Browse communities
Browse communities
Presenting a webinar?

Creating and Managing a Cyber Security Policy: Tips for the SMB

Stephen Cobb, Security Evangelist, ESET
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
Mar 21 2012
56 mins
Creating and Managing a Cyber Security Policy: Tips for the SMB
More from this community:

IT Service Management

  • Live and recorded (2379)
  • Upcoming (44)
  • Date
  • Rating
  • Views
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:

    • Gain visibility into capacity utilization at the resource, service, and business level.
    • Support timely decision-making on IT investments.
    • Increase agility, reduce IT costs, and minimize risks.

    Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
  • To realize the full benefits of the cloud, you must choose a cloud that fits your needs and supports your organization’s cloud workloads. In this webinar, we will discuss the results of a Forrester Consulting study that show why capacity management is essential to your cloud transformation strategy. You will learn how capacity optimization tools manage workloads in the cloud and help you:

    • Gain visibility into capacity utilization at the resource, service, and business level.
    • Support timely decision-making on IT investments.
    • Increase agility, reduce IT costs, and minimize risks.

    Learn how capacity management will help you understand and optimize your environment to support effective decision-making aligned to business priorities.
  • Link-Solutions is comprised of hand-held test and cloud based reporting. On the hand-held test side LinkSprinter and LinkRunner AT perform varying levels of testing capability but both offer automated reporting to the same Link-Live Cloud Service. Within the Link-Live Cloud Service dashboard you’ll see every test appear on the dashboard as it occurs providing better job visibility and project control as you can easily keep track of who is testing what, where and when. Attend this webcast to find out how this adaptable toolset can help your organization
  • This webinar will show you how we used some specific tools and techniques to identify where problem management was failing and how a poor incident management process was the root cause.
  • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

    SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

    Key Takeaways:
    • Security considerations in each of the architecture layers
    • Data isolation risks and mitigation plans
    • Overview of CWE/SANS and OWASP Security threats
    • Data retention and termination policies
    • Infrastructure and cloud related security risks and solutions
  • Ineffective new product development (NPD) pipeline management is a condition that affects many organizations looking for sustainable results from their new product efforts. In most cases, organizations struggle to understand what the symptoms they experience are telling them about their pipeline, and how to focus their energy on initiatives that will make the most impact. In this webcast, CA and Kalypso will review the most common indicators of a faulty NPD process and help diagnose the causes.

    Attendees will learn:
    - The common pain points and symptoms that indicate poor NPD pipeline management
    - Why organizations experience these symptoms, and the underlying causes that produce these pains
    - How to tailor portfolio management principles to treat the symptoms of poor NPD pipeline management, including example that illustrates how portfolio management can drive sustainable results
  • Ineffective new product development (NPD) pipeline management is a condition that affects many organizations looking for sustainable results from their new product efforts. In most cases, organizations struggle to understand what the symptoms they experience are telling them about their pipeline, and how to focus their energy on initiatives that will make the most impact. In this webcast, CA and Kalypso will review the most common indicators of a faulty NPD process and help diagnose the causes.

    Attendees will learn:
    - The common pain points and symptoms that indicate poor NPD pipeline management
    - Why organizations experience these symptoms, and the underlying causes that produce these pains
    - How to tailor portfolio management principles to treat the symptoms of poor NPD pipeline management, including example that illustrates how portfolio management can drive sustainable results
  • There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
  • Resolving an incident can be a complex process that takes a lot of time and many people. According to the 2014 State of On-Call Report, most teams report that it takes 10-30 minutes to resolve an incident and on average, 5 people are needed to help with resolution.

    But it doesn’t have to be that way. In this webinar, Jason Hand will present best practices and tips for surviving every stage of the firefight - from when an alert comes in to pulling reports after it’s over. Join us to see how we do it at VictorOps.
  • Channel
  • Channel profile
Network Security Education
To help educate end users about the different option regarding network Security and how the work with Anti-Virus solutions

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creating and Managing a Cyber Security Policy: Tips for the SMB
  • Live at: Mar 21 2012 5:00 pm
  • Presented by: Stephen Cobb, Security Evangelist, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this