Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.Read more >
Dynamic, volatile, innovative. Cloud security is all of these and more. Join this webinar to learn more about:
- How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty?
- How can customers gain trust in their service vendors despite the parade?
Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.Read more >
New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.Read more >
Security demands countless decisions to determine whether or not log data or other surveillance data are positive indicators of adverse activity or merely false positives. Knowing when, and how, to make and document those decisions can be critical to how legal and compliance sanctions may be imposed. Designing your security controls to do so effectively can make all of the difference. Learn how rules-based design can transform your design frameworks and keep lawyers and regulators away.Read more >
Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.Read more >
You know that every decision to use the Cloud will be challenged, whether by investors, executives, customers, or members of your own team. Behind every challenge is the same question, "Can we trust the decision?" This presentation introduces a new decision model that will transform the confidence you can earn from others that your decisions are to be trusted.Read more >