Hi [[ session.user.profile.firstName ]]

Contain Data Leakage by Raising Your Security IQ

Headlines about compromised enterprises seem to be a weekly occurrence lately, if not daily. Whether data leakage incidents are driven by the likes of botnets, malware, viruses, etc., or non-malicious insiders, organizations’ bottom line and reputations are being severely affected.

Fr
Headlines about compromised enterprises seem to be a weekly occurrence lately, if not daily. Whether data leakage incidents are driven by the likes of botnets, malware, viruses, etc., or non-malicious insiders, organizations’ bottom line and reputations are being severely affected.

From published internal emails to entire customer lists, intellectual property theft is often the result of a simple security program oversight. This webinar has been designed to help companies better comprehend the scope of data leakage and IP theft and, more importantly, how you can glean better security intelligence by:

· Considering the focus areas your company needs to encompass in your security program, from devices to education

· Understanding what use cases to look for and which Primary Data Sources to gather and monitor to gain the most visibility into the security and threats both internal and external

· Reviewing best practices for handling SIEM events and reducing Mean Time to Resolution (MTTR) for any detected breaches
Recorded Apr 5 2012 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Luke LeBoeuf, Principal Security Consultant, HP Enterprise Security
Presentation preview: Contain Data Leakage by Raising Your Security IQ
Recommended for you:
  • Date
  • Rating
  • Views
  • Radio Resource Management (RRM) is a feature that automates access point (AP) power and channel configuration. Most enterprise and mid-market Wi-Fi infrastructure providers have this feature, and Wi-Fi engineers are divided on whether or not RRM is beneficial and/or trustworthy, given the extremely diverse range of deployment models and RF environments. In today's market, network stability, dependability, and low TCO are paramount. This presentation takes a comprehensive look at RRM, providing attendees with both immediately useful and longer-term reference information.

    Join NetScout and Devin Akin as we deep-dive on this controversial topic.

    Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.
  • After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
  • Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect, impacting critical applications. Determining the root cause of the problem is a challenge for most IT organizations, since ESBs serve as a ‘black box’, offering little insight into the issue.

    Now, you can assess and resolve performance issues for applications that communicate across your ESB, before they affect your users. Join Richard Nikula, Vice President, Product Development and Support at Nastel, to learn how Nastel AutoPilot for CA Cross-Enterprise APM lets you analyze application behavior in real-time in production, test and development environments.
  • It’s 2016. If you were born after 1980, you probably don’t remember a time without the Internet and the Web. You reach for your smartphone as your go-to device to answer questions, order pizza, find the score of a football game, and check the address of your child’s next soccer game.

    It should come as no surprise, that you reach for your smart phone or use your browser at work to search for an answer when you have a technical issue. The bottom line is that more and more business users are bypassing the service desk and the self-service portal because they believe they can get answers quicker on the web.

    Could this be the beginning of the end for IT Self Service as we know it? Join George Spalding, EVP, Pink Elephant and Jim Blayney, Sr. Product Marketing Mgr. CA Technologies, as they tackle the thorny and divisive issue of whether it’s actually more productive for users to get their own solutions from the web.
  • Please join the DevOps / Agile CoI for a BrightTalk Session, “Enterprise DevOps – Lessons Learned”, scheduled for 1PM EST on Wednesday, January 27, 2016.

    DevOps is a cornerstone to concepts used to drive the implementation, with continuous integration and delivery as methods to deliver the actual solution. In a large enterprise, there are many front-end and back-end systems/processes that need to "talk". This presentation focuses on highlighting and breaking down the silos that exist in order to redirect energy and attention on (the more important) outcomes that are generated from lighter methods to delivery IT systems. This includes establishing similar light weight methods for all groups in the organization to publish updates and changes in the environment with, again, a focus on the values, practices, and outcomes.

    Jason Walker, the Lead DevOps Engineer at Target Corporation, will discuss many of the lessons learned and best practices during the adoption of DevOps at Target.
  • APIs have become a strategic necessity for your business because they facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. We will explore in depth the main security concerns API providers and consumers need to consider and how to mitigate them.
  • Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.

    Register for this webcast to learn about:
    •New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
    •How to provide remote access and single sign-on to on-premises web applications with Application Proxy
    •Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service

    Register now to watch live or receive notification when this program is available on-demand.
  • Reliance on IT to support business’ strategic goals and objectives are continuing to increase year over year. With this heavy reliance, IT organizations are modernizing and transforming the way they deliver services.

    Join ServiceNow and Okta, as they review the key strategies and solutions for Identity and Service Management that unite and automate IT processes. Watch this webinar and learn how to:

    •Standardize service processes by automating request fulfillment and user provisioning
    •Consolidate redundant legacy IT service tools to a single system of record
    •Secure connections between people and technology
  • Identifying social compliance issues, particularly forced labor and human trafficking in supply chains, continues to be a significant problem for business, particularly when sourcing from opaque and non-transparent emerging markets. Civil society is playing a large part in increasing awareness and pressuring politicians to introduce and enforce legislation, and is gradually highlighting the issue as a problem which needs to be addressed both by governments and the business community.

    Kroll has been researching and working on this issue for a number of years and believes that businesses should be taking the issue as seriously as other forms of compliance.
  • Cloud is rapidly entering an entirely new phase, one destined to prove far more transformative and disruptive than the initial phase of cloud computing. It is driving comprehensive transformation of digital assets in organizations of all stripes as IT decision makers begin to view this emerging cloud construct as a proxy for digital transformation. No single vendor can offer the end-to-end services that can satisfy all of a customer’s IaaS, PaaS, SaaS and business processing as a service needs, which is why a multi-cloud approach makes sense. 451 Research's William Fellows will discuss while technology is not the only consideration in cloud transformation – organizational change, risk posture and the adoption of cloud’s operating model are key – the fact is that a Cloud Management Platform which includes automation and orchestration wlll be necessary to navigate this journey. We look at the key trends and technologies which will enable this in 2016.

    IT Spending Trends 2016
    https://www.youtube.com/watch?v=28cr1nnQhjo

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Contain Data Leakage by Raising Your Security IQ
  • Live at: Apr 5 2012 7:00 pm
  • Presented by: Luke LeBoeuf, Principal Security Consultant, HP Enterprise Security
  • From:
Your email has been sent.
or close
You must be logged in to email this