Browse communities
Browse communities
Presenting a webinar?

Avoid data residency mistakes and reduce risk and compliance challenges

Mark Bower, Voltage Security, VP product management
Learn how to avoid data residency mistakes by applying data-centric security for global governance, risk and compliance.

Data residency laws can place complicated requirements and constraints on the IT strategy - from preventing the adoption of distributed application architectures including cloud, to requiring expensive in-country data center operations with dedicated staff. US, EU cross border data laws, Offshore Banking rules, and federal mandates may also have conflicting data governance requirements leading to high compliance costs.

However, businesses today operate across more geographic boundaries than ever before and as data travels globally, a company’s compliance, risk, and data governance obligations become exponentially more complex. In addition, data moving across public and private clouds increases breach risk and compliance regulators can stop projects in their tracks - sometimes with dramatic consequences.

Join us for this live webcast where Mark Bower, VP product management, Voltage Security, will share effective strategies for protecting your data from threats while meeting privacy compliance regulations regardless of where your data is.

-- Data residency risks and challenges, and using a data-centric security approach to overcome them

-- How to embrace a complex regulatory environment without the cost and risk of a traditional in-country data center

-- Best practices to govern data access across geographic compliance boundaries such as the US and Canada, and the US and the EU

-- Use cases for financial entities operating offshore and private banking rules and regulations such as those in the EU, Singapore and Switzerland
Aug 16 2012
61 mins
Avoid data residency mistakes and reduce risk and compliance challenges
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (111)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Avoid data residency mistakes and reduce risk and compliance challenges Recorded: Aug 16 2012 61 mins
    Mark Bower, Voltage Security, VP product management
    Learn how to avoid data residency mistakes by applying data-centric security for global governance, risk and compliance.

    Data residency laws can place complicated requirements and constraints on the IT strategy - from preventing the adoption of distributed application architectures including cloud, to requiring expensive in-country data center operations with dedicated staff. US, EU cross border data laws, Offshore Banking rules, and federal mandates may also have conflicting data governance requirements leading to high compliance costs.

    However, businesses today operate across more geographic boundaries than ever before and as data travels globally, a company’s compliance, risk, and data governance obligations become exponentially more complex. In addition, data moving across public and private clouds increases breach risk and compliance regulators can stop projects in their tracks - sometimes with dramatic consequences.

    Join us for this live webcast where Mark Bower, VP product management, Voltage Security, will share effective strategies for protecting your data from threats while meeting privacy compliance regulations regardless of where your data is.

    -- Data residency risks and challenges, and using a data-centric security approach to overcome them

    -- How to embrace a complex regulatory environment without the cost and risk of a traditional in-country data center

    -- Best practices to govern data access across geographic compliance boundaries such as the US and Canada, and the US and the EU

    -- Use cases for financial entities operating offshore and private banking rules and regulations such as those in the EU, Singapore and Switzerland
  • Simplified email data security for mobile smartphones and tablets Recorded: Jul 12 2012 60 mins
    David Strom, networking and communications expert & Mark Schweighardt, Director product management, Voltage Security
    Legacy approaches to securing email communications usually leave a lot to be desired or just plain don’t work, with usability being the number one barrier to adoption. They also require complex configuration files, key management, administration and provisioning – not to mention the multiple end-user steps to access encrypted emails and attachments. In many cases, inconsistent delivery methods even from a single solution results in clunky or unusable experience for mobile users.

    But what if your mobile users could send and read encrypted email on leading iOS, Android, and Blackberry devices using the native experience without the hassle of web browsers, managing certificates, or awkward proxy servers? What if you could manage granular email data protection policies across corporate and personal mobile devices, both inside and outside the enterprise, from a unified console?

    Join David Strom, expert on networking and communications technologies, and Mark Schweighardt, Director product management at Voltage Security, to learn:

    -The challenges posed by current mobile device security solutions for securing email communications on smartphones and tablets

    -How Voltage SecureMail Mobile Edition extends data-centric protection of emails seamlessly to and from desktops, applications, gateways, laptops, mobile devices, and cloud inboxes

    -How to read and send encrypted email via the Voltage SecureMail mobile apps, and the benefits to mobile users and IT security operations

    -How Voltage SecureMail Mobile Edition integrates with your existing compliance solutions such as DLP, archiving, and e-discovery, and with your existing email and IT infrastructure
  • A practical approach for a mobile data-centric security strategy Recorded: Jul 10 2012 60 mins
    Jamie Bass, Director - PwC Advisory Security practice and Terence Spies, CTO, Voltage Security
    Mobile devices such as smartphones and tablets have become mainstream business tools. Enterprises are accelerating their adoption of a Bring Your Own Device (BYOD) model to increase staff productivity and extend their relationships and brand to customers and partners through mobile channels, especially email. This presents major challenges to their existing security architecture and programs; every environment now features an unprecedented mix of operating systems, applications and practices
  • 5 Tips for Securing Data On Smartphones and Tablets Recorded: Jun 13 2012 57 mins
    Bob Bragdon, Publisher, CSO Magazine and Mark Bower, VP Product Management, Voltage Security
    Every day, more and more sensitive business data and communication are being accessed by BYOD (Bring Your Own Device) and IT-provisioned smartphones, bringing huge implications to enterprise security and compliance efforts. It's not surprising that the top concern of today’s mobile enterprises is data security.

    Traditional, container-based approaches to securing data on smartphones have encountered limited success due to their complexity to use and deploy, which impacts user productivity. No amount of perimeter defense can completely protect data accessed by smartphones, as evidenced by the data breaches still happening today.

    Our guest speaker Bob Bragdon, Publisher, CSO Magazine and Mark Bower, VP Product Management, Voltage Security discuss a data-centric view for protecting valuable business data and talk about the top five strategies for mobile data security that can make or break your enterprise security strategy.
  • Reducing PCI scope and cyber risk - at the same time Recorded: Apr 19 2012 59 mins
    Emily Mossburg, Principal, Deloitte & Touche LLP
    This webcast features Emily Mossburg, Principal, Deloitte & Touche LLP, who shares her personal experience in driving a data-centric security implementation at a Fortune 50, Top 10 bank.

    Topics include:
    - Conducting a broad evaluation of your data security options
    - Gauging capacity requirements
    - Ensuring that scalability is addressed in order to maximize your investment
    - Socializing the data security plan within your company
    - Leading your company through a successful data security implementation
  • Learn how 6 top companies protect their data Recorded: Mar 20 2012 63 mins
    Mark Bower, Voltage Security, VP Product Management
    Data privacy is typically driven by compliance mandates and while compliance does require security, it may not protect data as compliant data is breached every day.

    Join us for this free webcast to gain invaluable insights from cases studies including AIG Group, JPMorgan Chase and Heartland Payment Systems, among others.

    Learn how these companies are using a data-centric security strategy to:

    • Consolidate data protection into a single, scalable architecture platform
    • Simplify IT operations with stateless key management
    • Protect data - anywhere, all the time
    • Secure structured and unstructured data on any platform, anywhere
    from mainframe to mobile, in and out of the cloud

    Enterprise customer case studies will include:
    • Securing application data in the data center
    • Securing cross-border data for residency and privacy
    • Securing data in QA and pre-production environments
    • Securing data stored in public cloud services
    • Securing PCI and payments data
    • Securing document sharing between employees, partners and customers
  • The Patriot Act and Protecting Data in the Cloud Recorded: Mar 7 2012 48 mins
    Wasim Ahmad, Vice President Marketing, Voltage Security
    As banking and financial institutions seek to benefit from tremendous cost savings possible with cloud infrastructure and services – two key factors must be considered – the Patriot Act which has strict stipulations regarding access to data and where it is stored and the protection of data even from third party service providers. This seminar will explore both these issues and by using some common examples such as BPOS, propose a framework for addressing both without impacting operational costs or adding large amounts of excess infrastructure.
  • What’s new in Crypto Recorded: Mar 7 2012 55 mins
    Ted Alexander: Praxium Group Inc., Rich Skinner: CISSP, IBM, Phil Smith III: Voltage Security
    Mainframes remain the core of business-critical operations in most of the world's largest and most successful enterprises, including those in banking, insurance, healthcare, and retail. But as IT management will attest, there can be issues with complexity when it comes to securing critical information on the mainframes running on z/OS. Implementing an encryption solution can be disruptive to business operations and require hundreds of lines of code to acquire and store keys and perform cryptographic operations. Adding to the complexity are the deep expertise and highly specialized knowledge needed to keep all the moving parts working. But it doesn’t have to be that way -- in this webcast we'll discuss proven strategies for easily implementing data security in the z/OS environment.
  • Enterprise Encryption 101 - Technical Deep Dive Recorded: Mar 7 2012 80 mins
    Phil Smith, Mainframe Architect with Voltage Security
    The fact is mainframe resources are now increasingly accessible from the Internet, and even when they aren't, internal threats, trusted partners, interaction with distributed machines, and outsourcing all represent risks that must be mitigated. Encryption can minimize the cost impact of data breaches because encrypted data is virtually useless to anyone. Learn the latest about securing mainframe information from Phil Smith, Mainframe Architect with Voltage Security who has 30+ years of mainframe experience.
  • Protect Sensitive Data in Development and Test Environments Recorded: Mar 7 2012 59 mins
    Steve Kozman
    Listen to Steve Kozman, SVP & Chief IT Risk Officer, SunAmerica Financial Group share his experience and lessons learned while implementing data protection across seven business divisions at SunAmerica. When it comes to data protection, organizations often consider only data that is used in customer-facing applications and production databases. But what about data used in non-production environments such as application development, testing, quality assurance and training? Many organizations have implemented policies or solutions such as strong password protection and firewalls to comply with regulatory requirements and to deter breaches, yet common infrastructure-centric methods for protecting sensitive information have proven inadequate in today's threat environment. Hear how SunAmerica Financial Group has achieved this.
  • Killing Data – Will encryption become the cornerstone of your data security? Recorded: Feb 14 2012 61 mins
    John Kindervag, Principal Analyst, Forrester
    As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies.

    Join us for this free webinar, and in just 45 minutes you'll gain invaluable insight into the latest trends and customer-proven solutions for data-centric security. Insight that you can put into action at your company today, including:

    - Encryption prevents cybercriminals from monetizing your data

    - Ubiquitous encryption is the only hope we have of maintaining some kind of parity with attackers in the new threat landscape

    - Data-centric security is a much more effective way to combat cybercriminals

    Be the hero for your business. Make plans to address your vulnerabilities now.

    As a preview to this webcast we invite you to register for the newly released Forrester White Paper "Killing Data": http://www.voltage.com/info/120214-killingdata-wp.htm
    The webcast will provide a discussion and drill down into the details of this paper.
Data Security for the Enterprise
Voltage Security, Inc. is the world leader in providing data-centric encryption and key management solutions for combating new and emerging security threats. With innovative, powerful and easy-to-use encryption and tokenization solutions for protecting sensitive business data, Voltage customers are able to address privacy regulations and best practices from around the world.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Avoid data residency mistakes and reduce risk and compliance challenges
  • Live at: Aug 16 2012 5:00 pm
  • Presented by: Mark Bower, Voltage Security, VP product management
  • From:
Your email has been sent.
or close
You must be logged in to email this