Hi [[ session.user.profile.firstName ]]

Best Practices of Securing Data in Storage and Archive

NAS is invaluable to enterprises because of their accessibility, centralization of assets, and flexibility. But those attributes also make NAS file shares valuable targets and susceptible to exposure. By and large, many organizations are not effectively addressing the risks.

Join your fellow professionals to understand the best ways to secure storage and archive data, and then a discussion on encryption and access controls. Done correctly, deploying encryption in NAS environments can boost security and strengthen compliance. Done improperly, it can be a costly exercise that offers limited security and hampers business productivity. This webinar will show how organizations can maximize the chances of success with their NAS encryption initiatives.
Recorded Jun 13 2012 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Winter, Director of Product Management, SafeNet
Presentation preview: Best Practices of Securing Data in Storage and Archive

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 7] Aug 13 2019 5:00 pm UTC 60 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    The PCI Dream Team is back for another interactive Q&A session.

    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details.

    Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Senior Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Senior Consultant at Wesbey Associates
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • [Earn CPE] Automating Your Third-Party Risk Management Program Jul 25 2019 5:00 pm UTC 75 mins
    Colin Whittaker, IRD; Chris Poulin, BitSight; Blake Brannon, OneTrust; Syuyin Leow, LogicGate; Todd Boehler, ProcessUnity.
    The current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes. Given the growing complexities in accurately collecting and screening third-party data and the need for deeper due diligence, automation is key to a successful risk program. However, many corporations haven’t adopted automation in their third-party risk management programs.

    The lack of automation adoption can be traced to a few core reasons. Disparate systems, out-of-date data, and inconsistent policies can all stifle a company’s ability to modernize their third-party risk management program, and companies often suffer from more than one of these. When applied effectively, automation can not only help prevent these roadblocks; it can also drive the efficiencies procurement and compliance leaders are looking for. Join this CPE accredited panel webinar as our expert panel address some key steps to automating third-party risk management, including how to:

    -Manage an up-to-date vendor master to create one source of truth across the entire corporation,
    -Leverage automation and machine learning to standardize data governance,
    -Drive efficiencies and reduces costs, while ensuring the highest accuracy in your third-party risk management program.
  • [PANEL] Cloud Security Common Sense Tips & Tools Jul 25 2019 4:00 pm UTC 60 mins
    Panelists TBA
    Organizations are increasing their spend on cloud security solutions (up to $12.7 billion by 2023). What are the biggest challenges for businesses when it comes to securing the cloud, the solutions they are increasingly turning to, and the best practices needed to improve security overall?

    Join this panel of experts to learn more about the current state of cloud and what organizations are doing to secure it. Attendees will learn about:

    - Moving to the multi-cloud
    - What's the deal with Infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Compliance challenges and how to overcome them
    - Common sense tips for cloud security
    - Recommended tools and solutions
    - Words of wisdom from the experts
  • [PANEL] Biometrics: Key Privacy and Security Considerations Jul 24 2019 5:00 pm UTC 60 mins
    Dr. Ann Cavoukian | Shahrokh Shahidzadeh | Dr. Christopher Pierson
    Passwords are increasingly ineffective and organizations and governments are turning to biometrics for authentication, cyber security and even national security.

    Join this panel of experts as they discuss the rise of biometric technology and its impact on privacy and security for users, consumers and organizations.

    - The current state of authentication
    - Are biometrics safer than passwords
    - Top biometric technologies that could kill passwords
    - Privacy implications and the risk of breach
    - Safeguarding biometric data
    - The future of data privacy and security

    Speakers:
    - Dr. Ann Cavoukian, Distinguished Expert-in-Residence, Privacy by Design Centre of Excellence Ryerson University
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO at Acceptto
  • Breach Protection - Addressing the Human Factor Jul 18 2019 3:00 pm UTC 60 mins
    Joseph Carson (Thycotic) | Harrison Van Riper (Digital Shadows) | Shlomi Gian (CybeReady)
    Insider threats involving stolen or compromised credentials are a persistent issue for organizations worldwide. Whether it's a breach caused by a external vendor accessing an organization's systems, an organization's data being accessed by attackers that have breached a vendor, or an organization's own employees falling victim to phishing or other attacks, the risk of breach is bigger than most organizations realize.

    Join this panel of experts to learn about strategies and best practices for dealing with insider threats, breach prevention and improving your organization's overall security posture.

    Some of the topics up for discussion include:
    - What's new in breaches
    - Addressing the human factor
    - Insider threats and managing privileged access
    - Security awareness in the age of cyber attacks
    - Words of wisdom from the experts
    - Best practices for improving security

    Speakers:
    - Joseph Carson, Chief Security Scientist at Thycotic
    - Harrison Van Riper, Strategy and Research Analyst at Digital Shadows
    - Shlomi Gian, CEO at CybeReady
  • Emerging Data Privacy and Security for Cloud Jul 18 2019 12:00 pm UTC 58 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

    Join this interactive webinar to learn more about:
    - The latest trends and strategies for securing sensitive data in cloud and the enterprise
    - How to discover and capture your data inventory
    - What’s needed to prevent a data breach by securing your critical data and protect your reputation
  • Using Threat Intelligence in the Security Operations Center Jul 17 2019 3:00 pm UTC 60 mins
    Roselle Safran, President, Rosint Labs
    For security operations centers (SOCs), threat intelligence can be overwhelming and distracting or it can be a powerful asset that improves SOC efficiency and effectiveness.

    Join this presentation to learn how to make the most out of threat intelligence and productively apply it to all the key functions of SOC operations – prevention, detection, and response. Attendees will learn a framework for using threat intelligence in the SOC as well as processes that can be readily incorporated into workflows.

    About the Speaker:
    Roselle Safran is President of Rosint Labs, a cybersecurity consultancy that provides operational and strategic direction to security teams, leaders, and startups.
  • Golden Chickens: Threat Actor Deep Dive Analysis Jul 17 2019 12:00 pm UTC 60 mins
    Chaz Hobson & Daniel Young, QuoScient GmbH
    Cyber Threat Intelligence (CTI) analysis and investigation is critical to identifying, tracking and efficiently countering threat actors and adversarial techniques. In this webinar, we will dive into the Golden Chickens threat actor family uncovered and show you how to rapidly identify and derive actionable intelligence for this threat actor. In this presentation, you will see:

    In depth overview of this emerging threat actor and their primary targets
    The analytic methodology that led to the uncovering of this threat actor
    Drive this analysis of complex and multifaceted adversaries
    Understand the steps that can be taken to identify and mitigate this and other related threat actors


    Speakers:
    Chaz Hobson: Senior Threat Intelligence Analyst, QuoLab
    Daniel Young: IR Lead and Senior Sales Engineer, QuoLab
  • Introducing Adaptive Threat Response Jul 17 2019 10:00 am UTC 60 mins
    Robin Smith CISSP, CISM, CISA – Cyber Security Researcher, Lifeboat Foundation
    This webinar examines the imperative to introduce greater agility into threat response. There are too many orthodoxies dictating cyber standards, limiting an organisations ability to move quickly once threats to standards and services are identified.

    This webinar will provide an insight into new methods for threat response that focus on lean methods to speed responses and deliver an improved security posture for the organisation.
  • Fighting Cyber Crime: Tips, Tools and Tech Jul 16 2019 3:00 pm UTC 60 mins
    Chris Roberts (Attivo), Nathan Wenzler (Moss Adams), Ali Golshan (StackRox), Kevin Sheu (Vectra)
    According to a recent FBI report, cyber crime cost organizations $2.7 billion in 2018. Business email scams that targeted wire transfer payments accounted for almost half of that.

    How are businesses protecting against cyber crime? What are the best practices when it comes to cyber crime prevention, breach detection and data security in general?

    Join this panel of experts from the industry as they discuss the latest trends in cyber crime and how organizations can get a step ahead of attackers.
    - New in cyber crime
    - Is ransomware still a threat?
    - Biggest priorities when it comes to cyber threat prevention
    - Tips from the front lines of security
    - Tools, technologies and policies that make security professionals' lives easier
  • Demystifying Hacking Jul 16 2019 10:00 am UTC 60 mins
    6point6 Cyber Lab Expert
    The world of hacking remains a mystery for many. In this webinar, our 6point6 Cyber Lab ethical hackers will demystify hacking by running a live demo and will discuss tips on what you can do protect yourself from hacks.
  • Prevailing Trends in Cyber Crime Jul 15 2019 3:00 pm UTC 60 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7) + Monique Becenti (SiteLock) + DigiCert TBD
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today
  • Evolving Cyber Crimes and its effective counter-measures Jul 15 2019 10:00 am UTC 60 mins
    Ravikumar Ramachandran, Account Security Officer, DXC Technology India
    Join this presentation to learn about the present types of cyber crimes and the scale and efficiency of it and the methods to counter it.
  • [PANEL] Email Security Strategies and Solutions Jul 9 2019 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    -Emerging trends in email attacks
    -How to stay on top of the latest threats
    -Best solutions to protect your organisation
  • [PANEL] Proactive Security Strategies and Best Practices Jul 4 2019 3:00 pm UTC 60 mins
    Panelists TBA
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization
  • What I Learned at Gartner Summit 2019 Jul 2 2019 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The Gartner Summit 2019 agenda featured five comprehensive programs to cover your security and risk management key priorities and challenges. Digital transformation continues to challenge the conventions of information risk and security management. It requires a coherent digital security program based on a clear vision and strategy. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level.

    The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.

    Gartner includes data ethics and privacy on their list of the top 10 strategic technology trends of 2019, placing it on the same level as AI-driven development, blockchain, and edge computing. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The cloud, SaaS applications, and user mobility are powerful enablers of digital transformation, but many IT organizations are grappling with legacy network and security architectures that haven't evolved in decades. In the era of Cloud 3.0, companies are re-imagining business processes from and for the cloud. With these new opportunities comes a new cybersecurity reality for IT leaders in a hybrid, multicloud world. At a minimum, cloud computing breaks into 3 primary layers: SaaS, PaaS and IaaS.

    This presentation will explain primary security controls. You’ll learn how to take a strategic approach to risk, improve business and data resilience, build digital trust and implement a new generation of continuously adaptive security strategies. Cloud security remains a top priority. This presentation summarizes the problems, recommended processes, and new product types to address key issues.
  • [Earn CPE] Executive's Guide to Smarter GRC with Cybersecurity Attack Analytics Jun 27 2019 5:00 pm UTC 75 mins
    Panelists: Sam Abidir, Lockpath; James Rice, Greenlight Technologies; Ilia Sotnikov,Netwrix; and Jason Bonds, Ping Identity.
    Today’s increasing organizational complexity and evolving threat environment have made it more critical than ever for organizations to clearly identify their exposures, measure vulnerability risk, and quickly prioritize remediation efforts. Cyberattacks are often hidden from view under a mountain of alerts generated by security systems, giving attackers time to gain access to systems and seize valuable data.

    To ensure their companies don't end up in the headlines for the wrong reasons, corporate governance, risk management, compliance management and other “lines of defense” functions need to rethink their security strategy and take an approach that looks at behavior and attack patterns. By conecting cybersecurity attack analytics with risk programs and GRC work streams, executives can increase visibility into the overall security risk of the organization which makes the investigation of application security events easy, and enables teams to mitigate and respond to real security threats quickly and decisively.

    Join this CPE panel webinar for insights on achieving smarter GRC with CAA. We will share:

    - Why traditional endpoint security is failing to see and stop attacks.
    - How using attack analytics can stop cyberattacks now and in the future.
    - Efficient ways to analyze events and prevent threats.
    - How to move from looking back to real-time and forward-looking GRC monitoring.
  • Emerging Data Privacy and Security for Cloud Recorded: Jun 25 2019 59 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

    Join this interactive webinar to learn more about:
    - The latest trends and strategies for securing sensitive data in cloud and the enterprise
    - How to discover and capture your data inventory
    - What’s needed to prevent a data breach by securing your critical data and protect your reputation
  • [PANEL] Breach Protection - Best Practices, Tips and Tools Recorded: Jun 24 2019 54 mins
    David Morris | Nick Vigier | Kalani Enos
    As more and more organizations are getting breached, executives are finally paying attention to cybersecurity and data protection. What are the biggest challenges for businesses when it comes to securing the enterprise?

    Join this panel of experts to learn more about the current state of breaches, how organizations of all sizes are coping, and what CISOs are prioritizing this year.

    Attendees will learn more about:
    - Who is most at risk of being breached
    - How to prevent a breach or minimize its impact
    - How long it takes to detect a breach
    - Best practices for investigation and remediation
    - Words of wisdom from the experts

    Speakers:
    - David Morris, Managing Partner, Morris Cybersecurity
    - Nick Vigier, CxO Advisor, Coalfire
    - Kalani Enos, Founder & CEO, kenos Technologies
  • The New Age of Multi-Factor Authentication Recorded: Jun 18 2019 53 mins
    Lysa Myers & Cameron Camp, Security Researchers
    Trying to navigate the stormy seas of multi-factor authentication (MFA) to find the “killer app” both you and your organization can use to bolster security? In this webinar, we look at:

    - The various factors of authentication
    - Factor vs “steps”
    - Considerations in choosing a factor
    - The various technologies that people are using
    - What seems to be working

    Whether you’re pondering Near Field Communication (NFC) ninja tech for your smart phone, or those new biometric doo-dads that verify you based on the smell of your ears (really), we can help you sort out what might work for you and what would be crazy to implement. And as a bonus: this tech will all keep you far safer that your plain old password ever did.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices of Securing Data in Storage and Archive
  • Live at: Jun 13 2012 3:00 pm
  • Presented by: Chris Winter, Director of Product Management, SafeNet
  • From:
Your email has been sent.
or close