Hi [[ session.user.profile.firstName ]]

Is Email Evil?

Many people believe that email is evil, and that it should be restricted, suppressed and deleted. Others – including many users – take the opposite view and attempt to save all email forever. What’s an organization to do? This webinar will review the risks and costs of email, including litigation readiness and compliance. It will review strategies for balancing these risks with a save-it-forever mentality. Join us for what is sure to be a lively discussion! Mark Diamond is the President and CEO, Contoural, Inc. He is one of the industry thought leaders in email archiving, litigation readiness, compliance, data protection and ILM strategies and practices. As CEO of Contoural, his company helps numerous Fortune 500 companies develop and execute email and document retention policies. A frequent industry speaker, Mr. Diamond addresses how organizations can better align business requirements with IT and storage spending. An expert in the business drivers around archival and the technical strategies for implementing them, he addresses what are the emerging best practices, and outlines practical approaches for email and electronic document archival that reduce liability, lower costs and ensure compliance. Nate Fitzgerald, Product Manager Message Archiving, MX Logic A self-proclaimed “Cloud Computing connoisseur”, Nate Fitzgerald oversees the research and development of MX Logic’s complete line of cloud-based message archiving and storage solutions. Nate first turned his attention to the cloud in 2001 when he co-founded GatewayDefender, an early pioneer of managed email security services. GatewayDefender was purchased by MX Logic in 2006. In addition, Nate has extensive experience managing large, complex corporate email systems. Prior to co-founding GatewayDefender, Nate spent several years managing the email operations for Opinion Research Corporation’s entire North American division.
Recorded Sep 11 2009 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Contoural & MX Logic, Moderator: IT GRC Forum
Presentation preview: Is Email Evil?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • IoT Series [Ep.2]: Current State -- Maturity and Success Jan 24 2019 4:00 pm UTC 60 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

    This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
  • Cyber Security Planning and Strategy for 2019 Dec 13 2018 6:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Panelists TBA
    Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.

    Join this keynote panel of security experts and industry veterans as they discuss:
    - New on the threatscape
    - Cyber attack trends seen in 2018
    - Addressing your cyber risk
    - How to prepare for 2019
    - Security strategy and making the most of your security dollars
    - New leaps in technology
    - Best practices and recommendations

    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Panelists TBA
  • Social Engineering, Phishing and Protecting the Enterprise Dec 13 2018 4:00 pm UTC 60 mins
    Jan Liband (SlashNext) | John Bambenek (ThreatSTOP) | JP Bourget (Syncurity)
    This webinar is part of the 2019 Trends and Predictions series on BrightTALK.

    Join top security leaders for an interactive discussion on how to better secure the enterprise in 2019:
    - Top threats on the horizon and what's at risk
    - Cyber defenses and your employees
    - Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
    - Use cases and examples
    - Actions to take today to protect your employees and enterprise from cyber criminals
    - What to expect in 2019

    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP
    - JP Bourget, Founder & Chief Security Officer, Syncurity
    - Jan Liband, CMO, SlashNext
  • Next-Generation Security: Containers Dec 13 2018 4:00 pm UTC 60 mins
    Johna Till Johnson
    Companies are increasingly moving to an architecture based on microservices and containers, as part of an overall move to DevOps, Agile, and cloud-first development.

    But are they taking the right steps to secure those containers?

    This Webinar provides a feature-functionality comparison of the leading providers of container security, and provides guidance for enterprise developers in launching their container security initiatives.
  • It’s almost Breach Season… Are You Prepared? Dec 11 2018 10:00 pm UTC 45 mins
    Ron Pelletier, Founder, Ponderance
    Hacking is a lucrative business. Like any other line of work, there are business drivers that lead to natural surges in activity. Just as retailers rely on holiday shopping season to remain in the black, malicious actors are spending time right now gearing up for Breach Season. Pondurance research shows a massive uptick in intrusions during the months of February-April, in some cases, 80-90%. This means now is the time that hackers are busy doing reconnaissance and infiltrating networks.

    Pondurance Founder Ron Pelletier will discuss:
    · Breach Season basics: who is affected and what to expect
    · The main drivers causing the intrusions and breaches?
    · Pre-season tactics and strategies to prepare
    · What companies can do to reduce the likelihood of occurrence
    · Review of last year’s top threats and predictions for 2019

    Ron Pelletier, Founder, Pondurance
    With more than 17 years of information security and business continuity experience, Pondurance Founder Ron Pelletier brings seasoned expertise in all areas of risk advisory, incident response and forensic investigations. His training as a U.S. Army commissioned officer equipped him with problem-solving and risk analysis capabilities well-suited for the tech world. His vast experience in enterprise risk and security includes a wide range of industries and organizations ranging from Fortune 500 to small, non-profit groups.

    Ron is certified in multiple disciplines relating to information and asset protection including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).
  • Around the World with Privacy and Your Business Dec 11 2018 6:00 pm UTC 60 mins
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • The Rise of Targeted Ransomware Dec 11 2018 4:00 pm UTC 45 mins
    Michelle Drolet, CEO, Towerwall Inc.
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Emerging Cyber Threats for 2019 Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    Organisations in 2019 will be increasingly faced with a hyperconnected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge Data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • [Earn 1 CPE] Critical Actions to Prevent a Data Breach in 2019 and Beyond Nov 29 2018 6:00 pm UTC 75 mins
    Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4
    Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.

    On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:

    - Strategies you can implement now to help you protect against a breach.
    - Best practices for gathering the intelligence to predict and prevent attacks.
    - How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
    - Steps to fortify your last line of defense.
  • Foolproof Digital Identity with Behavioral Biometrics Recorded: Nov 15 2018 59 mins
    Ehab Samy, VP Product Management, Plurilock
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Privacy vs. Cybersecurity: Where the lines are drawn Recorded: Nov 15 2018 60 mins
    Raef Meeuwisse (Author, Cybersecurity for Beginners), Anthony Lee (DMH Stallard) & Ed Moyle (Prelude Institute)
    In this session we will look at where the line is drawn between data privacy and cybersecurity.
    - What are the primary cybersecurity responsibilities that support effective data privacy and what falls outside of the cyber remit?
    -When does a suspected breach become notifiable under regulations such as the European GDPR?
    - What are the key tips for managing data breaches?

    This session will feature a range of security and privacy experts, interactive audience voting and questions from the audience will be encouraged.
  • The Next Big Thing? Cross-Border Privacy Basics in the Asia-Pacific Region Recorded: Nov 15 2018 43 mins
    Jesse Woo, Associate, Aleada Consulting
    This webinar will explain the background of the Asia Pacific Economic Cooperation Cross-Border Privacy Rules ("APEC CBPR") framework, who is participating, and how it works, as well as how it hopes to improve privacy protections while facilitating cross-border data flows.

    Join this webinar to learn about the recent and possible future developments with cross-border trade and privacy in Asia, such as the Comprehensive Progressive Trans-Pacific Partnership ("CPTPP") and Regional Comprehensive Economic Partnership ("RCEP") free trade agreements, both of which have e-commerce provisions addressing cross-border data. It will also talk about what companies should do if they want to participate in and benefit from this framework.
  • How to turn customer experience into customer trust Recorded: Nov 13 2018 62 mins
    Louise Thorpe, Chief Privacy Officer, American Express
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Ting Ting Luo, Senior Product Marketing Manager, Docusign
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • The State of Identity and Security in the Age of Cyber Attacks Recorded: Nov 13 2018 48 mins
    Sushila Nair (NTT DATA Services) | Derek Hanson (Yubico) | Ian Spanswick & Rebekah Moody(ThreatMetrix Inc LexisNexis Risk Co)
    Cyber attackers are becoming more sophisticated and data breaches are on the rise. According to a recent report, over 4.6 billion records were breached in the first half of 2018, showing a 133% increase compared to last year.

    With sensitive, personal and confidential data being at risk of ending up in the hands of cyber criminals, enterprises of all sizes are looking to strengthen their security in 2019.

    Join this exclusive keynote panel of industry experts as they discuss:
    - Trends in cyber attacks and breaches
    - Who is at risk
    - How to prevent breaches, data theft and future cyber crime
    - Advances in authentication
    - New in identity and access management
    - Security awareness and training
    - Best practices for securing the enterprise

    - Sushila Nair, Sr. Director Security Portfolio, NTT DATA Services
    - Derek Hanson, Sr. Director Solutions Architecture & Standards, Yubico
    -Rebekah Moody, Fraud & Identity Director, ThreatMetrix
    -Ian Spanswick, VP Professional Services EMEA,ThreatMetrix
  • Gaining the Upper Hand on Network Vulnerabilities Recorded: Nov 8 2018 60 mins
    Nathan Vega, VP Product, Columbus Collaboratory
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • CIO Considerations: The Impact of Platformification in Bank Risk and Compliance Recorded: Nov 1 2018 9 mins
    Rupert Nicolay - Microsoft, Zannettos Zannettou - Finastra
    Risk management in banks has gone through a silent revolution. Banks had to solve the problems and questions asked post-crisis and then rationalize and move to more enterprise wide models. Today, a three pronged revolution of regulation, technology and new sources of risk mean banks must re-imagine risk and compliance. With platformification, increases in computing power and cloud come the opportunities to deliver more agile processes, more real-time insights and more accurate predictions. But data quality remains king. What are CIOs top considerations when deploying more open api driven risk platforms? Can risk management securely live in the cloud? How can banks move the needle by collaborating with the fintech ecosystem?

    Rupert Nicolay, Worldwide Services Architect, Microsoft
    Zannettos Zannettou, Principal Technology Consultant, Finastra
  • How to break a PCI Compliant Application Recorded: Oct 31 2018 58 mins
    Amar Singh, Aatish Pattni, Karsten Desler
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • CISO Panel - Protecting Critical Infrastructure in the Age of Threats Recorded: Oct 30 2018 60 mins
    Dan Lohrmann (Security Mentor) | Chris Morales (Vectra) | Dave Klein (GuardiCore)
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Join CISOs and other security leaders for an interactive discussion on how to better secure our critical infrastructure:
    - Top threats on the horizon and what's at risk
    - Key vulnerabilities & how advancements in technology have changed the game
    - Threat intelligence & what needs to be improved now
    - What government agencies can learn from the private sector about cybersecurity
    - Recommendations for protecting critical infrastructure from attacks and subversion by online adversaries
    - What to expect in 2019

    - Dan Lohrmann, Chief Strategist & Chief Security Officer (CSO), Security Mentor
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Dave Klein, Sr. Director, Engineering & Architecture, GuardiCore
  • CISO Panel - Cybersecurity and the New CISO [NCSAM] Recorded: Oct 29 2018 59 mins
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify)
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify
  • Cloud Security Trends and Best Practices for 2019 Recorded: Oct 23 2018 59 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Email Evil?
  • Live at: Sep 11 2009 5:00 pm
  • Presented by: Contoural & MX Logic, Moderator: IT GRC Forum
  • From:
Your email has been sent.
or close