Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Consumerisation of Corporate IT - Stories from the Front Line
      The Consumerisation of Corporate IT - Stories from the Front Line Peter Wood, Partner & CEO, First Base Technologies Recorded: Jul 16 2013 9:00 am UTC 46 mins
    • Synopsis:
      Cool technologies show up for the consumer market before they're available to the business market. Employees are either going to figure out ways around the corporate security rules, or they're going to take another job with a more trendy company. Either way, senior management is going to tell security to get out of the way. It might even be the CEO, who wants to get to the company's databases from his brand new iPad, driving the change. It's going to be harder and harder to say no. Peter Wood looks at what firms are doing to answer this challenge and offers some pragmatic advice

      About the speaker:
      Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio and written many articles on a variety of security topics.

      Peter has worked in the electronics and computer industries since 1969. He has extensive experience of communications and networking, with hands-on knowledge of many large-scale systems. He founded First Base Technologies in 1989, providing information security consultancy and security testing to commercial and government clients. Peter has hands-on technical involvement in the firm on a daily basis, working in penetration testing, social engineering and awareness.

      Read more >
    • Mind the Gap - 5 Ways to Bring Scattered Teams Together
      Mind the Gap - 5 Ways to Bring Scattered Teams Together Josh Duncan, Senior Product Director, Lifesize Recorded: Sep 1 2016 3:00 pm UTC 49 mins
    • As your organisation’s workforce becomes more remote and IT demands become scattered and complicated, it’s important to keep your company’s teams connected and IT systems easy to manage.

      Join Lifesize Senior Product Director Josh Duncan Thursday September 1, as he discusses ways to enhance connectivity and communication in businesses with hundreds and thousands of employees located across the world or just down the street.

      We’ll discuss:

      •Why connectivity is more important than ever

      •How the consumerisation of IT is impacting workforce expectations

      •How reducing the number of tools your company is using will make your organisation leaner, more efficient, and more profitable

      •How the right platform for cloud video conferencing can positively transform your communication and IT efficiency

      •What to look for when evaluating video conferencing solutions

      Read more >
    • Securing Mobile Devices – Challenges and Opportunities for IT Security
      Securing Mobile Devices – Challenges and Opportunities for IT Security Steve Durbin, Vice President, Information Security Forum Recorded: Feb 6 2013 11:00 am UTC 45 mins
    • Synopsis:
      Recently highlighted as being one of the top 5 threats for 2013 by the ISF, this webinar maps out how you can respond to the ‘consumerisation’ challenge today – whatever stage you are at – based on current efforts to formulate good practice at leading ISF Member organisations around the world. It offers independent guidance on how to plan your security response not only in terms of how your people use mobile devices, but also in terms of protection solutions, provisioning and support, and meeting statutory requirements.

      About the speaker:
      Steve Durbin is Global Vice President of the Information Security Forum (ISF). He is a regular speaker and chair at global events and is quoted in the Financial Times, Wall Street Journal, Forbes, Deutsche Presse, Süddeutsche Zeitlung, CIO Forum, ZD Net, and Information Week.
      Steve has considerable experience working in the technology and telecoms markets and was previously senior vice president at Gartner. He is also currently chairman of the Digiworld Institute senior executive forum in the UK, a think tank comprised of Telecoms, Media and IT leaders and regulators.

      Read more >
    • Enterprise Mobile Security
      Enterprise Mobile Security Paul Schwarzenberger, Enterprise Security Architect, HP Enterprise Security Services Recorded: Apr 3 2012 2:00 pm UTC 60 mins
    • Senior executives are now demanding access to corporate e-mail and other business applications from iPads, iPhones and Android phones.
      This can cause a significant risk to the business through loss of corporate data, malicious applications and viruses – earlier this year Google identified 58 malicious applications on Android Market.
      This webinar on Enterprise Mobile Security will include:

      •overview of risks arising from the use of mobile devices
      •methods of mitigating mobile device risks and ensuring regulatory compliance
      •case study of mobile security implementation, and lessons learnt
      •demonstration of technical approaches to securing mobile devices and corporate data

      Paul Schwarzenberger:
      After graduation from Oxford University, Paul developed laser technology for NASA satellites, before moving into IT Security at Cable & Wireless in 2000, where he led the development of Internet Security Services. In 2005, Paul joined Vistorm, now HP Enterprise Security Services, as a Security Architect, where he is technical lead for mobile device and endpoint security solutions.

      Paul is CISSP and ITPC certified, is a CLAS consultant and M.Inst.ISP. He has recently completed the MSc Information Security at Royal Holloway, University of London.

      Read more >
    • 2013’s Invisible Network Threats: Identify And Respond
      2013’s Invisible Network Threats: Identify And Respond James Lyne, Director of Technology Strategy, Sophos; Richard Thomas, Labs Manager, West Coast Labs & Dan Raywood, SC Magazine Recorded: Jun 11 2013 2:00 pm UTC 57 mins
    • In a recent SC survey, when asked ‘Do you think your current network is secure?’ 43% of IS professionals said Not Sure.

      At first glance, this appears a surprisingly high figure – but a closer look at today’s threat matrix soon tells us why. Technology developments such as multi-point cloud solutions, consumerisation, BYOD uptake and even Windows 8 are a major headache in network security for IT leaders. Plus organisations face a growing number of ‘invisible threats’ that they are often not aware of, and which present a very real risk to corporate security.

      So what can be done to identify, monitor, respond and report these network security threats in real time?

      SC’s latest webcast will share expert advice, practical testing regimes and examples of proven results in overcoming invisible threats. Insights include:

      -Detailed analysis of the evolving threat landscape including the top 3 network security threats you don’t know about
      -The knowledge you need to know when choosing a bespoke unified threat management solution for your business
      -Real life examples showing why a rigorous, real-time testing environment is needed to make well-informed buying decisions
      -Take-home advice on how to make sure the product you use protects against network security threats

      Read more >
    • Cloud, Consumerization & Identity–Transforming the Security Model
      Cloud, Consumerization & Identity–Transforming the Security Model Shirief Nosseir, EMEA Product Marketing Director, Security Management, CA Technologies Recorded: Oct 12 2011 11:00 am UTC 49 mins
    • As the adoption of cloud computing and consumerisation of IT continues to accelerate, many IT organisations are forced to revisit their traditional security models in order to address the new risks being introduced. This session explores the impact of cloud computing and consumerisation of IT on security and how these emerging trends are reshaping the evolution of identity & access management (IAM), information protection, and compliance-related technologies and architectures.

      In this session, we’ll look at:
      •Understanding the various cloud security approaches – security to the cloud, for the cloud and from the cloud – and the key challenges facing them
      •Security considerations for embracing cloud computing, consumerisation of IT and social computing
      •The growing trend towards context- and content-aware IAM and the key role it plays in bridging the traditionally separate identity management and information protection silos

      Speaker Biography
      Shirief Nosseir is EMEA product marketing director of security management solutions at CA Technologies. With 25 years in the software industry, Shirief’s experience ranges across the fields of security management, service and infrastructure management, application lifecycle management and business intelligence. This allows him to have insightful understanding of how to assist enterprises in developing business-oriented architectures, while melding traditionally disparate technologies into whole solutions. Shirief is a regular speaker at conferences and educational events and presents frequently on the impact of emerging trends and technologies on enterprise security architectures.

      Speaker details:
      Shirief Nosseir
      CA Technologies (www.ca.com)
      EMEA Product Marketing Director, Security Management, CA Technologies

      Read more >