Establish & Integrate a Proactive, End-to-End Compliance Program

Manage webcast
Jeramy Cooper-Leavitt; Orbitz World Wide, Director of Compliance
IT Security requires a proactive approach to the latest threats that can impact an organization. As security professionals, we have several options available to us to keep up on the latest security threats that will impact an organization. The security threats and impacts to an organization can be world-wide and these threats know no boundaries. Compliance impacts are also evolving. We have seen since the growth of the internet, that many countries, U.S. States, Industries, etc. are now developing their own rules that impact how IT governance should be administered in organizations. If security and compliance organizations do not stay on top of these developing compliance trends, the impact of compliance changes can have a negative effect. A proactive approach to compliance is required along with some help from your legal department! After all, compliance "threats" know no boundaries!
Oct 28 2010
46 mins
Establish & Integrate a Proactive, End-to-End Compliance Program
Security Compliance IT
Join us for this summit:
More from this community:

Social Media Marketing

  • Live and recorded (503)
  • Upcoming (26)
  • Date
  • Rating
  • Views
  • Join us on 29th July for a webinar looking at how to make the most of your entry into the Masters of Marketing. Covering the entry process, what to include, some ideas to help capture the judges attention, as well as some hints and tips to help you showcase your work in the best possible light.
  • Whether you are a B2B organisation looking to capture attention at an industry event or a consumer brand sweeping into a trending conversation - there is real value to be gained from engaging in real- time or "owning your moment" in social media.

    With the right approach, you can ride the wave of social conversation to increase awareness, engage a highly targeted audience, drive interest and ultimately sales!

    Learn from our own experience riding the wave at #SMWF, as well as case studies from our work with Interflora, Thomson Reuters and Southbank Centre as we explore how to:

    -Effectively plan to own your moment using social insight
    -Resource your teams to react in real-time and approve content fast
    -Leverage paid social to ride that wave
    -Equip yourself with the right tools (free, not just paid!) to maximise the opportunity
    -Measure the effectiveness of your activity and prove ROI
  • Join Lattice for a guided tour of the marketing tech stack that powers Acquia's demand gen engine.

    In recent years, B2B marketers have been confronted with a barrage of new technologies and systems aimed at making them more productive, efficient and successful. But which technology investments are worth making and what do you need to know before adding new systems to your technology stack?

    Show Me Your Stack (#MKTGstack) is an ongoing webinar series featuring a roster of forward-thinking B2B marketers that provides a glimpse into the marketing infrastructure that powers their demand gen engines and serves as the critical backbone to their business.

    Everything from CRM and marketing automation to content management, business intelligence and analytics systems will be covered – basically, anything in the stack!

    Each episode features a different marketer who will walk you through their marketing tech stack, share their goals and explain how their teams are structured. Don’t miss this rare chance to see how the best in the business invest in and use marketing technology.

    About Acquia:
    Acquia is the digital experience company. Intuit, Warner Music Group and Stanford University are among the more than 4,000 organizations that are transforming their digital businesses with Acquia’s open cloud platform. Global 2000 enterprises, government agencies and NGOs rely on Acquia to create new revenue streams, lower costs, and engage audiences more deeply through content, community, commerce and context.
  • How do you deliver great digital experiences in today's mobile-first, multi-touchpoint, omnichannel world? The answer is to map customers' journeys against your mobile and web touchpoints, then harness context - full knowledge of a customer's history, preferences, behaviors, and location - to tailor the experience.

    Increasingly, organizations are looking at Web Content Management (WCM) solutions in the cloud. Why? Because in the cloud, you can rapidly deploy sites, reach mobile devices, secure against attacks, and scale to meet demand.

    In this session you will:

    * See the data highlighting major trends driving interest in "WCM in the Cloud"

    * Understand the pros and cons of moving your WCM to the Cloud

    * Master the role of the cloud in delivering great digital experiences.

    * Build support and a roadmap to use the cloud in your digital experience delivery strategy.
  • Join Silverpop Marketing Expert Ellen Valentine, as she reviews customer journey planning techniques and how to use the output from this strategic work to improve your digital marketing efforts.
    Learn how to:
    •Determine the key stages in the customer journey
    •Map out the buyer’s thoughts and needs at each stage
    •Identify areas you can improve to enhance the customer experience
    •Use a multichannel approach to connect more effectively with contacts
    •Expedite prospects’ and customers’ movement along the customer journey
  • It's often said that retaining customers is a lot easier and cheaper than finding new ones. But how do you put this into practice and use data to your advantage?

    In this webinar, DueDil analyst Andrew Warren-Payne will discuss why B2B customer marketing is so important and how you can put a plan into place. He will cover:
    -) Setting goals and objectives for B2B customer marketing
    -) How to map your customer lifetime journey and plan your communications accordingly
    -) How to prioritise your existing customers using first party and third party data for retention and upselling activity
    -) How to work together with sales and account managers for maximum effect
  • Get lots of clever tips and techniques to create more effective landing pages immediately.

    This fast-paced, practical webinar includes more than 40 examples, good and bad and is led by popular content trainer and Sticky Content founder, Catherine Toole.

    In just 45 minutes you’ll have learned how to:

    rock a title – even on a small screen
    catch attention from the get-go using bold openers and frontloading
    organise information for optimal effect
    get original approaches signed off and through compliance
    optimise pages for conversion
    delight customers and prospects by satisfying needs and goals
    nudge users down specific paths
    Get better at landing pages in under an hour – sign up for our webinar now.
  • Recent studies show people want to develop more meaningful relationships with brands. The rewards for brands who truly collaborate with their customers and involve them at the heart of their marketing are great, with genuine advocacy leading to more sales, increased brand awareness, meaningful customer insights, user generated content and more.

    This webinar will share how, by putting your customers centre stage, you can develop the meaningful relationships they seek and work with them to thrive in this brave new era of marketing.
  • Date and time: July 15, 2015; 10 am PST/1 pm EST

    Analyst: Andrew Jones, VentureBeat
    Panel of Experts:
    Greg Petro, Chief Executive Officer, First Insight
    Rich Lesperance, VP Digital Marketing and CRM, GrubHub
    Elena Zheleva, Director of Data Science, LivingSocial

    Sponsored by Autopilot

    Abstract:

    Personalization is critical to the success of your business model. Many of the most innovative and beloved companies in recent history -- think Facebook, Amazon, Google, Netflix, Pandora, Spotify and Hulu, just to name a few -- have transformed customer expectations and disrupted their individual industries. Now customers expect it. It increases clicks, open rates and conversions -- usually by pretty substantial margins. But -- how do you DO it?

    The process is different at every step of the customer journey and there's a lot that goes into personalization. What's more, there's a lot more ways to reach your customers than ever. Personalizing display ads is very different from personalizing emails or a mobile app experience. The data, content, and delivery mechanisms necessary to personalize those messages changes -- and so should your strategy.

    We're taking a holistic look at the art of personalization -- from customer expectations to ROI. We'll show you a new way of looking at identity -- from both the customer's behavior to predicting their behaviors.

    In this webinar, you'll:

    * Learn how to collect data that helps visualize the customer's journey
    * Get tips on one of the biggest challenges to increasing the ROI of marketing automation
    * Access the theory of identity enrichment
    * Gain insight into best practices for personalization in different channels

    Register for this webinar today and get started doing personalization right!
  • Date and time: July 15, 2015; 10 am PST/1 pm EST

    Analyst: Andrew Jones, VentureBeat
    Panel of Experts:
    Greg Petro, Chief Executive Officer, First Insight
    Rich Lesperance, VP Digital Marketing and CRM, GrubHub
    Elena Zheleva, Director of Data Science, LivingSocial

    Sponsored by Autopilot

    Abstract:

    Personalization is critical to the success of your business model. Many of the most innovative and beloved companies in recent history -- think Facebook, Amazon, Google, Netflix, Pandora, Spotify and Hulu, just to name a few -- have transformed customer expectations and disrupted their individual industries. Now customers expect it. It increases clicks, open rates and conversions -- usually by pretty substantial margins. But -- how do you DO it?

    The process is different at every step of the customer journey and there's a lot that goes into personalization. What's more, there's a lot more ways to reach your customers than ever. Personalizing display ads is very different from personalizing emails or a mobile app experience. The data, content, and delivery mechanisms necessary to personalize those messages changes -- and so should your strategy.

    We're taking a holistic look at the art of personalization -- from customer expectations to ROI. We'll show you a new way of looking at identity -- from both the customer's behavior to predicting their behaviors.

    In this webinar, you'll:

    * Learn how to collect data that helps visualize the customer's journey
    * Get tips on one of the biggest challenges to increasing the ROI of marketing automation
    * Access the theory of identity enrichment
    * Gain insight into best practices for personalization in different channels

    Register for this webinar today and get started doing personalization right!
  • Channel
  • Channel profile
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • The Microsoft Digital Crimes Unit Aug 5 2015 5:00 pm UTC 20 mins
    David Finn, Executive Director, Digital Crimes Unit, Microsoft
    Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world.
  • An Offensive Strategy for Today's Cyber Warzone: Winning With Cyber Campaigns Aug 3 2015 8:00 pm UTC 60 mins
    Chris Inglis, former Deputy Director of the NSA and Al Corchuelo, President, Recruit Leaders LLC
    In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • How the United States Postal Service secured their email channel against fraud Recorded: Jul 30 2015 26 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Hunting Hackers in the Carding Underground Recorded: Jul 30 2015 26 mins
    Grayson Lenik, Director of Digital Forensics and Incident Response at Nuix
    The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

    This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

    You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
  • Contextual Analytics: A Deep Dive into the Contextualization of Threat Data Recorded: Jul 30 2015 27 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Surviving the incident response surge: Detecting and Investigating Incidents Recorded: Jul 29 2015 50 mins
    Christian Kirsch, Principal Product Marketing Manager, Rapid7
    As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.

    Participants will learn:
    · Methods for simplified discovery of anomalous user behavior

    · Strategies for enabling fast incident response decisions

    · How to cope when bombarded with false positive alerts

    · Common attacker methods (and why they’re so often successful)

    · Why you need to monitor privileged and risky accounts
  • Constrained or Unleashed:Is your Identity Mgt Ready for Consumer-scale Business? Recorded: Jul 29 2015 57 mins
    John Hawley, Vice President of Security Strategy at CA Technologies
    Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.

    As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
  • Sophisticated Incident Response Requires Sophisticated Activity Monitoring Recorded: Jul 29 2015 41 mins
    Mike Sanders, Principal SE and Team Lead, Imperva and Bryan Orme, Principal, GuidePoint Security
    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:
    · Discover sensitive data, risk, and vulnerabilities
    · Detect and block active attacks
    · Investigate incidents and automate remediation
    · Demonstrate consistent policy application across all sensitive data
  • Data Security in 2015: Is it getting better? Recorded: Jul 29 2015 49 mins
    Graham Cluley
    Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.

    With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.

    All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
  • Uncovering Security Performance Myths & Realities Recorded: Jul 28 2015 62 mins
    Tom Turner, EVP, BitSight
    Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • Detect Ransomware Before Its Too Late with AlienVault USM Recorded: Jul 28 2015 58 mins
    Mark Allen, Technical Sales Engineer
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Lessons Learned From the Biggest Security Breaches Recorded: Jul 28 2015 58 mins
    Michael Sutton, VP of Security Research at Zscaler,John Kindervag, VP and Principal Analyst at Forrester Research
    The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • Insider threats - How to fight vulnerability from within the company Recorded: Jul 28 2015 34 mins
    Niels von der Hude , Director of Market Development, Beta Systems Software
    Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
  • Security Lessons Learned from Target, Niemen Marcus, Sony and Other Breaches Recorded: Jul 28 2015 98 mins
    Randy Franklin Smith: Windows Security Subject Matter Expert; Erick Ingleby: Product Manager, LogRhythm, Inc.
    With major data breaches on the rise, it’s hard to deny that they've become a common occurrence in the security threat landscape. Large companies such as Target, Nieman Marcus and Sony (among others), have suffered major data breaches in the past year.

    As security professional, it is important to understand why and how these organizations were breached so you can learn from what was done right, what worked and what didn’t.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, will discuss lessons learned from recent breaches. By analyzing the available information about recent data breach incidents from the perspective of detection, Smith and Ingleby have assembled a list of security monitoring lessons and ideas.

    You’ll get tips on how to eliminate double false positives, a number of generalized monitoring scenarios and guidelines on how to monitor for new executables running for the first time on your environment.
  • A Business Risk Approach to IT Governance Recorded: Jul 23 2015 62 mins
    Eric Kavanagh (Moderator); Paul Quanrud, TCS; Keith Breidt, Booz Allen Hamilton; Yo Delmar, MetricStream
    As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.

    Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.

    If you would like to attend please confirm your position below.
  • Transforming email security: Building a strategic plan for CISOs Recorded: Jul 23 2015 58 mins
    Jim Routh, CISO, Aetna and Chris McClean, VP of Research, Forrester
    The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • Be Fast, but be Secure—a New Approach to Application Security Recorded: Jul 23 2015 53 mins
    Gerben Verstraete, Cindy Blake, HP
    Cloud computing and DevOps are letting enterprises deploy new software faster than ever. But with development organizations focused on speed, are you achieving time to market at the expense of cyber security?

    Run time application self-protection (RASP) is a new approach to application security that enables production applications to spot and block cyber attacks from within the application itself—without recompiling and without sacrificing performance. Join the webinar to learn:

    How to enable new and legacy applications to protect themselves in as little as 10 minutes
    The four situations where RASP is the best solution
    Why Gartner says RASP is a must-have technology for bi-modal IT
  • System Dynamics of the 0day Market Recorded: Jul 23 2015 31 mins
    Katie Moussouris, Chief Policy Officer, HackerOne
    When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
trends, developments, and technology
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Establish & Integrate a Proactive, End-to-End Compliance Program
  • Live at: Oct 28 2010 3:00 pm
  • Presented by: Jeramy Cooper-Leavitt; Orbitz World Wide, Director of Compliance
  • From:
Your email has been sent.
or close
You must be logged in to email this