ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Insider Threats: How to Spot Trouble Quickly with AlienVault USM

    Sponsored by: AlienVault

    Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

    Sponsored by: OneLogin

    In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.

  • The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems

    Sponsored by: Verizon

    Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2

    Sponsored by: Intel Security

    Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • The real cost of data breach

    Sponsored by: AllClear ID

    Through this webinar, you learn from security experts how to effectively respond to customers after a major data breach and decrease the damage done to your brand. Discover how to establish a timeline of events for each incident, determine the scope of an incident and alleviate customer concerns in a timely manner.

  • Confidence in the Breach Age: Risks, Preparation, Response & Recovery

    Sponsored by: AllClear ID

    Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • Why Traditional Security Approaches Fail

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

  • Success Story Video: State of California

    Sponsored by: Axway

    Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Gartner Research Director Perry Carpenter shows you how to prevent future spear phishing attacks and what capabilities your spear phishing solution needs in order to be effective.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 1

    Sponsored by: Intel Security

    This webcast reviews security initiatives in order of their popularity for deployment. Access now to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.