ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Data Access Governance Solutions On-Demand Demo

    Sponsored by: STEALTHbits

    This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.

  • Outsmarting Ransomware: Protect Your Money and Assets

    Sponsored by: arcserve

    Watch this highly informative webinar from featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Learn how identity management as a service (IDaaS) can help you modernize your IAM and roll out applications as quickly as possible while ensuring your data is kept secure.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • How to Avoid the Illusion of Your Corporate Network

    Sponsored by: Above Security

    This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.

  • Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and Other Breaches

    Sponsored by: LogRhythm, Inc.

    In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive. Learn how to address your current security intelligence maturity, and more.

  • Ransomware

    Sponsored by: OpenDNS

    Ransomware. It's everywhere, with thousands of infections daily, and unknown millions being made by unknown entities. This podcast looks at ransomware and how the cybercrime business operates.

  • Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Overcoming the challenges presented by mobility in the enterprise

    Sponsored by: IBM MaaS360

    This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Insider Threats: How to Spot Trouble Quickly with AlienVault USM

    Sponsored by: AlienVault

    Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

    Sponsored by: OneLogin

    In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.

  • 9 Steps to Build a Better Insider Threat Program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Learn 9 ways to manage and mitigate insider threats within your organization.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • The real cost of data breach

    Sponsored by: AllClear ID

    Through this webinar, you learn from security experts how to effectively respond to customers after a major data breach and decrease the damage done to your brand. Discover how to establish a timeline of events for each incident, determine the scope of an incident and alleviate customer concerns in a timely manner.

  • Confidence in the Breach Age: Risks, Preparation, Response & Recovery

    Sponsored by: AllClear ID

    Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.