In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?
Join Scott Crawford, Research Director, Information Security and Dan Kennedy, Research Director, Voice of the Enterprise, for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.
GDPR’s enforcement date begins May 25th – a day after this webinar. Is your organization ready? What if you are just getting budget for GDPR compliance efforts. What if you just learned about the GDPR and your organization is subject to this law. If any of these scenarios apply, this is the webinar for you!
Lisa Berry-Tayman, a long-time privacy and information governance professional, will discuss:
• Benefits of being fashionably late to the GDPR party
• Getting your GDPR efforts back on track (or getting on the track for some folks)
• Rethinking the timeline and action items (or creating a timeline and action items for some folks)
Crawl out from underneath your desk, uncurl from the fetal position, and join us for a Executive Women’s Forum webinar on May 24th.
Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats?
Join this session with Scott Crawford, Research Director for Information Security, to find out why 451 Research has rated all 6 of 2017’s key security trends as “high impact.”
Where is the information and sensitive personal data that may fall under these regulations?
You need to be able to quickly and cost efficiently determine what data falls in scope with GDPR, and then apply policies to move, redact, encrypt and dispose of personal data in accordance with GDPR articles.
In this session we cover:
- The regulatory challenges for Personal Data management – the seen and the unseen
- Technical implications of both Data Discovery and Programme execution
- Unstructured Data file analysis and Structured Data file analysis
- Architectural requirements to support the legal policy and compliance procedure
- How the application and enforcement of policies to manage information throughout its lifecycle can be achieved using the Micro Focus Secure Content Management suite.
Una delle sfide più grandi per le aziende è quella di massimizzare l'utilizzo delle proprie fonti di dati e di fornire informazioni a molti utenti, ma tutto con un unico governo.
Questa sfida richiede una piattaforma robusta che consente la BI embedded e la BI operativa.
Questo video intende mostrare la piattaforma BI di Information Builders (WebFOCUS) per coprire questi nuovi requisiti di Busines
This interactive session will look at how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. How can the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts and experiences.Read more >
Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.
Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.
Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.
With the close of the spin-merge of HPE Software with Micro Focus, the two organizations have joined forces to become the seventh-largest pure-play software company in the world.
This combination will deliver a number of exciting benefits for customers, and prospective customers, of the company’s Information Management & Governance business. In addition to bringing together technology and domain expertise from the two entities to supplement our information archiving, content management, collaboration, eDiscovery and file analysis product lines, expect to see new solutions and innovation underpinned by our market-leading analytics ecosystem.
Join us on this webinar to hear Joe Garber, Vice President of Marketing for the Information Management & Governance business unit, talk more about:
• Synergies between the two companies
• How these product lines will come together, and short-term priorities
• What to expect from an innovation, delivery and product perspective going forward
This is the first webinar in this series, we recommend you watch this one first.
What is my readiness status?
A common complaint about GDPR is that the articles are clear about the desired end result, but there is little guidance provided on how to get there. Organizations are thus often hesitant about building out a technology roadmap and executing upon it, especially when resources and budget are scarce.
Learn how to break through this barrier by breaking down the complexities of GDPR into specific technology use cases, and then learn how to determine your overall readiness to address each one.
According to recent AIIM research, 31% feel their companies’ data protection is insufficient when it comes to protecting confidential and sensitive information. Additionally, 47% of respondents said their organizations suffered unauthorized disclosure of confidential information of some sort. At the time of this survey, 56% of respondents said they had suffered a data breach, loss, or exposure due to staff in the previous 12 months, compared with 9% from external hacking.
Yet, 24% of respondents feel that their senior managers do not take the risks of data privacy breaches seriously.
In this webinar, we will take a close look at what it takes to prepare for all kinds of data privacy regulations – to learn how to protect your data in order to be compliant with regulators or for healthy business practices in general. We will discuss ways to:
• Identify the data you have
• Store what you need, and defensibly delete what you don’t – or when you need
• Encrypt the data you want to keep – and keep it secure
A well-designed Information Governance roadmap with appropriate milestones and metrics can drive a successful program forward. Join this webcast to learn more about:
• Key elements for launching an Information Governance Program
• How to incorporate these elements to meet your organization’s specific needs
• Creating a team to help you launch your program
Successful Information Governance enables organizations to take control of their information, ensure compliance, reduce costs, and ultimately achieve greater profitability. Watch the webinar on demand, Real Customer Successes: Business Transformation through Information Governance, to hear expert insights on how real-world customers have successfully leveraged Information Governance programs.
Barclay Blair of the Information Governance Initiative and OpenText's Stephen Ludlow discuss how customers have successfully implemented Information Governance programs that streamline processes, increase productivity, and reduce costs to transform their businesses. You’ll learn:
•How leading organizations have been able to amplify the value in their information
•How to measure the success of an Information Governance implementation
•What drivers lead customers to implement an Information Governance program
Information Governance (IG) programs are full of both promise and pitfalls. Many organizations are asking what they can and should do to incorporate IG programs that help their employees be more productive while also reducing risk and costs. Join expert practitioners Jo Goldstein (Whirlpool), Patricia Oliveira (MUFG Americas), and Mark Diamond (Contoural) as they discuss:
-How they got their organization to care about Information Governance
-Lessons learned while executing their Information Governance programs
-Why it's important to obtain consensus from across different groups
-Building the right-sized program for your organization
Join us for a lively discussion!
About the Speakers:
Jo Kathryn Goldstein, CRM is currently Senior Manager, Information Governance for Whirlpool. Her career in Information Management has included the pharmaceutical and banking industry. In the past Jo has served as Vice-Chair for PRIMO- the Pharmaceutical Records and Information Management Organization, President of the Indianapolis ARMA Chapter, and the former ARMA Standards Development Committee.
Patricia Oliveira leads the Records & Information Management program for MUFG Americas, part of a global financial institution. As such, her focus is to support and develop an enterprise-wide, compliance based RIM program focused on risk mitigation. She has over two decades of experience in planning, designing, and executing complex integrated programs, building strategic organizations, and leading change in multiple disciplines and diverse industries.
Mark Diamond is founder & CEO of Contoural. He is an industry thought leader in proactive records & information management, litigation readiness and risk & compliance strategies. As a trusted adviser he and his company help bridge legal, compliance, security and business needs and policies with effective processes, technology and change management.
In the past, a good information governance strategy had to cover on-premises content and systems — and maybe a few company-owned devices. However, in the age of digital transformation, everything has changed. About 79% of business processes have moved to the cloud, employees are bringing their own devices to work and an increasing amount of content has to be accessed by users outside your firewall.
Join CMSWire and Box for the conclusion of our two-part webinar series about driving good governance in the age of digital transformation and learn best practices for applying information governance to today's content.
This webinar on-demand covers:
- 5 information governance best practices
- How to extend your governance strategy to the cloud
- Take-aways from real world information governance implementations
Faced with a complex, heterogeneous IT infrastructure and a “cloud first” directive from the board, Nick Bleech, Head of Information Security at building supplies giant Travis Perkins, used Splunk Enterprise Security running on Splunk Cloud to deliver enhanced security for 27,000 employees. The Splunk solution allowed Travis Perkins to provide real-time security monitoring, faster incident resolution and improved data governance while delivering demonstrable business value to the board.
Watch this webinar to hear Nick Bleech discuss:
• The business and security drivers tied to the deployment of a cloud-based SIEM (security incident and event management solution)
• The overall benefits of the Splunk solution
• The project’s critical success factors
• How stakeholders and the overall project were managed
• The positive impact of the deployment on the IT operations and IT security teams
• The next steps in the development of a lightweight security operations center
Les mythes et croyances liés à l'IT persistent depuis des années sans être remis en cause. Le postulat 'c'est comme cela que ça a toujours été' ne peut plus soutenir une décision IT ayant un impact négatif sur l'image, la santé et la performance de votre entreprise. Assistez à ce webcast pour en finir avec les fausses idées et découvrir comment mettre en place facilement une vraie stratégie de gestion de l’Information en tenant compte de son cycle de vie et à sa pertinence, grâce aux solutions d'archivage et d'e-discovery.Read more >
Information Governance is about managing sensitive or high value information – regardless of whether it lives in the cloud, on a mobile device or a social media network.
So, how will new communications channels and locations impact governance priorities in 2018?
Watch this Webinar with Barclay Blair, Founder of the Information Governance Initiative (IGI), as we discussed findings from the most recent IGI Survey, including:
• The most common IG projects companies initiated in 2017
• The Top 5 Information Governance Predictions for 2018
• How Actiance helps you meet your information governance objectives
Threat intelligence is one of the most talked about areas of information security today. Vendors, service providers, consultants and integrators are all looking to find ways to use threat intelligence to help businesses apply what we can learn about emerging cyber-threats and their tactics to protect valuable data and systems.
However, when it comes to applying these types of services/products, it can be hard to know where to start, whilst establishing what types of threat intelligence will prove truly beneficial to your organization is also a challenge.
In this webinar we’ll take you towards getting “hands on” with threat intelligence, including:
• Understanding the difference between strategic, operational, tactical and technical threat intelligence
• Real world examples of applying threat intelligence to monitor for emerging threats, to better prioritize vulnerabilities and more clearly understand your own threat surface
• Find the parts of your security operations that can reap the most benefit from the application of relevant threat intelligence