ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Security Research Shows AV & NGAV Can Be Evaded

    Sponsored by: enSilo

    Process Doppelganging is a new evasion technique targeting Windows systems. Take a look at this webinar to uncover the history of evasion techniques as well as strategies for attack protection.

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for change and improvement in the security landscape within the healthcare industry.

  • Why Device Risk is an Essential Element for Your MFA Strategy

    Sponsored by: iovation, Inc.

    Take a look at this webinar to gain insight into device risk to learn how to improve multifactor authentication and user experience within mobile devices.

  • Orchestration of App-Driven Security Policies

    Sponsored by: Silver Peak

    Take a look at this webcast to discover how to orchestrate security policies within applications.

  • Staying Secure is All About Keeping One Step Ahead

    Sponsored by: BT

    With the dramatic explosion of cyberattacks, it is necessary to constantly monitor for threats rather than reacting to them after the fact. This brief webcast offers strategies of staying one step ahead of the next security threat, in order to give your enterprise the security it needs.

  • DDoS Overview: Keeping the Web Open for Business

    Sponsored by: BT

    41% of global organizations surveyed by BT experienced a DDoS attack last year, with 78% hit more than once. Watch this DDoS attack overview webcast to gain insight into the basics of DDoS attacks and how you can protect your organization with the best protection strategy for your needs.

  • Security Automation and Orchestration Best Practices

    Sponsored by: ServiceNow

    According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.

  • How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days

    Sponsored by: ServiceNow

    When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.

  • Case Study: How Seton Hall University Improved Vulnerability Management

    Sponsored by: ServiceNow

    Inside this case study, Seton Hall University faced many challenges related to prioritizing and responding to the most critical vulnerabilities. Dive into how Seton Hall University overcame these challenges and became proactive in remediating vulnerabilities.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • What is GDPR? And Why Should I Care?

    Sponsored by: Commvault

    The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Step Up Your Security and Privacy with Data Masking

    Sponsored by: Delphix

    For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Why Traditional Security Approaches Fail

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

  • Masergy Unified Enterprise Security Demo

    Sponsored by: MASERGY

    Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.