Browse communities
Browse communities
Presenting a webinar?

Creating and Managing a Cyber Security Policy: Tips for the SMB

Stephen Cobb, Security Evangelist, ESET
Join Stephen Cobb, Security Evangelist at ESET to discover how:
- Vunerable SMB's like yours really are
- You can establish a cyber security policy for your organization
- You can defend your company-and it's employees partners and customers against online attacks
Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks.
Mar 21 2012
56 mins
Creating and Managing a Cyber Security Policy: Tips for the SMB
More from this community:

Mobile Computing

  • Live and recorded (1206)
  • Upcoming (22)
  • Date
  • Rating
  • Views
  • Join us this week for a special 30-minute live session on how RingCentral integrates with Zendesk for improved workflow and increased productivity.

    Tune in every Friday for RingCentral Live. We’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session also features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
  • Early on expectations from B2B buyers in their journey set the stage for marketing and sales to work together. As leads flow in, an agreed-upon plan and process should be in place for lead identification, distribution and follow-up. This optimized plan and process can make a huge difference between smooth sailing or rough seas in the next steps of the journey for the marketing and sales teams and most importantly, the buyer.

    So, what does this process look like, and how can an optimized lead process affect not only the quality of the buyer's journey, but opportunity generation? Join Isaac Payne, Marketing Operations Specialist, and Ali Gooch, Sr. Sales Manager-both of Pardot, as they explore and give us tips on how we can get the most out of an optimized lead process.
  • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

    SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

    Key Takeaways:
    • Security considerations in each of the architecture layers
    • Data isolation risks and mitigation plans
    • Overview of CWE/SANS and OWASP Security threats
    • Data retention and termination policies
    • Infrastructure and cloud related security risks and solutions
  • Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
  • There are more costs to your phone system than you think. From capital expenditures to software upgrades, your phone system could be costing you. Join Matt McGinnis, Senior Director of Product Marketing at RingCentral, as he discusses the total cost of ownership (TCO) of an on-premise phone system and how you can see up to a 70% savings on your phone bill.
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.

    This week tune in and learn about how RingCentral integrates with Google Gmail, Calendar, Docs and more.
  • Mobile applications, cloud computing and BYOD (Bring Your Own Device) are reshaping nearly every aspect of your business, from revenue opportunities to how and where your employees work. They’re also forcing you to reinvent your security policies. Otherwise every device, from laptop to smartphone, is a data breach waiting to happen.

    In Pulse Secure’s webinar on March 19, Senior Principal Analyst Jon Oltsik of Enterprise Strategy Group will explore the new world of mobile security:

    User role, device type, network location & factors define your new security needs.

    Creating - Enforcing - Effective network access policies for secure mobile processes.

    How top organizations are tackling mobile security.
  • Mobile apps present a unique challenge for e-commerce merchants. Not only do they need to positively engage your customers, they must also generate revenue for your company. 

    So what keeps customers happy and coming back for more? Apps that support the on-the-go lifestyle and are engaging enough to keep users interested for the long term.

    In this webinar, 5 Tips to make sure customers transact with your app, we'll provide a clear roadmap for success that focuses on specific dos and don'ts, including:

    - DO NOT be insensitive to data privacy concerns
    - Do pay close attention balancing functionality with download speed
  • Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.

    Why You Should Attend:
    • Understand the “risk premium” ascribed to the cloud versus the private data center.
    • Learn why the cloud requires new processes for governance and compliance.
    • Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
    • Understand how to build a holistic approach to cloud security.
  • Channel
  • Channel profile
Network Security Education
To help educate end users about the different option regarding network Security and how the work with Anti-Virus solutions

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Creating and Managing a Cyber Security Policy: Tips for the SMB
  • Live at: Mar 21 2012 5:00 pm
  • Presented by: Stephen Cobb, Security Evangelist, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this