Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
Migration to 802.11ac is about using optimal design techniques and network validation that achieve maximum performance and ROI. Join Devin in this live webinar to get best practices for the migration of your enterprise Wi-Fi network as he focuses on the following:
•Details about channels widths that you didn’t know that you needed to know
•The entire process of design, deployment, validation and remediation – in context
•A detailed understanding of co-channel interference (CCI) and its effects on enterprise Wi-Fi networks
Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
Marketing teams get creativity. Creativity is their life’s blood. The concern is that by setting up rules and processes, we might kill that creative spark that drives the art created by the marketing directive. Agile methodology is applying the art of science in order to uncomplicate and reduce unnecessary admin time -- the very thing that keeps us from spending more time making beautiful campaigns and generating innovative copy.
We’re going to talk to real life marketing teams who are using Agile methodologies to run their right-brained collaboration space – and are seeing tremendous results. We’ll talk war stories, great use cases, and ways to break down the siloes that are keeping your brilliant minds from making that next inspired leap.
Join us for a free web event sponsored by Workfront to uncover the real-life ways that creative directors are harnessing the power of agile marketing methodologies to rapidly make fantastic leaps and discoveries that fuel careers.
In this webinar, you’ll:
* Hear first-hand experiences from current creative teams using tried and true methods to build faster and respond to industry trends quickly
* Learn ways to increase the number of great ideas and proof of concepts
* Use data to analyze and capitalize on changes in projects, marketing and industry trends… before your competitors know what hit ‘em.
* Capture the lightning in a bottle that ensures amazing customer experiences.
Sponsored by Workfront
Jim Ewel, Principal, Agile Marketing
Stewart Rogers, director of marketing technology, VentureBeat
David Lesue, creative director, Workfront
"DevOps" is a term that has become mainstream enough to be hated, misunderstood, misused, and abused. But what is "DevOps"? And, more importantly, why should I care?
DevOps isn't a tool or a product. It's an approach to operations. By uniting development and operations teams to automate and standardize processes for infrastructure deployment, you get faster innovation, accelerated time to market, improved deployment quality, better operational efficiency, and more time to focus on your core business goals.
This presentation will explore the principles and forms of DevOps. I know DevOps when I see it and, soon, you will, too.
Capacity planning just may be the most crucial element that businesses are consistently struggling with. It is easy to see why, the impacts of SMAC (social, mobile, analytics, and cloud) has kept executive decision makers and IT managers on their toes. But this environment is not going to become any easier, and now is the time to make plans for the growing needs of data storage and reliable connectivity. In this live webinar we will discuss:
•Five tips to business on the right track
•The challenges that result from the common approaches utilized today in capacity planning
•A better way to optimizing the bandwidth you may already have
SaaS, VoIP, Private/Virtualized, Public, Hybrid. There are many ‘shapes” of cloud and with each comes increasing reliance on a stable, high-performing network.
Join Rick Blaidsell and NETSCOUT- Fluke Networks Enterprise Solutions, as we discuss the challenges of cloud networks and the solutions organizations around the world are sharing with us. You will learn:
•Why initial intelligence gathering about your network is critical
•How to use on-going monitoring to identify problem domains
•What is needed to keep everything “clean” for hosted VoIP
•When to stay with a physical environment
Charl Joubert from University of Pretoria in South Africa explains why HP Service Manager with Smart Analytics leverages Big Data to be a game changer for problem management at the service desk and how amazing gains have been measured on daily tasks.
When adding new 10G infrastructure to your network it is best practice to validate performance before making it operational. Yet this step is frequently skipped - increasing the likelihood of future problems such as:
•More time spent troubleshooting
•Sub-optimal application delivery
In this webinar learn how the new OneTouch AT 10G Network Assistant facilitates 10G infrastructure acceptance testing with automated, 1-button standardised testing and reporting.
Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!
What you'll learn:
• How data encryption helps prevent data breaches
• How to address PCI compliance requirements in the cloud
• How to safeguard cardholder information that is stored in a variety of different databases and versions
• The HOSTING and Vormetric approach to securing data in motion and at rest
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Lysa Myers, Security Researcher III, ESET North America
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We'll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET's powerful endpoint solutions respond to APTs.
Category: Research overview and ESET product presentation.
Dave Howard, Instructional Designer, ESET North America
From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>