Hi [[ session.user.profile.firstName ]]

Governance, Risk, and Compliance

  • Date
  • Rating
  • Views
  • 5 Steps to Building Your Data Governance Plan 5 Steps to Building Your Data Governance Plan Chris Slovak & Maltie Maraj, Tealium Recorded: Sep 21 2016 45 mins
    Three-quarters of Americans believe that control over their personal data is very important, but only 9% believe they have this control. Up until now, data governance and protection have been a low priority for brands, but the long-term impact of a data breach can lead to a loss of consumer confidence – not to mention massive financial implications. How do you balance the opportunity to provide the best customer experience with the increasing responsibilities in data privacy and security?

    In this webinar, we’ll discuss five industry best practices for building an effective data governance plan. From the vendors you choose to work with, to the policies and practices in place today, learn how to make sense of the current legal landscape and how Tealium’s solutions allow you to provide these safeguards to your customers.
  • DevOps, Security and PCI - Implementing SCM To Meet PCI Standards DevOps, Security and PCI - Implementing SCM To Meet PCI Standards Kevin Eberman, Director of Operations at MineralTree Recorded: Sep 7 2016 49 mins
    Security failures with millions of stolen credit cards have become an all too normal part of the news. The Payment Card Industry (PCI) has issued a standard for companies and service providers for handling credit cards to mitigate the risk of these breaches. Implementing a PCI certified environment requires a coordinated and sustained commitment to security by adopting policies, writing procedures, and an ability to successfully demonstrate compliance during audits.

    A number of PCI standards require the implementation of Server Configuration Management (SCM). SCM is an integral tool of DevOps. It is invaluable for meeting PCI requirements that are technical and need documentation. This discussion will review security challenges, which PCI requirements can be met with SCM and how to successfully implement SCM to meet PCI standards.
  • Cybersecurity Risk: Addressing the Human Factor Cybersecurity Risk: Addressing the Human Factor Kirsten Liston, SVP Product & Market Strategy at Threat Ready Resources Recorded: Sep 7 2016 45 mins
    The majority of security breaches are due to attackers getting a hold of compromised credentials. Join this talk and learn the security risks associated with human errors, and how to minimize your organization's risk exposure.

    This presentation will cover:
    - Why it's crucial to train employees to recognize and defend against cyber threats
    - What many training initiatives get wrong
    - How you can leverage the science of learning to create engaging training that changes behavior
  • The PCI Dream Team – Bring Us Your Trickiest PCI Questions The PCI Dream Team – Bring Us Your Trickiest PCI Questions Moderator: Ben Rothke; Panelists: David Mundhenk, Arthur Cooper, Jim Seaman Recorded: Sep 7 2016 60 mins
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jim Seaman for an interactive session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Moderator:
    - Ben Rothke, Senior eGRC Consultant at Nettitude Ltd.

    Panelists:
    - David Mundhenk, CISSP, PCIP, QSA (P2PE), PA-QSA (P2PE)
    Sr Consultant at an unnamed GRC consulting firm
    - Arthur Cooper "Coop", Sr Security Consultant at NuArx Inc.
    - Jim Seaman MSc, CCP, CISM, CRISC, QSA, M.Inst.ISP
    Security Consultants Team Lead at Nettitude, Ltd.
  • Stop Reading the WSJ and Focus on Your Cyber Risks Stop Reading the WSJ and Focus on Your Cyber Risks Jay Schulman, Principal Security and Privacy at RSM US LLP Recorded: Sep 6 2016 41 mins
    Too many organizations are focused on what issues others are having and don't pay enough attention to what inherent cybersecurity risks they are facing.
    Today's speaker, Jay Schulman, Principal Security and Privacy at RSM US LLP will walk through a concept called "Organizational Threat Modeling." Learn to take a holistic approach to security and look at the overall threats to the organization and then determine a method to address, accept or hedge risks.
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Cloud Week 2016 Sneak Preview Cloud Week 2016 Sneak Preview BrightTALK Recorded: Aug 15 2016 2 mins
    Check out a sneak preview of what's to come in this year's Cloud Week on BrightTALK! This is one of our largest events of the year, and is a must-see for all cloud computing professionals.
  • Delivering Data Security with Hadoop and the IoT Delivering Data Security with Hadoop and the IoT Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security Recorded: Aug 9 2016 62 mins
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
  • Cloud Object Storage 101 Cloud Object Storage 101 Nancy Bennis, Director of Alliances, Cleversafe an IBM Company, Alex McDonald, Chair, SNIA Cloud Storage Initiative, NetApp Recorded: Jul 14 2016 63 mins
    Object storage is a secure, simple, scalable, and cost-effective means of embracing the explosive growth of unstructured data enterprises generate every day.
    Many organizations, like large service providers, have already begun to leverage software-defined object storage to support new application development and DevOps projects. Meanwhile, legacy enterprise companies are in the early stages of exploring the benefits of object storage for their particular business and are searching for how they can use cloud object storage to modernize their IT strategies, store and protect data while dramatically reducing the costs associated with legacy storage sprawl.
    This Webcast will highlight the market trends towards the adoption of object storage , the definition and benefits of object storage, and the use cases that are best suited to leverage an underlying object storage infrastructure.
    In this webcast you will learn:
    •How to accelerate the transition from legacy storage to a cloud object architecture
    •Understand the benefits of object storage
    •Primary use cases
    •How an object storage can enable your private, public or hybrid cloud strategy without compromising security, privacy or data governance
  • Virtual Data and Data Masking: The New Approach to Data Security Virtual Data and Data Masking: The New Approach to Data Security Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant Recorded: Jul 12 2016 47 mins
    A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior--the data itself. In particular, the combination of virtual data and data masking is proving to be a powerful way for enterprises to safeguard sensitive data from both insider and outsider threats.

    View this webinar to learn:

    How data masking is superior to solutions based on encryption and firewalls
    What virtualized data is, and how it forms the foundation for an effective security strategy
    Why integrating data masking with virtual data reduces your surface area of risk by 90%

Embed in website or blog