Hi {{ session.user.profile.firstName }}

So You Really Thought Your Email Was Private?

Recorded Dec 8 2010 58 mins
Presented by
Michael Scheidell
Presentation preview: So You Really Thought Your Email Was Private?
Recommended for you:
  • Date
  • Rating
  • Views
  • Comprenez ce qui s’est passé et rétablissez l’activité rapidement

    Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également

    Inscrivez-vous ici.

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
  • Na het bijwonen van dit webinar weet u hoe u een mobiele IT-omgeving kunt implementeren die door het dynamisch aanpassen van de security instellingen overal voldoet aan de geldende regelgeving. Medewerkers zijn op deze manier altijd en overal productief en in staat de juiste dienstverlening te verlenen. Zo kunnen medewerkers van een financiele instelling niet alleen op iedere werkplek binnen kantoor, maar ook bij klanten thuis volgens het beleid van hun organisatie werken. Medewerkers in een ziekenhuis zijn in staat om op hun eigen werkplek, als ook bij de patient aan het bed in hun eigen vertrouwde omgeving te werken, zonder dat de privacy van gegevens in gevaar komt. En ook thuiswerken kan op deze manier mogelijk worden gemaakt binnen ieder bedrijf dat waarde hecht aan flexibel werken voor hun medewerkers, zonder de beveiliging uit het oog te verliezen.
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
  • We are pleased to introduce Aperture, a unique approach to securing sanctioned SaaS applications.

    Join us for a webinar where you’ll learn how Aperture’s detailed analysis and analytics on SaaS usage prevents data risk and compliance violations — and is helping companies, like yours, gain better control of their SaaS applications.

    Aperture also delivers:

    ●True visibility into SaaS usage
    ●Granular control of SaaS access
    ●Data exposure control
    ●Threat protection extension
    ●Minimal impact to users and networks

    Register today!
  • Since 1999, Oracle has included a Java Virtual Machine (JVM) within the database. That makes it old enough to drive and well past time to get a real job. In today’s data-obsessed world, that job is fortifying Oracle’s database with a healthy dose of analytics to give your database the power to handle the data challenges of the 21st century.

    There are numerous advantages to adopting a 100% Java code base for in-database analytics. Security is doubly enhanced by performing all analytics in the database. The code is highly portable as the identical java classes that run in the database will run on any client with any operating system. Plus the modern paradigm of taking the algorithms to the data is elegantly achieved with minimal effort.

    Until now, a single Java solution with all these qualities wasn’t available. By using JMSL Numerical Libraries, you get a suite of algorithms with routines for predictive analytics, data mining, regression, forecasting, and data cleaning. JMSL is scalable and can be used in Hadoop MapReduce applications. Now, JMSL Numerical Libraries makes Java in the database more than useful -- it makes it unbeatable.

    This webinar walks through the argument of why embedded analytics is better and provides examples using an Oracle database and JMSL. And if you’re not convinced, tell us so in the live, interactive Q&A!
  • By 2020, more than 7bn inhabitants of Earth will be using over 35bn devices to communicate, collaborate, negotiate and perform transactions.

    To put it into perspective, there are only about 8.7bn connected devices now.

    The surge will come quickly and organizations will scramble to take advantage of monetizing this digitally connected world. Identities are at the forefront as the digital passport to an online world of goods and services because a single view of an individual customer is the key to knowing that person better and building a deeper personal and business relationship with them. Join Oracle and (ISC)² on October 8, 2015 at 1:00PM Eastern to learn about the new identity economy.
  • Security teams are bombarded with information that could indicate a potential threat to the organization – but identifying the real dangers within the sea of digital noise is a constant challenge.
    The ability to reduce noise and attain true visibility into actual threats facing your organization is often referred to as ‘security intelligence’. By achieving security intelligence, teams can reduce the time taken to detect and respond to cyber-attacks and properly assess risk.
    Leveraging your security intelligence is a complex but incredibly valuable process. It’s worthwhile though – proper insight into the data traversing your network could be the difference between stopping a breach and falling victim to the next headline-grabbing attack.
    In this webinar, a panel of experts will discuss what ‘security intelligence’ really means, and how security teams can apply it. Join the debate by asking your questions of the panel, as they explore:
    *How to achieve visibility and deliverable intelligence into malicious network activity
    *Applying contextual information to enhance the quality of security intelligence
    *Achieving automation and efficiency
    *The response lifecycle
  • This webinar explores the best practices for distributing policies, determining when and how to provide education and how to build awareness campaigns. We often think that once a policy has been formally issued the job is done, but that is far from the truth. Properly communicating the policy is only the start.

    Attendees will learn the challenges, best practices, and benefits of a well thought out policy communication plan.
    Register now to join IT GRC industry expert, Michael Rasmussen as he discusses best practices in policy awareness and communication.
    Learning Objectives:
    - Define the key parts of a policy communication plan
    - Identify methods for tracking and delivering training and attestations
    - Determine ways to enable employee access to policies and related materials
    - The role of training and education
    - The policy portal – delivering an interactive employee experience for policy management
    - Getting employee questions answered
    - Attestations, read and understood, certifications
    - How technology enables employee engagement on policy
  • We caught up with F-Secure's Mikko Hyppoen to get his thoughts on the ever-relevant Privacy vs. Security debate.

    Mikko discussed the sensitive equilibrium required to protect data and ensure it's privacy; the influence that the EU's Safe Harbour ruling will have and how security should be the responsibility of all, not just the government.

    He also gave his one key piece of advice for keeping your data private and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: So You Really Thought Your Email Was Private?
  • Live at: Dec 8 2010 2:00 pm
  • Presented by: Michael Scheidell
  • From:
Your email has been sent.
or close
You must be logged in to email this