Hi [[ session.user.profile.firstName ]]

Four traits of successful information security leaders

Kevin Beaver, renowned Independent Information Security Consultant, Author, Expert Witness and Professional Speaker at Principle Logic, LLC and former Information Security Manager at RubberNetwork.com, will be addressing the essential traits for success in a high level information security career.
Kevin Beaver, renowned Independent Information Security Consultant, Author, Expert Witness and Professional Speaker at Principle Logic, LLC and former Information Security Manager at RubberNetwork.com, will be addressing the essential traits for success in a high level information security career.
Recorded Jun 21 2012
48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Beaver
Presentation preview: Four traits of successful information security leaders
Recommended for you:
  • Date
  • Rating
  • Views
  • GDPR Summary:  Why encryption and other measures are now a must? GDPR Summary: Why encryption and other measures are now a must? Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker Live 60 mins
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • La VoIP et une astuce concernant OptiView XG dont vous ne soupçonniez pas l’exis La VoIP et une astuce concernant OptiView XG dont vous ne soupçonniez pas l’exis Thierry Mas Recorded: May 24 2016 57 mins
    Votre entreprise possède au moins un OptiView ®, vous savez donc probablement que cette tablette constitue le moyen le plus rapide de prouver qu’un problème « ne se situe pas au niveau du réseau » et d’en identifier l’origine.

    Mais saviez-vous qu’il est possible d’associer OptiView XG et TruView Live afin d’étendre la portée de la tablette au-delà d’une connexion directe, et permettre le dépannage de services basés dans le cloud, d’applications SaaS et, désormais, du trafic VoIP ?

    Inscrivez-vous à notre session en ligne gratuite. Vous découvrirez les avantages de cette technologie :
    •Tester les performances et la connectivité des transactions d’applications Web
    •Surveiller la disponibilité des services VoIP ainsi que la qualité des appels
    •Etablir des points de comparaison en temps réel sur la qualité du réseau
  • Accessible and Affordable 3rd Party API and Microservice Integration Testing Accessible and Affordable 3rd Party API and Microservice Integration Testing Nathan Devoll, SV Consultant, CA Technologies Recorded: May 21 2016 56 mins
    Creating seamless digital experiences for customers can require hundreds of systems and services to work together. Not only do you have to worry about your own internal systems, but now in the world of APIs and microservices you also have to worry about how these external systems are going to work with yours.

    Testing dependencies on 3rd party services presents unique challenges. Many 3rd parties charge access fees for test interfaces and the availability and performance of the interfaces may not be the same as the production versions.

    Learn how service virtualization can be used to:
    •Virtualize 3rd party services so they are accessible all the time without fees
    •Replicate production like dependencies for testing
    •Reproduce production defects for faster remediation
    •Eliminate scheduling conflicts and enable parallel development
    •Generate virtualized data
  • Make Testing More Agile and Eliminate Excuses Make Testing More Agile and Eliminate Excuses Chris Kraus, CA Technologies Recorded: May 21 2016 57 mins
    Working in QA and testing has never been more challenging. Development is turning out new code faster than ever, and test backlogs just keep piling up. Errors that make it into production then need to be traced and fixed, adding to the backlog.

    Discover how test automation, service virtualization, and test data management can help you make your testing more agile—and permanently eliminate the excuses.

    You will learn how to avoid these common excuses with the following skills:
    •The dog ate my data: Simplify test data management and increase test coverage
    •That application was before my time: Automate tests for poorly documented systems
    •Nobody told me that: Improve test case requirements with visualization
    •I didn’t have time to test that: Accelerate testing with test automation and open source code
    •It worked fine on my machine: Use service virtualization to create production-like test environments in minutes
  • May 19th 2016 - PROTECT Webcast May 19th 2016 - PROTECT Webcast Edward Preston Recorded: May 19 2016 60 mins
    Join us on May 19th 2016 for the "Introducing PROTECT" webinar, offering a complete look at HOW our solution works to find threats that the others simply miss

    You'll learn:

    WHO CylancePROTECT was built to protect
    WHY math and machine learning are the future of security
    HOW CylancePROTECT catches what the others miss

    To reserve your spot, please register today!
  • Life after platform EOS: Vulnerabilities keep coming…and they don't expire Life after platform EOS: Vulnerabilities keep coming…and they don't expire Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro Recorded: May 19 2016 31 mins
    If you’re like 58% of organizations out there, you're still in the process of migrating off Windows Server 2003...almost a year after it went End of Support. Regardless of the end of support environment you’re dealing with, vulnerabilities will still keep coming...and so will the attacks looking to take advantage of them, including high profile varieties like Ransomware. The good news is that there are effective ways to deal with end of support platforms while you transition. In this session you will learn about:
    • The latest in vulnerabilities, including those affecting EOS platforms like Windows Server 2003
    • Best practices for protecting EOS platforms from attacks, including Ransomware
    • How Trend Micro’s proven security can help
  • 5 Things You Need to Know About Enterprise Flash 5 Things You Need to Know About Enterprise Flash Adam Roberts, Chief Architect, SanDisk Recorded: May 19 2016 44 mins
    When considering flash storage, there are many misconceptions and outright myths. Especially when equating consumer-grade flash (USB sticks) to enterprise-grade SSDs. In this webinar SanDisk Chief Architect, Adam Roberts, will discuss 5 myths of flash storage and highlight what you need to look out for when choosing a storage device to accelerate your data center storage. This webinar will cover:

    1.Data Protection
    2.Power Fail Protection
    3.Temperature Throttling/Overheating
    4.QoS for Performance
    5.SSD Endurance

    Stay tuned for future webinars which will look at the benefits of flash beyond performance…busting a few more myths on flash.
  • Emerging Technologies in Storage: Disaggregation of Storage Function Emerging Technologies in Storage: Disaggregation of Storage Function Jeff Kato, Taneja Group; Brian Biles, Datrium; Patrick Osborne, HPE; Kevin Fernandez, Nutanix Recorded: May 19 2016 64 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the newest trends in storage: Disaggregation of traditional storage functions. A major trend within IT is to leverage server and server-side resources to the maximum extent possible. Hyper-scale architectures have led to the commoditization of servers and flash technology is now ubiquitous and is often times most affordable as a server-side component. Underutilized compute resources exist in many datacenters as the growth in CPU power has outpaced other infrastructure elements. One current hot trend— software-defined-storage—advocates collocating all storage functions to the server side but also relies on local, directly attached storage to create a shared pool of storage. That limits the server’s flexibility in terms of form factor and compute scalability.

    Now some vendors are exploring a new, optimally balanced approach. New forms of storage are emerging that first smartly modularize storage functions, and then intelligently host components in different layers of the infrastructure. With the help of a lively panel of experts we will unpack this topic and explore how their innovative approach to intelligently distributing storage functions can bring about better customer business outcomes.

    Moderator:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group

    Panelists:
    Brian Biles, Founder & CEO, Datrium
    Patrick Osborne, ‎Senior Director of Product Management and Marketing, HPE
    Kevin Fernandez, Director of World Wide Technical Marketing, Nutanix
  • Emerging Technologies in Storage: Disaggregation of Storage Function Emerging Technologies in Storage: Disaggregation of Storage Function Jeff Kato, Taneja Group; Brian Biles, Datrium; Patrick Osborne, HPE; Kevin Fernandez, Nutanix Recorded: May 19 2016 64 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the newest trends in storage: Disaggregation of traditional storage functions. A major trend within IT is to leverage server and server-side resources to the maximum extent possible. Hyper-scale architectures have led to the commoditization of servers and flash technology is now ubiquitous and is often times most affordable as a server-side component. Underutilized compute resources exist in many datacenters as the growth in CPU power has outpaced other infrastructure elements. One current hot trend— software-defined-storage—advocates collocating all storage functions to the server side but also relies on local, directly attached storage to create a shared pool of storage. That limits the server’s flexibility in terms of form factor and compute scalability.

    Now some vendors are exploring a new, optimally balanced approach. New forms of storage are emerging that first smartly modularize storage functions, and then intelligently host components in different layers of the infrastructure. With the help of a lively panel of experts we will unpack this topic and explore how their innovative approach to intelligently distributing storage functions can bring about better customer business outcomes.

    Moderator:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group

    Panelists:
    Brian Biles, Founder & CEO, Datrium
    Patrick Osborne, ‎Senior Director of Product Management and Marketing, HPE
    Kevin Fernandez, Director of World Wide Technical Marketing, Nutanix
  • How to Spend Your Cloud Security Dollar How to Spend Your Cloud Security Dollar Tricia Pattee, HOSTING Director of Managed Services Recorded: May 19 2016 37 mins
    Join cloud security expert Tricia Pattee on May 19 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Four traits of successful information security leaders
  • Live at: Jun 21 2012 5:00 pm
  • Presented by: Kevin Beaver
  • From:
Your email has been sent.
or close
You must be logged in to email this