Hi [[ session.user.profile.firstName ]]
Sort by:
    • 2018 Trends in Information Security
      2018 Trends in Information Security Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise Recorded: Feb 13 2018 6:00 pm UTC 66 mins
    • In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?

      Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.

      Read more >
    • The Day Before GDPR Enforcement
      The Day Before GDPR Enforcement Lisa Berry-Tayman - Privacy and Information Governance Professional Upcoming: May 24 2018 4:00 pm UTC 60 mins
    • GDPR’s enforcement date begins May 25th – a day after this webinar. Is your organization ready? What if you are just getting budget for GDPR compliance efforts. What if you just learned about the GDPR and your organization is subject to this law. If any of these scenarios apply, this is the webinar for you!

      Lisa Berry-Tayman, a long-time privacy and information governance professional, will discuss:

      • Benefits of being fashionably late to the GDPR party
      • Getting your GDPR efforts back on track (or getting on the track for some folks)
      • Rethinking the timeline and action items (or creating a timeline and action items for some folks)

      Crawl out from underneath your desk, uncurl from the fetal position, and join us for a Executive Women’s Forum webinar on May 24th.

      Read more >
    • 2017 Trends in Information Security
      2017 Trends in Information Security Scott Crawford, Research Director, Information Security Recorded: Jan 12 2017 4:00 pm UTC 57 mins
    • Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?

      Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”

      Read more >
    • GDPR: Data Privacy Assessment and Information Risk
      GDPR: Data Privacy Assessment and Information Risk Greg Clark, Director, WW Market Strategy Secure Content Management, Micro Focus Recorded: Apr 11 2018 6:05 pm UTC 15 mins
    • Where is the information and sensitive personal data that may fall under these regulations?

      You need to be able to quickly and cost efficiently determine what data falls in scope with GDPR, and then apply policies to move, redact, encrypt and dispose of personal data in accordance with GDPR articles.

      In this session we cover:
      - The regulatory challenges for Personal Data management – the seen and the unseen
      - Technical implications of both Data Discovery and Programme execution
      - Unstructured Data file analysis and Structured Data file analysis
      - Architectural requirements to support the legal policy and compliance procedure
      - How the application and enforcement of policies to manage information throughout its lifecycle can be achieved using the Micro Focus Secure Content Management suite.

      Read more >
    • Secure Information Sharing across Agency Boundaries
      Secure Information Sharing across Agency Boundaries Chris Tonjes, CIO, DC Office of the Attorney General & Sonny Hashmi, Managing Director, Global Public Sector, Box Recorded: Jan 25 2018 4:00 pm UTC 61 mins
    • Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.

      Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.

      Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.

      Read more >
    • Discover Micro Focus Information Management & Governance
      Discover Micro Focus Information Management & Governance Joe Garber, Vice President of Marketing for Information Management & Governance, Micro Focus Recorded: Oct 4 2017 4:00 pm UTC 50 mins
    • With the close of the spin-merge of HPE Software with Micro Focus, the two organizations have joined forces to become the seventh-largest pure-play software company in the world.

      This combination will deliver a number of exciting benefits for customers, and prospective customers, of the company’s Information Management & Governance business. In addition to bringing together technology and domain expertise from the two entities to supplement our information archiving, content management, collaboration, eDiscovery and file analysis product lines, expect to see new solutions and innovation underpinned by our market-leading analytics ecosystem.

      Join us on this webinar to hear Joe Garber, Vice President of Marketing for the Information Management & Governance business unit, talk more about:

      • Synergies between the two companies
      • How these product lines will come together, and short-term priorities
      • What to expect from an innovation, delivery and product perspective going forward

      Read more >
    • Data Privacy: Learn What It Takes to Protect Your Information
      Data Privacy: Learn What It Takes to Protect Your Information Greg Reid, CEO, InFuture LLC and Rich Lauwers, Information Governance Subject Matter Expert, HPE Recorded: Aug 1 2017 9:20 am UTC 59 mins
    • According to recent AIIM research, 31% feel their companies’ data protection is insufficient when it comes to protecting confidential and sensitive information. Additionally, 47% of respondents said their organizations suffered unauthorized disclosure of confidential information of some sort. At the time of this survey, 56% of respondents said they had suffered a data breach, loss, or exposure due to staff in the previous 12 months, compared with 9% from external hacking.

      Yet, 24% of respondents feel that their senior managers do not take the risks of data privacy breaches seriously.

      In this webinar, we will take a close look at what it takes to prepare for all kinds of data privacy regulations – to learn how to protect your data in order to be compliant with regulators or for healthy business practices in general. We will discuss ways to:
      • Identify the data you have
      • Store what you need, and defensibly delete what you don’t – or when you need
      • Encrypt the data you want to keep – and keep it secure

      Read more >
    • Lessons from the Trenches: In-House Practitioners Talk Information Governance
      Lessons from the Trenches: In-House Practitioners Talk Information Governance Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Union Bank), Mark Diamond (Contoural) Recorded: Jul 19 2017 9:00 pm UTC 60 mins
    • Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:

      -How they got their organization to care about Information Governance
      -Lessons learned while executing their Information Governance programs
      -Why it's important to obtain consensus from across different groups
      -Building the right-sized program for your organization

      Join us for a lively discussion!

      About the Speakers:

      Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.

      Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries. 

      Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.

      Read more >
    • Threat Intelligence: Information Security's Problem Child?
      Threat Intelligence: Information Security's Problem Child? Wade Baker, Partner and Co-Founder, Cyentia Institute and Nick Frost, Principal Research Analyst, Information Security Forum Recorded: Aug 2 2017 6:50 pm UTC 65 mins
    • Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.

      However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.

      In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:

      • Understanding the difference between strategic, operational, tactical and technical threat intelligence
      • Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
      • Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence

      Read more >