Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Delivering Data Security with Hadoop and the IoT Delivering Data Security with Hadoop and the IoT Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security Recorded: Aug 9 2016 62 mins
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
  • Cloud Object Storage 101 Cloud Object Storage 101 Nancy Bennis, Director of Alliances, Cleversafe an IBM Company, Alex McDonald, Chair, SNIA Cloud Storage Initiative, NetApp Recorded: Jul 14 2016 63 mins
    Object storage is a secure, simple, scalable, and cost-effective means of embracing the explosive growth of unstructured data enterprises generate every day.
    Many organizations, like large service providers, have already begun to leverage software-defined object storage to support new application development and DevOps projects. Meanwhile, legacy enterprise companies are in the early stages of exploring the benefits of object storage for their particular business and are searching for how they can use cloud object storage to modernize their IT strategies, store and protect data while dramatically reducing the costs associated with legacy storage sprawl.
    This Webcast will highlight the market trends towards the adoption of object storage , the definition and benefits of object storage, and the use cases that are best suited to leverage an underlying object storage infrastructure.
    In this webcast you will learn:
    •How to accelerate the transition from legacy storage to a cloud object architecture
    •Understand the benefits of object storage
    •Primary use cases
    •How an object storage can enable your private, public or hybrid cloud strategy without compromising security, privacy or data governance
  • Virtual Data and Data Masking: The New Approach to Data Security Virtual Data and Data Masking: The New Approach to Data Security Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant Recorded: Jul 12 2016 47 mins
    A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior--the data itself. In particular, the combination of virtual data and data masking is proving to be a powerful way for enterprises to safeguard sensitive data from both insider and outsider threats.

    View this webinar to learn:

    How data masking is superior to solutions based on encryption and firewalls
    What virtualized data is, and how it forms the foundation for an effective security strategy
    Why integrating data masking with virtual data reduces your surface area of risk by 90%
  • Are ransomware attacks holding the healthcare industry hostage? Are ransomware attacks holding the healthcare industry hostage? Barry Fisher, Sr. Product Manager at OpenDNS Recorded: Jun 29 2016 57 mins
    Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more.

    Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.

    But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.

    Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:

    -Reduce ransomware infections across your organization
    -Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
    -Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps

    Register now to learn how to start covering your healthcare security gaps.
  • Understanding Account Takeover Attacks Understanding Account Takeover Attacks Mike Milner, CTO and Co-founder of IMMUNIO Recorded: Jun 23 2016 52 mins
    Over the last few years, there are a known 620 million user accounts that have been compromised across hundreds of sites. Organized cybercrime have figured out that this is the fastest, most reliable method to infiltrate organizations, as well as achieve financial gain. Since users share passwords across multiple sites, it is easier to find logins that work on a target site than try to bypass firewalls, find software flaws, or even run spearphishing campaigns.

    These types of attacks are collectively coming to be known as “Account Takeover” (ATO). Some are simple, while others are sophisticated. Some can be stopped relatively easily, and others require much more effort.

    ATO attacks (via stolen credentials) were cited as the #1 method of confirmed data breaches in both 2014 and 2015, for web applications, which itself was the #1 vector for data breaches.

    Come learn what these ATO threats are, their impact to your business, how to detect them, and what you can do about it.
  • Malware Attack "Fan-out" Effect in the Cloud Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 60 mins
    The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

    - The multiplier effect that that the cloud can have on the probability of a data breach
    - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
    - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
    - A forensic walk-through in the reconstruction of a complex audit following a data breach
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
  • Windows 10: Digital Transformation through Affordable Innovation Windows 10: Digital Transformation through Affordable Innovation Peter Gossin, Digital Transformation Manager, Microsoft Recorded: Jun 16 2016 17 mins
    Digital transformation is the process of using today’s technology to modernize outdated processes and meet the most pressing needs of your business.

    Thanks to recent advances in lower cost tablet technology and Microsoft’s suite of cloud and productivity services, complete digital transformation is more accessible now than ever before. A new class of affordable devices is revolutionizing the way businesses and their employees work and interact with customers.

    Sign up now to:
    •Engage your customers
    •Empower your employees
    •Optimize your operations
    •Transform your products
  • Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant Recorded: Jun 14 2016 50 mins
    Data Masking Is Changing How Businesses Prevent Data Breach
    With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach. Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data -- without the slowdown caused by traditional methods.
    Register and discover:

    The key reasons why next-generation data masking reduces risk of breach
    How masking compares to other security approaches such as encryption
    Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.

Embed in website or blog