ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Protecting Mission-Critical Source Code from Application Security Vulnerabilities

    Sponsored by: IBM

    In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.

  • Making the Case for Application Security Testing on Cloud

    Sponsored by: IBM

    It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • How to Avoid the Illusion of Your Corporate Network

    Sponsored by: Above Security

    This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.

  • Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches

    Sponsored by: LogRhythm, Inc.

    In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Overcoming the challenges presented by mobility in the enterprise

    Sponsored by: IBM MaaS360

    This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Insider Threats: How to Spot Trouble Quickly with AlienVault USM

    Sponsored by: AlienVault

    Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

    Sponsored by: OneLogin

    In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • The real cost of data breach

    Sponsored by: AllClear ID

    Through this webinar, you learn from security experts how to effectively respond to customers after a major data breach and decrease the damage done to your brand. Discover how to establish a timeline of events for each incident, determine the scope of an incident and alleviate customer concerns in a timely manner.

  • Confidence in the Breach Age: Risks, Preparation, Response & Recovery

    Sponsored by: AllClear ID

    Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.