Browse communities
Browse communities
Presenting a webinar?

Data Loss Prevention

Sajay Rai, Doug Copley
The third webinar ion the series will focus on protecting the data which has been classified. This webinar will discuss the examples of how a DLP solution can assist in protecting and monitoring the classified data.
Jul 23 2012
45 mins
Data Loss Prevention
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3358)
  • Upcoming (65)
  • Date
  • Rating
  • Views
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Channel
  • Channel profile
  • Are You Safe? Managing Risks in the Age of Security Breaches Recorded: Feb 4 2015 64 mins
    Michael Gerdes, CISSP and Molly Talafuse CISA, CRISC
    How safe is your organization? With many recent, highly publicized security breaches, it’s clear that we’re all at risk. Hacking has literally become a global business with personal data at the top of the list of commodities up for sale. With all the breaches in the news, many media outlets have focused on the susceptibility of companies to malware, while ignoring other critical flaws that likely contributed to the success of these breaches. Among these are failures in common IT processes such as change management, software release control, and access control to production environments. A common thread in these flaws is most often the lack of effective governance and oversight of the information risks inherent in these processes. This webinar will help you 1) learn about some common flaws in security and IT practices, 2) understand the critical role a partnership between security and Internal Audit has in breach prevention, and 3) identify some practical steps your information security and audit teams can take to reduce risks.
  • Ethical Leadership: How Internal Audit Can Influence the Tone at the Top Recorded: Nov 18 2014 120 mins
    Don Levonius
    According to IIA guidance, internal auditors are charged with monitoring organizational ethics and assessing whether management policies, procedures, and practices support ethical operations. And while management usually seeks to set, promote, and perpetuate an ethical climate, some leaders seem either motivated by self-interest or so focused on other operational priorities that they overlook their obligation to steward organizational ethics.

    What can internal audit do to articulate this risk of unethical behavior? How can internal audit influence the tone at the top? How can internal auditors persuade management to see the value proposition for ethical leadership? This webinar addresses these questions and equips auditors, audit directors, and CAEs to make a compelling argument as to how ethical leadership drives bottom-line results.

    By the end of this webinar, participants should be able to:

    -Compare contrasting views of behavioral ethics
    -Differentiate between moral and conditioned honesty
    -Examine rationalizations commonly indicative of moral disengagement
    -Explain why ethical stewardship is a primary leadership responsibility
    -Correlate ethical leadership to organizational results
    -Formulate a compelling argument in favor of an ethical tone at the top
  • Auditing Windows event log Recorded: Sep 24 2014 58 mins
    Richard Cozart
    Richard Cozart will provide insights into the mysteries of windows logs. He will discuss the following:

    •Configuring Audit Policies
    •What information is contained in windows logs?
    •How to interpret the windows logs?
    •Recommendations for event monitoring
    •Security Information & Event Management (SIEM) Software

    We all have heard that everyone should review logs, this is your chance to get details on how to do it.
  • Managing Social Media Risks Recorded: Aug 20 2014 47 mins
    Sajay Rai Securely Yours LLC
    By
    Sajay Rai
    Securely Yours LLC
  • Auditing the Incident Response Program Recorded: Apr 23 2014 54 mins
    Edward Napoleon
    From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their information security operations. With numerous recent examples of cybercriminals and malware penetrating corporate networks almost at will, the role of incident response teams has been thrust into the spotlight. In this presentation I will discuss the fundamentals of incident response planning and the critical role audit has in reviewing incident response plans, documentation and the plan testing process.
    At the end of this session:
    You will understand:
    -incident response
    -identify the different types of incidents
    -planning process
    -roles and responsibilities
    -team activation process
    -response process flows
    -response scenarios, and
    -auditing incident response
  • Target, Neiman Marcus, What Next? Recorded: Feb 26 2014 63 mins
    Jeff Ingalsbe
    We all heard of the recent hacks of Target and Neiman Marcus. Millions of consumers were affected as their Personally Identifiable Information (PII) were stolen. This incident raised a reg flag for majority of the organizations. The question is being asked: What can we do to protect our environment from such an incident? And usually the auditor is asked if the organization is prepared to protect its PII.
    This webinar will identify the information each auditor must understand regarding PII and also list out the tasks each auditor must do to protect the PII.
  • The Board, The Auditor and BCP Recorded: Jan 22 2014 50 mins
    Dr. Raj Aggarwal
    As a member of several corporate boards, Dr. Aggarwal is well aware of the responsibilities of being a board of directors member. One of the primary responsibilities, according to Tom Horton (“Directors & Boards” author), is to secure the future of the organization. According to Mr. Horton, the very survival of the organization depends on the ability of the board and management not only to cope with future events but to anticipate the impact those events will have on both the company and the industry as a whole.”
    According to Dr. Aggarwal, it is incumbent on directors to demand information and insight that will help them secure the future of the organization—which could be everything from the seemingly most innocuous moves by a competitor to the most threatening moves by a foreign nation potentate.
    Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) are a couple topics about which the directors should demand information and insight. When is the last time these two topics were discussed during your board meeting? You could have discussed the succession plan of a CEO as part of business continuity. But with BCP and DRP, we are implying the readiness of your organization in event of a natural or man-made disasters.
    In this webinar, Dr. Aggarwal will provide a series of ten questions which every board member must consider, and every internal auditor must be prepared to answer.
  • Apple’s iOS7 security features – must for every auditor Recorded: Oct 23 2013 52 mins
    Jeff Ingalsbe
    Most of you are probably excited about the new release of Apple’s operating system, iOS7. This operating system not only has enhanced user features but has several cool security features. Jeff Ingalsbe will present the key security enhancements in iOS7 and identify those features which every auditor must know and understand.

    Jeff Ingalsbe is an Assistant Professor, Department Chair, and Director of University of Detroit Mercy’s “Center for Cyber Security and Intelligence Studies.” Mr. Ingalsbe runs a state-of-the-art cyber security laboratory where students gain real world competencies through exploration of cyber security problems. Until recently, Mr. Ingalsbe managed the Information Technology Security Consulting Group at Ford Motor Company. He was involved in information security solutions for the enterprise, consumerization exploration, threat modeling efforts, and strategic security research. His BSEE and MSCIS degrees are from Michigan Technological University and the University of Detroit Mercy, respectively. He is currently working on a PhD Information Systems Engineering at the University of Michigan Dearborn.
  • Foreign Exchange Risk Management Webinar Recorded: Sep 25 2013 59 mins
    Raj Aggarwal
    This webinar will cover the details of assessing and managing risks of changing currencies.
    Some of the major topics covered in this webinar will include:
    •Why Exchange Rates Change?
    •Changing Exchange Rates, Trade, and Investment
    •Corporate Impact of Exchanges Rate Changes
    •Determining Transactions, Translation, and Economic Exposures
    •Financial Hedging of Net Exchange Rate Risks
    •Operational Hedging of Net Exchange Rate Risks
    •Audit Considerations in Exchange Rate Risk Management
  • Developing World Class Process Maps Recorded: May 22 2013 64 mins
    Adam Golden, Keith Fournier
    Mapping process flows is critical to understanding, documenting, and improving your processes. Learn how to develop world-class business process maps that highlight automation, best practices, manual steps, task assignment, activities of internal partners and external vendors, and more while ensuring accurate documentation and key participant input. This session will demystify the complexity around process mapping and provide hands on tools and tips that you can begin using immediately.
  • Critical Success Factors and Integration Key Drivers Webinar Recorded: Feb 13 2013 64 mins
    Opher Jackson
    Leveraging Analytics in IA – Critical Success Factors and Integration Key Drivers
    This webinar will assist participants in developing a roadmap to accelerate the integration of analytics within the internal audit function. During this webinar participants will learn how characteristics of their organization's strategic vision, business environment and technology impact the use of analytics. By understanding these characteristics, or critical success factors, internal audit can determine the type of analytic they should use to support various audits.
    During this webinar we will also discuss the types of audit evidence supported by different forms of analytics, and what internal audit should do to accelerate the integration of analytics into the audit when they work in an analytic "friendly" organization. We will also discuss techniques internal audit can use to help organizations develop good analytic practices and become analytic “friendly.”
  • 2013 and Beyond: Staying One Step Ahead of Reporting and Regulatory Changes Recorded: Jan 16 2013 56 mins
    Michelle Search-Winters
    The dynamic nature of accounting standards, filing rules and financial market regulations demands that you stay one step ahead of the changes. This presentation will provide an overview of accounting and compliance requirements with a focus on two elements of a myriad of critical items to consider in your financial reporting and internal audits for 2013 – the JOBS Act and Conflict Minerals.
    •JOBS Act: Establishes SEC requirements for emerging growth companies that makes it easier to raise capital and provides an IPO ‘on-ramp’ to phase in certain requirements.
    •Conflict Minerals Rule: Mandated by the Dodd-Frank Act with direct impact to half of all public companies including technology, automotive, and industrial products industries.
    Learn how these and other changes may impact your audit scope and work plans and why you must partner with your accounting organization to stay one step ahead.
  • Auditing the Management and Security of Smart Devices Webinar Recorded: Nov 14 2012 56 mins
    Sajay Rai
    According to some of the industry experts, the security and management of smart devices like iPads, iPhones and Android phones are quickly becoming the weakest link in most organizations. The internal auditors would like to audit the management and security of these devices and are looking for a structured audit approach.
  • Data Loss Prevention Recorded: Jul 23 2012 45 mins
    Sajay Rai, Doug Copley
    The third webinar ion the series will focus on protecting the data which has been classified. This webinar will discuss the examples of how a DLP solution can assist in protecting and monitoring the classified data.
  • Information Security Series: Operationalizing the data classification program Recorded: Jun 18 2012 65 mins
    Sajay Rai
    The second webinar in the series will focus on operationalizing the data classification program by rolling out the program to the different business units. This webinar will take an example of a software and show how the documents and folders can be classified (labeled).
  • Information Security Series: Data Classification Program Recorded: May 3 2012 50 mins
    Sajay Rai
    The first webinar in the series will discuss the ingredients to define a data classification policy and expand operational procedures to assist data owners in classifying the data. This classification is the first step in identifying the “crown jewels” for an organization. Some of the topics covered by the webinar will include:

    - Data Classification Policy and examples

    - Process of classifying data (and examples on how to classify data)

    - Process of labeling classified data (Example of SharePoint for Microsoft classified documents)

    - Discussion of role of a data owner
  • Importance / Key Aspects of Spreadsheet Controls Recorded: Apr 25 2012 59 mins
    Chris Mishler
    Spreadsheets are used extensively throughout an organization to collect, analyze, and report on data used for financial reporting, financial planning & analysis, operations, and performance metrics. This webinar will help internal auditors at all levels, as well as spreadsheet owners within the business units, understand the scope of risks to consider. We will discuss how to work within your organization to ensure that practices are in place to:

    -Identify the spreadsheets at greatest risk of error
    -Identify the most likely candidates for fraud
    -Mitigate the risks, and
    -Implement a policy that can contribute to the development of more efficient and user-friendly spreadsheets.
  • Transition from SAS-70 to the New SSAE-16 Recorded: Nov 10 2011 59 mins
    Jennifer I. Village, Director of Risk Assurance, PricewaterhouseCoopers
    In 2010, the AICPA issued SSAE No. 16, Reporting on Controls at a Service Organization, which replaced SAS 70. Most organizations outsource certain tasks and functions to at least one service organization. Therefore, many risks of the service organization become risks of the user entity. SSAE 16 reports are intended to provide an objective evaluation of the effectiveness of controls at the service organization. Join us to discuss:
    * Why the change to SSAE16
    * Similarities & Differences between SAS70 & SSAE16
    * Impacts of the change to Internal Audit Organizations
    * Common pitfalls / value adds / best practices
    * Broad Standards (SSAE 16, SOC, AT101) and how they relate
Live Chapter meeting on internal auditing, risk management and control
Lively topics for new and seasoned internal auditors, students and others are presented montlhly between September and May.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Loss Prevention
  • Live at: Jul 23 2012 4:15 pm
  • Presented by: Sajay Rai, Doug Copley
  • From:
Your email has been sent.
or close
You must be logged in to email this