multiple device platforms;
* Strategies for containerization and layered security to protect devices, data and networks;
* Selecting the right options that can help to enforce and monitor policies in a cost-effective way.
Jun 20 2012
63 mins
Enabling Your Mobile Security Strategy for eGRC
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3356)
  • Upcoming (58)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • A New IT Approach to GRC for Business Innovation Oct 22 2015 5:00 pm UTC 60 mins
    The burden of the existing day-to-day IT workload has never been greater and continues to grow. The recent financial scandals and high profile data breaches have raised scrutiny to unprecedented levels. This scrutiny, together with new legislative changes, has resulted in an array of new compliance measures and related challenges, which have led to a melting pot of complexity that has seen organizations increase spend simply to 'keep the IT maintenance lights on'.

    Due to consumer demand, leaders are having to look hard at their IT strategy and ways to reduce expenditure so they can invest in innovation to future-proof the business. Many banks are considering whether a complete IT infrastructure overhaul would prove more beneficial as spending on basic maintenance and compliance does little to move the business forward, yet it consumes the vast majority of IT budget. Not complying is not an option, and reducing IT spend on compliance is difficult as associated projects have become high priority 'must haves' and budget 'must spends'. If organizations fail to adapt their approach it will remain impossible for IT departments to service the needs of the compliance office and still satisfy the business innovation agenda.

    Attend this webinar to learn more about:

    - Driving efficiencies to reduce the cost of compliance
    - Using compliance to enabling teams to focus their efforts more effectively
    - Automating business process to get ahead of compliance
    - Raising your organization's overall data privacy, compliance, and security profile
  • A Payment Breach Prevention Plan Jun 23 2015 5:00 pm UTC 60 mins
    Branden Williams, HP Security Voltage
    With fraudulent payment card transactions continually on the rise, it’s more important than ever that merchants protect themselves from the potentially huge financial losses and damages to their brand and customer loyalty associated with a data breach. The total number of attacks has grown every year since 2006, and experts are calling 2014 “the year of the breach.” The Ponemon Institute found that each breach cost the average retailer $8.6 million in related expenses, and the price tag connected with a data breach increased across the board, reaching $20.8 million for financial service firms, $14.5 million for technology companies and $12.7 for communications providers.

    Criminals have displayed a better understanding of how point-of-sale systems operate than the technicians that maintain them, so to reverse the trend security professionals must fully understand their POS architecture, integrated payment processing and weaknesses in the technology. The upside is that companies can minimize their risk and foster a culture of security awareness with a proactive security plan which includes a set of ongoing processes to assess threats, set risk tolerance, address vulnerabilities, and train staff.

    Join this educational session as our panel of experts discuss the key steps to prevent payment card breaches across your organization.
  • A Best Practice Blueprint for eGRC May 26 2015 6:00 pm UTC 60 mins
    Brandon Dunlap (Moderator), Chris McClean, Forrester, MetricStream, Rsam
    With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

    Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.

    To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
  • Understanding EMV, End-to-end encryption, and Tokenization. Recorded: Mar 19 2015 60 mins
    Moderator: Branden Williams. Panel: Ralph Spencer Poore, PCI SSC; Terence Spies, HP Voltage; Scott Carcillo, Merchant Link
    Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years. According to the Verizon 2014 Data Breach Investigations Report, the vast majority of breaches occurred against small to mid-sized companies.

    As a result many retailers are focused on bolstering payment security and reducing fraud by implementing solutions such us EMV, End-to-end encryption (E2EE), and Tokenization. These solutions can work in tandem to protect merchants, and enable them to exceed regulatory requirements by securing card data across all payment environments.

    In this session our experts will present and define the three technologies, address the drivers that are leading the United States to implement EMV, and explain the complementary role of Tokenization with respect to EMV and End-to-end encryption.
  • Preparing for PCI DSS 3.0 and VISA Mandates Recorded: Feb 19 2015 61 mins
    Moderated by Branden Williams. Emma Sutcliffe, PCI SSC; Terence Spies, Voltage Security; Matt Getzelman, Coalfire
    * On this webcast we're giving away a pass ($2,490 value) to our partner event: The 3rd Annual Stress Testing USA Congress being held in NYC on March 18-19, 2015. All attendees will be included in the draw.

    The clock is ticking for enterprises that have not yet upgraded their payment card processing systems to be compliant with Payment Card Industry Data Security Standard (PCI DSS) 3.0. Since Jan. 1, 2015 , there is increasing urgency to not only understand the most important changes in PCI DSS 3.0, but also to be ready for a rigorous QSA assessment against those changes. Since PCI 3.0 is bigger, harder and more expensive than the previous iteration, merchants have their work cut out for them.

    PCI DSS founding member, Visa Inc. recently changed its policy on compliance assessments for the PCI DSS. More specifically, Visa decided that merchants who meet a stringent set of criteria including processing 75% of transactions using "Chip and PIN" enabled terminals, may be able to apply for an exemption from PCI DSS assessment requirements. Unfortunately, not all merchants are aware of the change, and fewer understand what it means.

    In this special presentation, our expert panel will explain the changes and their implications, and offer a detailed review of PCI DSS 3.0 to help enterprises prepare for assessments and make PCI compliance a whole lot easier.
  • Top Guidelines for Hadoop Security and Governance in 2015 Recorded: Jan 21 2015 61 mins
    Brandon Dunlap, Brightfly; Vidya Phalke, MetricStream; Sudeep Venkatesh, Voltage; Rebecca Herold, The Privacy Professor
    In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop ‘data lake’, will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

    Organizations are now faced with more stringent and expanding regulations, and must implement better governance, more effective risk management policies, and smarter data management approaches to enable them to do a much better job of controlling their business through the information explosion. As companies look at GRC technology, they should assess the capability of these solutions to deliver continuous monitoring of controls, key risk and security indicators, policies, and ensure they are natively integrated with critical business systems.

    We invite you to attend this round-table webinar as our panel of experts will discuss top guidelines for Hadoop security and governance in 2015, and provide guidance for assessing new technology solutions to ensure they will achieve your objectives.
  • Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded: Dec 4 2014 69 mins
    Branden Williams, Moderator; Ralph Spencer Poore, PCI SSC; Terence Spies; David Tushie; and Rajesh Sharma
    More than 100 million Americans have lost personal information in a data breach over the last year, and identity theft is the fastest growing crime in the US. As a result, President Obama has launched a government initiative to support the US migration to EMV and improve information sharing on cyberfraud threats, and nearly half of US merchant terminals are expected to accept EMV cards by the end of next year.

    As of October 1 of 2015, merchants and acquirers—not card issuers—will bear the financial burden resulting from fraudulent use of counterfeit, lost and stolen cards. It's a risk that's only mitigated by demonstration and documentation of EMV compliance. Beyond the liability shift, EMV holds promise as an enabler of secure mobile and e-commerce payments, with attractive PCI (Payment Card Industry) Security Standards-related benefits for merchants. Those who implement EMV contact- and contactless-enabled POS devices may be excused from PCI audits and the costs associated with them, creating further incentive to adopt EMV.

    In this webinar, we'll discuss the details behind the migration to EMV, how the technology works, and some top security guidelines for EMV and Mobile Payments in 2015.
  • Don't Be the Next Headline: Data Security Best Practices for 2015 and Beyond Recorded: Nov 4 2014 65 mins
    Moderator: Brandon Dunlap. Panel: Bob Russo, PCI SSC; Terence Spies, Voltage; Yo Delmar, MetricStream; Rick Dakin, Coalfire
    Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.

    Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.

    Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

    Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Tyler Moffitt-Senior Threat Research Analyst, Webroot
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Securing Hadoop – the Data-Centric Approach Recorded: Oct 1 2014 62 mins
    Adrian Lane, Security Analyst – CTO, Securosis; and Sudeep Venkatesh VP, Solutions Architecture, Voltage Security
    If you’re embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, “High quality data produces better analysis results—which is why a key ingredient is sensitive data.” Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

    Join us for an insightful discussion on data-centric security approaches for multi-platform enterprise environments, including Hadoop. Learn about techniques such as format-preserving encryption, tokenization, storage-level encryption, and data masking.

    RSVP Now if you need to understand how to enable analytics and insights without security risk, and how to neutralize data breaches through data-centric technologies that can integrate with Hive, Sqoop, MapReduce and other Hadoop specific interfaces.
  • The Case for Building Your Own Secure, Compliant Cloud Recorded: Sep 24 2014 61 mins
    David Chapa, CTO at EVault (Seagate); Jean-Louis Fritz Y. CRISC, Governance, Risk and Compliance leader
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    What is driving expansion to the cloud? In most cases, it’s cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.

    The research firm, 451 Group says, “Cloud is a way of using technology, not a technology in itself,” and, in many cases, IT organizations have chartered new courses on their own to reach the same value as the hyper-scale cloud solution providers. Although, as with any DIY solution, comes caveat emptor. As any do-it-yourselfer will attest, at some point you must make adjustments, fixes, and, in some cases, scrap it and build it all over again. This is the nature of DIY. However, in today’s competitive marketplace, time and resources are limited, and for IT to be more agile, efficient, and productive, DIY may not be the best course of action moving forward.

    In this webinar, we will look at the trends of cloud and how building a secure, compliant cloud based on validated and converged infrastructures will be the way IT expands its way beyond the data center, into the cloud.
  • Panel Discussion: Why EMV is Not the Only Answer to Payment Security Recorded: Sep 16 2014 77 mins
    Brandon Dunlap, Bob Russo (PCI SSC), Jeff Cherrington, Bernard Vian, Terence Spies
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue.

    With the Target incident seen as a watershed many financial institutions are planning to begin issuing EMV cards in the next two years, although many are still hesitant to commit to EMV because of uncertainty around retailer adoption of chip card point-of-sale terminals, questions about the viability of the business case for migrating from magnetic stripe cards to chip cards, as well as unresolved issues related to regulation and support for merchant routing choice. Meanwhile, the official release of PCI DSS v3.0 is here, delivering a fresh set of regulatory concerns for retailers.

    Clearly, traditional IT defenses are no longer working. But you can take control. Join us as we discuss key lessons learned from the recent breaches, and the latest developments in payment security.
  • Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded: Aug 20 2014 63 mins
    Andrew Hicks, Healthcare Practice Director at Coalfire; and Mark Bower, VP Product Mgt, Voltage Security
    With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

    Chasing compliance is an expensive proposition that doesn’t adequately address the current security threats and vulnerabilities. Organizations that simply want to comply with the regulations are already at risk. A more effective program is risk-based -- one where incremental changes to controls can be made in real-time to more effectively combat current threats to your security program. Join us for this webinar where you’ll learn:

    - Why compliance is an outcome of an effective data protection program.
    - Risk assessment, analysis and management – what’s the difference and why you need them.
    - What is considered ‘reasonable’?
    - What leading healthcare organizations are doing today to protect data, with a focus on securing Big Data for healthcare analytics?
    - How data protection can help without getting in the way of patient care.
    - How do you protect from your healthcare organization public loss of confidence?
  • EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded: Jul 15 2014 61 mins
    George Peabody (Glenbrook Partners), Terence Spies (CTO at Voltage Security)
    * On this webcast we're giving away a guest pass to 'Data Analytics for Manufacturing' in Chicago on August 18-19.

    Everything changed six months ago. The Target data breach caused us all to rethink payment security. The U.S. transition to EMV chip and pin cards, is around the corner. Tune into this webinar for a complete update on where EMV is today – lessons learned from Europe and Canada’s experience of EMV adoption, and the latest about the liability shift in the U.S. How and when will EMV be augmented by new approaches to card data in mobile wallets, online, and at the point of sale? Learn what you need to know about tokenization and the latest developments which are sure to impact your payment security and payment processing. Find out how you can build in flexibility during this time of transition and rapid evolution in technologies.

    Join us to find out what this evolution in payment architectures means for your business–with no single payment architecture in place any time soon.
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling Your Mobile Security Strategy for eGRC
  • Live at: Jun 20 2012 4:00 pm
  • Presented by: Kelley Vick, Brandon Dunlap (Brightfly), Daniel Ford (Fixmo), Brian Reed (BoxTone) Scott Gordon (ForeScout)
  • From:
Your email has been sent.
or close
You must be logged in to email this