Risk Management Multimedia
-
Manage Your Operational Big Data Like a Super Hero
Sponsored by: IBMLearn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Webcast: Symantec Internet Security Threat Report 2014
Sponsored by: Symantec CorporationDownload and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
Best practices in managing requirements in Energy and Utilities industries
Sponsored by: IBMThis webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
-
Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
Sponsored by: Code42In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
-
Are you minding your business's reputation? What can you do to mind it better?
Sponsored by: IBMChanging social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.
-
Application Whitelisting Best Practices: Lessons from the Field
Sponsored by: LumensionThis in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
-
Hidden Lynx – Professional Hackers for Hire
Sponsored by: Symantec CorporationThis in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
-
Security Analytics Security School
Sponsored by: TechTarget SecurityLearn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
-
IBM Intelligent Investigation Manager
Sponsored by: IBMView this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
-
Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
Sponsored by: IBM.Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
-
Rabobank International Enabling Customers to Bank Safe With HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Advances in Financial Disclosure and Risk Management
Sponsored by: IBMThis on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
-
Security University: Cloud Security
Sponsored by: TechTarget SecurityLearn strategies for how to positively influence the security of cloud computing projects in your organization.
-
2013 Cost of Cyber Crime – UK, France and Germany Findings
Sponsored by: Hewlett-Packard EnterpriseClick to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.