In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?
Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.
GDPR’s enforcement date begins May 25th – a day after this webinar. Is your organization ready? What if you are just getting budget for GDPR compliance efforts. What if you just learned about the GDPR and your organization is subject to this law. If any of these scenarios apply, this is the webinar for you!
Lisa Berry-Tayman, a long-time privacy and information governance professional, will discuss:
• Benefits of being fashionably late to the GDPR party
• Getting your GDPR efforts back on track (or getting on the track for some folks)
• Rethinking the timeline and action items (or creating a timeline and action items for some folks)
Crawl out from underneath your desk, uncurl from the fetal position, and join us for a Executive Women’s Forum webinar on May 24th.
Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
Una delle sfide più grandi per le aziende è quella di massimizzare l'utilizzo delle proprie fonti di dati e di fornire informazioni a molti utenti, ma tutto con un unico governo.
Questa sfida richiede una piattaforma robusta che consente la BI embedded e la BI operativa.
Questo video intende mostrare la piattaforma BI di Information Builders (WebFOCUS) per coprire questi nuovi requisiti di Busines
This interactive session will look at how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. How can the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts and experiences.Read more >
Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.
Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.
Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.
According to recent AIIM research, 31% feel their companies’ data protection is insufficient when it comes to protecting confidential and sensitive information. Additionally, 47% of respondents said their organizations suffered unauthorized disclosure of confidential information of some sort. At the time of this survey, 56% of respondents said they had suffered a data breach, loss, or exposure due to staff in the previous 12 months, compared with 9% from external hacking.
Yet, 24% of respondents feel that their senior managers do not take the risks of data privacy breaches seriously.
In this webinar, we will take a close look at what it takes to prepare for all kinds of data privacy regulations – to learn how to protect your data in order to be compliant with regulators or for healthy business practices in general. We will discuss ways to:
• Identify the data you have
• Store what you need, and defensibly delete what you don’t – or when you need
• Encrypt the data you want to keep – and keep it secure
A well-designed Information Governance roadmap with appropriate milestones and metrics can drive a successful program forward. Join this webcast to learn more about:
• Key elements for launching an Information Governance Program
• How to incorporate these elements to meet your organization’s specific needs
• Creating a team to help you launch your program
Successful Information Governance enables organizations to take control of their information, ensure compliance, reduce costs, and ultimately achieve greater profitability. Watch the webinar on demand, Real Customer Successes: Business Transformation through Information Governance, to hear expert insights on how real-world customers have successfully leveraged Information Governance programs.
Barclay Blair of the Information Governance Initiative and OpenText's Stephen Ludlow discuss how customers have successfully implemented Information Governance programs that streamline processes, increase productivity, and reduce costs to transform their businesses. You’ll learn:
•How leading organizations have been able to amplify the value in their information
•How to measure the success of an Information Governance implementation
•What drivers lead customers to implement an Information Governance program
Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:
-How they got their organization to care about Information Governance
-Lessons learned while executing their Information Governance programs
-Why it's important to obtain consensus from across different groups
-Building the right-sized program for your organization
Join us for a lively discussion!
About the Speakers:
Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.
Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries.
Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
In the past, a good information governance strategy had to cover on-premises content and systems — and maybe a few company-owned devices. However, in the age of digital transformation, everything has changed. About 79% of business processes have moved to the cloud, employees are bringing their own devices to work and an increasing amount of content has to be accessed by users outside your firewall.
Join CMSWire and Box for the conclusion of our two-part webinar series about driving good governance in the age of digital transformation and learn best practices for applying information governance to today's content.
This webinar on-demand covers:
- 5 information governance best practices
- How to extend your governance strategy to the cloud
- Take-aways from real world information governance implementations
Faced with a complex, heterogeneous IT infrastructure and a “cloud first” directive from the board, Nick Bleech, Head of Information Security at building supplies giant Travis Perkins, used Splunk Enterprise Security running on Splunk Cloud to deliver enhanced security for 27,000 employees. The Splunk solution allowed Travis Perkins to provide real-time security monitoring, faster incident resolution and improved data governance while delivering demonstrable business value to the board.
Watch this webinar to hear Nick Bleech discuss:
• The business and security drivers tied to the deployment of a cloud-based SIEM (security incident and event management solution)
• The overall benefits of the Splunk solution
• The project’s critical success factors
• How stakeholders and the overall project were managed
• The positive impact of the deployment on the IT operations and IT security teams
• The next steps in the development of a lightweight security operations center
Les mythes et croyances liés à l'IT persistent depuis des années sans être remis en cause. Le postulat 'c'est comme cela que ça a toujours été' ne peut plus soutenir une décision IT ayant un impact négatif sur l'image, la santé et la performance de votre entreprise. Assistez à ce webcast pour en finir avec les fausses idées et découvrir comment mettre en place facilement une vraie stratégie de gestion de l’Information en tenant compte de son cycle de vie et à sa pertinence, grâce aux solutions d'archivage et d'e-discovery.Read more >
Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.
However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.
In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:
• Understanding the difference between strategic, operational, tactical and technical threat intelligence
• Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
• Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence
Partecipa a questo webinar di Information Builders sulla qualità dei dati.
Verra mostrata una panoramica ad alto livello sui fondamenti della qualità dei dati e della MDM.
Questa sessione riguarderà:
- Come costruire una metodologia di qualità dei dati ripetibile e scalabile
- Come sviluppare una scheda di valutazione della qualità dei dati
Come è possibile stabilire i blocchi di una soluzione MDM (master data management)
See Richard Hollis in action as he delivers an informative brief of the essential elements needed in designing an effective information security awareness program for your business.
The session covers the four pathways that need to be taken and includes the way to identify the KPIs required to actually measure the success of the program and verify the real change in your business culture.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
Josh Downs. BrightTALK's Information Security Community Manager breaks down the 5 webinars to attend (see attachments) at January's The Next Generation of Information Security Summit:
5 - Big Daddy Loves Big Data - Richard Hollis, Risk Factory
4 - Risk-based Security: Having the Right Security in the Right Place - Illyas Kooliyankal, ADS Securities
3 - Achieving Digital Trust: The Final Frontier - Jeffrey Ritter, The Ritter Academy
2 - Have Cyber Security Professionals Lost Their Touch? - Jitender Arora
1 - Best Practices for Uncovering Deeply Hidden Threats - Eyal Gruner, Cynet
To attend any of the above, see the URLs in the attachments.
For more insights, follow Josh on @downsy1990.
Meet the Authors and Virtual Book Launch Event
Organizational Intelligence: How Smart Companies Use Information to Become More Competitive and Profitable
In today’s hyper-competitive market, companies have to be agile, smart, and fast. Organizational intelligence is the only foundation upon which these three capabilities can be built.
Join us for this unique webcast presented by the authors of the new book “Organizational Intelligence”, who will share insights on:
• Influence of technology on business intelligence
• Origin of the informational application
• Building pervasive organizational intelligence
• Data monetization
• 9 ground-breaking use cases from leading brands including Ford Motor Company, US Bank, Vantiv, and Utz Quality Foods
We’ll also have a Q&A with the authors – so bring your questions!