Browse communities
Browse communities
Presenting a webinar?

Establish & Integrate a Proactive, End-to-End Compliance Program

Jeramy Cooper-Leavitt; Orbitz World Wide, Director of Compliance
IT Security requires a proactive approach to the latest threats that can impact an organization. As security professionals, we have several options available to us to keep up on the latest security threats that will impact an organization. The security threats and impacts to an organization can be world-wide and these threats know no boundaries. Compliance impacts are also evolving. We have seen since the growth of the internet, that many countries, U.S. States, Industries, etc. are now developing their own rules that impact how IT governance should be administered in organizations. If security and compliance organizations do not stay on top of these developing compliance trends, the impact of compliance changes can have a negative effect. A proactive approach to compliance is required along with some help from your legal department! After all, compliance "threats" know no boundaries!
Oct 28 2010
46 mins
Establish & Integrate a Proactive, End-to-End Compliance Program
Security Compliance IT
Join us for this summit:
More from this community:

Social Media Marketing

  • Live and recorded (445)
  • Upcoming (7)
  • Date
  • Rating
  • Views
  • Real-time marketing meets real-time research: Understanding Consumers' Digital Media Addiction

    The goal for marketers is to present the right advertising message to the right person at the right time - no matter whether a person is surfing social media, watching television, checking their mobile phone or walking into a store. This becomes more and more difficult as media consumption is ever-changing. Furthermore, while we need to keep different communication methods in mind and optimise our messaging for the medium, we should also approach consumers holistically, understanding that they are who they are on mobile devices, in their cars listening to the radio, or while watching television.

    In addition to dissecting the typical consumer and their media consumption, we’ll discuss how this new world order requires complete cohesion between brands, their advertising and media agencies - all the while supported by smart, real-time market research. This presentation will focus on the consumers' role in that ecosystem and their ability to recognise and internalise the messages they are sent.
  • The Modern Marketing Experience offers an unprecedented opportunity to gain insights at a single premier event presented by Oracle. Experts in marketing automation, social marketing, content marketing, and big data will present you with the strategies and tactics you need to make modern marketing succeed in your organization. Engage with BrightTALK at MME15!
  • You've just learned that your CMS vendor has been acquired. Don't panic. Be prepared. Create an action plan that will guide you and your team through the uncertainty and to an informed decision that's best for your company.

    You’re probably asking a few questions:
    - What about the product roadmap they just showed me? Is it still valid?
    - What does this mean for our website update?
    - Who do we turn to for technical support?
    - What's the impact on our relationship with our service provider?

    Your CMS is the foundation for your website, so we know that this can be a time of stress, uncertainty, and misinformation. That’s why we've brought Cathy McKnight to the rescue. Cathy is a co-founder and the Vice President of Consulting at Digital Clarity Group, and has advised numerous clients who faced precisely this scenario. In this DNN webinar, Cathy covers:

    - Immediate next steps
    - How to weigh your options
    - Strategic advice on migrating your CMS to a new vendor (if necessary)

    Join Cathy to learn how to address your current (or future) situation.
  • Get your website visitors to take action:

    Social network share. Invite advocates to share content on Twitter, Facebook and LinkedIn.

    Create content. Incent users to create blog posts, discussions, ideas and questions.

    Comment on content. When users receive comments on their content, they’re more likely to remain interested in participating.

    Answer a question. Save the time of your customer care team by having your customers help answer questions.

    Vote on an idea or answer. Encourage customers to provide feedback on ideas and answers submitted by the community.
  • Analytics are key to making your company agile, and to making better market, customer, and competitive decisions. An analytics center of excellence provides the company with valuable insights, protects privacy and brand reputation, and guides the prioritization and selection of opportunities for greatest growth. Join Laura Patterson in a discussion about:

    · How an Analytics Center of Excellence make a difference to the company, customers, marketing

    · What is an Analytics Center of Excellence, establishing its purpose, and creating the vision

    · The key functions and capabilities needed

    · The journey’s key stages, associated challenges, and what do you need to do to get to the next step

    · What metrics you should select to measure the value and impact of an Analytics Center of Excellence
  • Want to grow your social media team by the hundreds or thousands? Employee advocacy is the solution that leading brands are investing in to raise brand awareness, drive sales leads and better engage their employees. However, to set up your employee advocacy program for success, you’ll need more than just the social media team’s support.

    Learn how leading companies achieve internal buy-in to launch an employee advocacy program, how to make a business case for adoption and the company-wide benefits of employee advocacy.
  • Testing is a key element of any marketing initiative and is often reiterated through the common mantra ‘Test it, test it again and finally test it’. User Acceptance Testing (UAT) of a new marketing solution is critical in the success and capability of your marketing efforts, so how is this approached and when do you know you have succeeded or not?

    In this session, Jim Roberts will look at the key elements and approach to the testing and validation of a marketing solution. He will explore the best approach, the key elements to consider, and how to determine a successful test.
  • Testing is a key element of any marketing initiative and is often reiterated through the common mantra ‘Test it, test it again and finally test it’. User Acceptance Testing (UAT) of a new marketing solution is critical in the success and capability of your marketing efforts, so how is this approached and when do you know you have succeeded or not?

    In this session, Jim Roberts will look at the key elements and approach to the testing and validation of a marketing solution. He will explore the best approach, the key elements to consider, and how to determine a successful test.
  • This webinar will be presented by Grant Johnson, VP of Strategy at ClickMail and Brian Steacy, Regional Director at Adestra. Grant and Brian will look at these two key marketing tactics and explain how they can form the basis of a successful marketing program.

    You’ll learn more about:

    The importance of email marketing
    How to make sure your emails get in your subscribers inboxes
    Ways to grab the attention of your recipients
    The growing influence of content marketing
    How to build content that engages your audience
    Testing to optimize your customer journeys
  • Speakers:
    Stewart Rogers: Director, Marketing Technology; VB Insight
    Tia Newcomer: Vice President, Marketing; Cord Blood Registry
    Ryan Steingard: Director, Retention Marketing; Zulily

    Abstract:

    A complete report on the current state of cost, payback and return within marketing technology.

    In this edition of the State of Marketing Technology, we look at the total cost of ownership across the most popular martech categories and show the ROI attributable to each of them.

    Which categories and tools provide the biggest return, and which are a waste of money?

    Which are the most expensive to own?

    Which tools might be best suited to your size of organization, and which should you discount from your selection criteria?

    And how do ROI levels change during different stages of marketing and sales?

    We also look at different approaches to marketing technology management, including insights on the shift from on-premise to cloud-based solutions, and uncover the reality of how many marketing technology projects fail to return on their investment.
  • Channel
  • Channel profile
  • Webroot’s 2014 Threat Brief Apr 16 2015 5:00 pm UTC 45 mins
    Grayson Milbourne, Security Intelligence Director
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
  • Next-Generation Security for Amazon Web Services Apr 16 2015 4:00 pm UTC 60 mins
    Matt Keil, Product Marketing, Palo Alto Networks
    Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages. Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.

    In this webinar, attendees will learn:
    - Common customer use cases for AWS
    - Key security challenges and considerations
    - How the VM-Series can protect your AWS environments
  • Surfacing Critical Cyber Threats Through Security Intelligence Apr 15 2015 4:00 pm UTC 45 mins
    Dr. Sameer Bhalotra, Former White House Director; Chris Petersen, CTO; Robert F. Lentz, Former CISO for the Dept of Defense
    The rapidly expanding supply chain supporting the cybercrime economy is empowering cyber criminals, cyber terrorists and even nation states in ways that put companies, critical infrastructure and governments at increased risk. The fate of an organization whose defenses have been compromised will be determined by the speed with which they can detect and respond to intruders. A mature security intelligence posture boosts an organization’s resiliency amidst these advanced threats. If intruders are detected early in their lifecycle, organizations can respond quickly and potentially avoid loss altogether.

    In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.

    Learn about:
    • Emerging cyber threat vectors in 2015.
    • Security Intelligence and the critical role it plays in addressing high-impact threats
    • Using the SIMM to assess your current Security Intelligence Maturity
    • How to move from “greatly exposed” to “highly resilient” via End-to-End Threat Lifecycle Management
  • The Dark Side of Anonymizers: Protect Your Network from the Unknown Apr 14 2015 5:00 pm UTC 45 mins
    Joanna Burkey, DVLabs Manager, HPSW HPN Security - Tipping Point
    While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
  • From the Front Lines: The Top 10 DNS Attacks Apr 9 2015 5:00 pm UTC 45 mins
    Srikrupa Srivatsan, Sr. Product Marketing Manager, Infoblox
    More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
  • Optimize Customer Signup Flows Online and in Your Mobile App Apr 9 2015 4:00 pm UTC 45 mins
    Chris Morton, President, Block Score; Lisa Aguilar, Marketing Manager, Jumio; James Bickers, Sr Editor, Networld Media
    In today’s online and mobile environment, financial service organizations are struggling to comply with a multitude of regulatory requirements that impede online and mobile customer signups. What is the best way to signup customers while still complying with regulations and mitigating fraud?

    Join us for a live webinar, “Optimizing customer signup flows in your mobile and web channels” and listen in as experts in ID authentication and identity verification discuss various strategies that will help you:

    · Quickly and safely signup customers through your mobile and online channels
    · Remain compliant with regulatory requirements without adding additional operational overhead
    · Reduce customer sign-up abandonment

    Don’t loose another customer because you can’t offer a real-time sign-up process through your online and mobile channels. Join us and learn how to optimize your sign-up flows, and enable anytime, anywhere through any digital channel customer account opening.
  • Looking Forward to HIMSS 2015: What are the latest trends? Apr 8 2015 5:00 pm UTC 60 mins
    Lysa Myers, Security Researcher III, ESET North America
    ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • How Mobile Data Protection Can Accelerate Top CIO Initiatives Apr 8 2015 4:00 pm UTC 60 mins
    Seyi Verma, Sr. Product Marketing Manager
    The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • ISA 62443 Patch Management Overview and Methods for Zero-Day Threat Protection Apr 8 2015 4:00 pm UTC 75 mins
    Joe Weiss, Managing Director for ISA99; William Cotter, Systems Engineering Specialist; Delfin Rodillas, Sr. Manager of SCADA
    The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety. Patch management is one particular area of cybersecurity which requires special attention when applied to ICS. It is part of a comprehensive cybersecurity strategy that increases cybersecurity through the installation of patches that resolve bugs, operability, reliability, and cyber security vulnerabilities. The ISA-TR62443‑2‑3 technical report, developed by the ISA 99 Working Group 6, addresses the patch management aspect of ICS cyber security. Also part of an effective strategy is the use of compensating cybersecurity controls to protect ICS systems from exploits and malware in between often long patching cycles. Novel network and host based technologies have recently become available to address even zero-day threats which bypass conventional signature-based approaches.

    Attendees of this webinar will leave with a better understanding of:
    -The unique aspects of ICS that entail a different and more rigorous approach to patch management than that used in business networks
    - An overview of the ISA 99 standards efforts with detail review of the main aspects of the ISA-TR62443-2-3 Technical Report on Patch Management in IACS
    - Advancements in compensating cybersecurity controls for protecting systems from zero-day threats
  • Why DDoS Makes for Risky Business – And What You Can Do About It Apr 8 2015 3:00 pm UTC 60 mins
    Dave Shackleford, IANS Lead Faculty and Tom Bienkowski, Director of Product Marketing
    Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.

    It’s time to debunk some misconceptions about DDoS.

    Attend this webinar to learn:

    - Why a single layer of DDoS protection isn’t enough
    - How the impact of a DDoS attack is significantly more costly than protection options
    - The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
  • Your organization has been breached, now what? Recorded: Mar 31 2015 32 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • UTM + USM: All you need for complete Threat Management Recorded: Mar 31 2015 48 mins
    Patrick Bedwell, AlienVault; Neil Matz, Fortinet
    Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • Bridging the Trust Gap for Identity Services Based Market Growth Recorded: Mar 30 2015 48 mins
    Joni Brennan, Executive Director, Kantara Initiative
    In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • Insights From CyberEdge’s 2015 Cyberthreat Defense Report Recorded: Mar 27 2015 44 mins
    Steve, CEO, CyberEdge Group
    CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • Anatomy of a DNS Security Breach Recorded: Mar 26 2015 26 mins
    Srikrupa Srivatsan, Sr. Product Marketing Manager, Infoblox
    DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • A Zero-Day Agnostic Approach to Defending Against Advanced Threats Recorded: Mar 26 2015 51 mins
    Eric Hanselman, Chief Analyst, 451 Research & Dave Karp, VP Technical Enablement, Digital Guardian
    As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • New Attack Intelligence Capabilities Coming Soon - Get a Sneak Peek! Recorded: Mar 26 2015 48 mins
    Todd Harris, Director of Product Marketing; Ray Suarez, Director of Product Management, Core Security
    Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • See something say something: A humanistic approach to security intelligence Recorded: Mar 26 2015 25 mins
    Ronnie Tokazowski, Senior Researcher and Shyaam Sundhar, Senior Researcher, PhishMe
    Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Simplifying Private Cloud Deployments: The Next Generation of Network Automation Recorded: Mar 26 2015 29 mins
    Matt Gowarty, Sr. Product Marketing Manager
    Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
trends, developments, and technology
Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Establish & Integrate a Proactive, End-to-End Compliance Program
  • Live at: Oct 28 2010 3:00 pm
  • Presented by: Jeramy Cooper-Leavitt; Orbitz World Wide, Director of Compliance
  • From:
Your email has been sent.
or close
You must be logged in to email this