Hi [[ session.user.profile.firstName ]]

IPO Preparation: What you need to know in 2012

Join a panel of experts at NASDAQ, RR Donnelley, Kirkland & Ellis, and Protiviti to learn about the dynamics of the new landscape and identify key steps in planning for IPO in 2012.
Join a panel of experts at NASDAQ, RR Donnelley, Kirkland & Ellis, and Protiviti to learn about the dynamics of the new landscape and identify key steps in planning for IPO in 2012.
Recorded May 15 2012
62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Hobbs, Managing Director, Protiviti, Joseph Brantuk, Managing Director, NASDAQ
Presentation preview: IPO Preparation:  What you need to know in 2012
Recommended for you:
  • Date
  • Rating
  • Views
  • Symantec 2016 Internet Security Threat Report (APJ) Symantec 2016 Internet Security Threat Report (APJ) Peter Sparkes, Senior Director, Cyber Security Services – Asia Pacific & Japan Recorded: May 26 2016 55 mins
    It’s an unfortunate truth: cyber crime has become part of our daily lives. Even though mega-breaches no longer surprise us, it’s still essential to be vigilant and protect your organization.

    Attend this much-anticipated webinar for an analysis on the 2016 cyber threats from the newly released Symantec Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • Why 78% of all legitimate websites are putting your end users at risk

    Register now for the latest analysis of APJ cyber threats and specific steps you can take to improve your security posture in 2016.
  • Website Security Threat Report 2016 – Key insights and recommendations Website Security Threat Report 2016 – Key insights and recommendations Jeff Barto – Symantec Trust Strategist Recorded: May 26 2016 58 mins
    Presenting the key insights of Symantec's Website Security Threat Report 2016 - Our annual report on the latest cybercrime trends and developments. Join this webinar to learn:

    · Why today’s web threats and data breaches are bigger and more aggressive than ever before
    · How the industry is responding to new vectors of attack
    · The future big topics for website security
    · Best practice tips and recommendations
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Recorded: May 25 2016 55 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Application Security: 6 Myths of Open Source Management Application Security: 6 Myths of Open Source Management Chester Liu, Black Duck Software Recorded: May 25 2016 37 mins
    The recent high-profile “Panama Papers” exploit, which resulted in the theft of 2.6 terabytes of data from the Mossack Fonseca law firm, highlighted the firm’s failure to effectively secure and manage its open source software.
    Although the exploited component has yet to be pinpointed, the breach investigation has revealed that Mossack Fonseca was delinquent in patching known open source vulnerabilities in both Drupal and Wordpress. This lapse exposed sensitive client information.
    Open source software is an essential element in application development today and this breach raises the question: What are the best practices for securing and managing open source to avoid exploitation? This webcast will detail the processes organization can implement to secure and manage their open source to reduce risk from security vulnerabilities.
  • Closing Network Backdoors: Best Practices to Control Third-Party Risks Closing Network Backdoors: Best Practices to Control Third-Party Risks Dale Gardner, Director, CA Technologies Recorded: May 25 2016 60 mins
    In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.

    In this webcast, you’ll learn:

    - The identity, access, and security governance processes needed to protect your network
    - How to ensure positive user identification to prevent credential theft and misuse
    - Techniques to limit access to only those resources required to satisfy work or business requirements
    - Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
    - Establishing monitoring procedures that flag violations and speed forensic investigations
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IPO Preparation: What you need to know in 2012
  • Live at: May 15 2012 6:00 pm
  • Presented by: Steve Hobbs, Managing Director, Protiviti, Joseph Brantuk, Managing Director, NASDAQ
  • From:
Your email has been sent.
or close
You must be logged in to email this