Support Compliance and Enhance Confidentiality with Secure Email Delivery
By: Captaris, Inc. View more from Captaris, Inc. >>
Download this next:
Deploying AI to Improve Healthcare Fax Workflows: Inside the Practical Use Case
By:
Type: Video
Faxing remains a critical communication method in many industries—including healthcare—and optimizing its processes can significantly boost productivity and efficiency. After all, notes a Consensus Healthcare Industry Survey, faxing is the #1 method with which healthcare documents are exchanged today. How can you streamline your fax workflows using automated tools, without sacrificing that all-important compliance? In this insightful webinar hosted by Consensus Cloud Solutions and healthcare industry experts, attendees will gain valuable insights into leveraging artificial intelligence (AI) to enhance fax workflows. Join the discussion to explore practical applications of AI across various stages of fax handling, from document reception to response generation, and understand how to implement the best practices expounded herein in your organization.
These are also closely related to: "Support Compliance and Enhance Confidentiality with Secure Email Delivery"
-
InterFAX & TxMultilisting Save Lives
By:
Type: Video
InterFAX and TxMultilisting are working together to save lives by facilitating the accessibility of transplant waiting lists and developing a coordinated database that allows patients to securely fax unlimited medical documents to apply to multiple lists simultaneously. Watch our interview with Irena Bucci, Founder of TXMultiliting, and Kaleb Williams, Customer Success Manager at Upland InterFAX, and learn how InterFAX cloud fax saves lives.
-
Best practices for layer 2 network encryption in the public and private sector
By:
Type: Video
Whether you are a government, military or commercial organization, you need to ensure that your data is encrypted in transit. As corporate and government espionage intensifies, with high profile fibre tapping cases, such as UK’s GCHQ extensive fibre tapping becoming public news, encryption of data in transit is essential. Cyber-threats to data in motion are real and occurring constantly. By protecting the data itself with encryption you render it useless to a 3rd party, but can it keep up with your network? Data network growth, increasingly sensitive data and bandwidth demands are creating a shift to the more efficient encryption of sensitive traffic at Layer 2. Layer 2 affords secure encryption that is up to 50% more efficient than competing technologies such as IPsec with little or no impact on network performance. Join your fellow professionals for a best practice session to understand how these triple certified encryptors, CAPS, FIPS and Common Criteria certified solutions can be used on a Layer 2 network to protect data in motion for government and military organizations, as well as financial and other commercial enterprises. Specifically CAPS provides assurance for the UK government, its agencies and commercial enterprises working with the government. With proven reliability, high throughput, and low latency, SafeNet network encryption devices ensure security and certified assurance across Layer 2 networks.
Find more content like what you just read:
-
Fax Technology - A Modern Marvel
By:
Type: Video
Discover why fax remains a powerhouse in today's digital age and gain exclusive insights into its evolution and current state. Join InterFAX Product Marketing expert Brandon Cummings and learn about the unparalleled capabilities of fax technology and the modern business landscape. What to Expect: • Explore why fax continues to thrive as a mainstay technology. • Uncover the cutting-edge advancements driving the new generation of fax technology. • Learn how top industries leverage fax to streamline workflows and stay ahead in the digital era. Don't miss out on this opportunity to expand your knowledge and discover the untold potential of fax technology.
-
How WNCAP Protects Patient Privacy In Email Communication
By: Paubox
Type: Case Study
WNCAP, a healthcare nonprofit, needed a secure, HIPAA-compliant email solution. Paubox Email Suite provided automatic encryption, cost-effectiveness, and ease of use, allowing WNCAP to protect patient privacy while simplifying communications. Read the full case study to learn how Paubox helped WNCAP enhance data security.
-
HIPAA Email Usage Policy Checklist
By: Paubox
Type: White Paper
Review this checklist to ensure that your email policy supports HIPAA compliance.
-
Guide: How To Train Employees On Email Safety And Compliance
By: Paubox
Type: White Paper
For your organization's email communications to comply with HIPAA, all your employees must be trained. To learn how to educate your workforce, review this guide.
-
The path to HIPAA email compliance: Case study
By: Paubox
Type: White Paper
For your organization's email communications to comply with HIPAA, all your employees must be trained. To learn how to educate your workforce, review this guide.
-
Delivering Technical Content at the Speed of SaaS
By:
Type: Talk
The accelerating velocity of product launches and the frequency of product updates are two factors impacting the productivity of information development teams and creating new challenges. How can technical documentation teams —especially those that document software products — be expected to keep up with this rapidly accelerating pace? Transitioning to a software-as-a-service (SaaS) delivery model necessitates the development of continuous content delivery capabilities. Getting continuous delivery right also requires synchronizing technical documentation content updates with the product release cycle. Choreographing the dynamic content delivery can be challenging, but the rewards are worth the effort. Join us for a discussion with Lonnye Yancey-Smith, the executive manager for user assistance at Hexagon's PPM division, the world’s leading provider of enterprise engineering design software. Yancey-Smith will discuss the significant advances in documentation quality and dramatic improvements in customer engagement made possible by adopting a continuous content delivery approach. Yancey-Smith will chat with two representatives from the enterprise content delivery platform, Antidot / Fluid Topics — CEO Fabrice Lacroix and Geraldine Boulez, vice president of marketing. The three experts will share their knowledge on the subject and take questions from the audience. Attendees can expect to learn how: – Continuous content delivery helps Hexagon meet its release cycle goals – Adopting this continuous content delivery is impacting both customer satisfaction and customer experience, boosting engagement – Transforming content delivery makes possible additional improvements and efficiency gains This webinar is brought to you by The Content Wrangler and sponsored by Antidot / Fluid Topics.
-
Deep Dive into SOC 2: Gaining a Competitive Edge with Advanced Security Measures
By:
Type: Replay
In today’s rapidly changing landscape, moving to cloud-based solutions like email systems is clear. With this shift, the need for strong security measures and strict compliance is more important than ever. In fact, security concerns now often take priority over contract prices, highlighting their critical importance. Are you a security professional navigating this complex field? Then understanding SOC 2 compliance is essential. Join Raymond Vankrimpen, Partner at Richter, and Alex Loo, CSO at Echoworx, for an informative webinar on the key role of SOC 2 compliance. Learn why choosing a certified SOC 2 vendor is crucial for enhancing email security. This session will help you: - Understand SOC 2 terms with practical examples. - Learn why Penetration Testing is important for SOC 2 compliance. - Discover the benefits of working with a certified SOC 2 vendor for email security. - Get tips for identifying a SOC 2 certified vendor. - Hear success stories of companies using third-party SOC 2 to their advantage.
-
Email Encryption Enables Innovative and Secure Digital Business Processes
By:
Type: Talk
Many organizations are realizing that the new digital processes they are constantly introducing to share sensitive and confidential information leverages email. Further, organizations are facing new and evolving encryption integration, deployment and adoption demands to protect these sensitive emails across the business. They also see that in this environment of multiple use cases, most email encryption solutions aren’t effective. Join this webinar in partnership with Enterprise Strategy Group (ESG) to learn more about how the Echoworx Email Encryption Platform delivers a modern, easy-to-use, and customizable solution for securing an organization’s email communications internally and externally, whether outgoing or incoming, and across different business processes. Participants: ESG: Jack Poller, Senior Analyst Echoworx: Chris Peel, VP Customer Engineering
-
InterFAX Fax Environments
By:
Type: Video
Streamline secure communications and get down to business. Learn more about a few of our cloud fax integrations and our versatile Developer API so you can customize your cloud fax solution to fit your organization’s specific needs. Don’t see the integration you’re looking for? Reach out to us.
-
Automate and Manage S/MIME Deployment at Scale
By:
Type: Talk
Protect your organization’s emails with streamlined, automated S/MIME deployment. Email hackers and phishing scams are getting more advanced. Fortunately, so are the S/MIME solutions designed to stop them. Watch this webinar to see how you can automate secure email certificate deployment at scale to digitally sign and encrypt your emails and attachments. Topics covered: • How automation removes the errors and friction associated with manual S/MIME deployment • How to stay in front of your compliance obligations • How to deploy digitally signed and encrypted email at-scale in minutes, not days • How you can now secure your business against email-based threats
-
The Okta Breach: Lapsus$ Insights & Recommendations (Panel)
By:
Type: Talk
Okta’s announcement that at least 366 of its customers were affected by the recent Lapsus$ breach is still being digested by the SaaS market. Our panel of Cyber Security experts share key recommendations for SaaS customers and the lessons we should all apply from concerns raised in the wake of the breach. Panelists: Sesh Ramasharma, Global Head of Identity Security (Facilitator) Enterprise Studio by HCL Technologies Sesh has decades of experience delivering large scale security programs and advisory services to organizations of all sizes and complexities, and has worked across multiple-vendor solutions in all areas of identity security. CISSP; master's degrees in management and computer applications Ramkumar Krishnamurthy Sr Delivery Director, Global Services Delivery, Security Practice 10+ years managing security product suite implementations in IAM (Identity and Access Management) for some of the world's leading companies. Usable Security from the University of Maryland (Coursera). Vinay Lagisetty Sr Delivery Director, Security and API Management (NA) 20+ years of experience leading large-scale security solution implementations, managed services delivery, and strategic advisory services. TOGAF-certified Architect; computer science and management backgrounds Barry Fair Sr Solution Director for Identity Security and API Management (EMEA) Extensive experience leading team delivering large-scale security solution implementations, managed services delivery and strategic advisory services in EMEA. TOGAF-certified Architect, ITIL-certified professional; extensive background in Service Management Benoit Sot Sr Solution Director, Security of Identity Security and API Management (EMEA) Deep experience leading large scale security solution implementations, managed services delivery and strategic advisory services in EMEA. 25+ years in the security industry, with extensive hands-on experience implementing solutions. CISSP; master’s degree in computer science
-
The Okta Breach: Lapsus$ Insights & Recommendations (Panel)
By:
Type: Replay
Okta’s announcement that at least 366 of its customers were affected by the recent Lapsus$ breach is still being digested by the SaaS market. Our panel of Cyber Security experts share key recommendations for SaaS customers and the lessons we should all apply from concerns raised in the wake of the breach. Panelists: Sesh Ramasharma, Global Head of Identity Security (Facilitator) Enterprise Studio by HCL Technologies Sesh has decades of experience delivering large scale security programs and advisory services to organizations of all sizes and complexities, and has worked across multiple-vendor solutions in all areas of identity security. CISSP; master's degrees in management and computer applications Ramkumar Krishnamurthy Sr Delivery Director, Global Services Delivery, Security Practice 10+ years managing security product suite implementations in IAM (Identity and Access Management) for some of the world's leading companies. Usable Security from the University of Maryland (Coursera). Vinay Lagisetty Sr Delivery Director, Security and API Management (NA) 20+ years of experience leading large-scale security solution implementations, managed services delivery, and strategic advisory services. TOGAF-certified Architect; computer science and management backgrounds Barry Fair Sr Solution Director for Identity Security and API Management (EMEA) Extensive experience leading team delivering large-scale security solution implementations, managed services delivery and strategic advisory services in EMEA. TOGAF-certified Architect, ITIL-certified professional; extensive background in Service Management Benoit Sot Sr Solution Director, Security of Identity Security and API Management (EMEA) Deep experience leading large scale security solution implementations, managed services delivery and strategic advisory services in EMEA. 25+ years in the security industry, with extensive hands-on experience implementing solutions. CISSP; master’s degree in computer science
-
DP Tips & Tricks: Addressing Security Concerns with Encryption and Certificates
By:
Type: Talk
In this webinar we will present everything you need to know about encryption methods available within Data Protector. We will also take a look into the security enhancements included in the solution to achieve the Common Criteria certification, which certifies Data Protector as one of the safest backup software in the market. All this will help us understand how Data Protector protects us against hacking or ransomware attempts.
-
Expert Insights on Encryption: Most-Requested Features, Use Cases, and Roadmap
By:
Type: Talk
Join us for a webinar tailored for Enterprises with complex communication needs. Gain expert insights in encryption and discover how to stay ahead in the world of email security. Why should you attend? - Explore in-demand encryption features. - Tackle the unique challenges faced by security professionals like yourself. - Acquire valuable insights from real-world examples. - Discover how organizations have utilized email encryption to optimize resources, meet performance criteria, drive growth, and manage costs effectively. Take advantage of this opportunity to future-proof your tech investments and implement innovative solutions in today's ever-changing business environment. Learn from Echoworx encryption experts, Sarah Happé, Director of Client Engagement, and Derek Christiansen, Engagement Manager, as they share their expertise and dive into the driving factors behind the latest features and product roadmap. Get your burning questions answered too! Register now to be prepared for what's new & what's next in email encryption!
-
Automate and Manage S_MIME Deployment at Scale
By:
Type: Video
Protect your organization’s emails with streamlined, automated S/MIME deployment Email hackers and phishing scams are getting more advanced. Fortunately, so are the S/MIME solutions designed to stop them. Watch this webinar to see how you can automate secure email certificate deployment at scale to digitally sign and encrypt your email and attachments. Topics covered in this 45-minute webinar include: • How automation removes the errors and friction associated with manual S/MIME deployment • How to stay in front of your compliance obligations • How to deploy digitally signed and encrypted email at-scale in minutes, not days • How you can now secure your business against email based threats
-
Enhancing Encrypted Email Experience with Flexible Authentication Methods
By:
Type: Talk
Join us for a webinar specifically designed for organizations that recognize the crucial role of customer experience in driving their business success. Stay updated on the latest advancements in reducing password reliance, assuring identity, and redefining the encrypted email experience. Discover how organizations empower users with self-management and convenience. Why you should attend? - Gain valuable insights into how organizations are customizing the authentication process for encrypted emails, providing an unprecedented level of flexibility. - Learn effective strategies to overcome common obstacles using interfaces like OpenID and SMS, enhancing security and eliminating frustration associated with encrypted emails.
-
Post-quantum hybrid cryptography in Bouncy Castle
By:
Type: Video
While waiting for the final standards from the NIST Post-Quantum Competition, you can start preparing with a hybrid approach, combining post-quantum algorithms with traditional public key algorithms. In this workshop, Keyfactor’s David Hook and Roy Basmacier will look at several hybrid techniques as well as how they can be applied to the Bouncy Castle Java APIs, both FIPS and non-FIPS. Get CPE Credits Earn 0.5 CPE credit on this workshop. Keyfactor is an Approved (ISC)2 CPE Submitter Partner. https://www.isc2.org/ Agenda - Basic techniques and algorithms to use. The mechanisms for secret sharing in post-quantum encryption are based around Key Encapsulation Mechanisms (KEMs). We will start by looking at what is available and how they translate into the Java Cryptography Architecture. - Post-quantum hybrid cryptography in the general Bouncy Castle APIs. Building on session 1, we will look at how KEMs can be applied to more classical key agreement and key transport mechanisms. - Post-quantum hybrid cryptography in the Bouncy Castle FIPS APIs. Building further on session 2, we will look at how KEMs can be applied together with certified versions of classical algorithms. What You Will Learn After the workshop, you will have knowledge of the mechanisms that can be used in Java with the Bouncy Castle APIs for doing hybrid-cryptography to post-quantum harden classical approaches to encryption. You will be able to recognize which method is most appropriate to their situation and how to use hybrid approaches in a certified environment. For documentation and exercises, see: https://doc.primekey.com/bouncycastle/post-quantum-hybrid-cryptography-in-bouncy-castle This workshop was also held live at the Keyfactor Community Tech Meetup in Stockholm on September 7, 2022.
-
ESG’s analysis: Why digital adoption can’t succeed without email encryption
By:
Type: Talk
ESG’s independent analysis: Why digital adoption can’t succeed without email encryption In this webinar, Enterprise Strategy Group Senior Analyst Jack Poller – an industry veteran with 25+ years of hands-on experience in cybersecurity – examines emerging data privacy needs and outlines essential tips for succeeding with email encryption. Normally, access to Enterprise Strategy Group analyst research and consulting services would be a costly investment; watch this webinar for free, unrestricted access. Topics covered in this session include: • The new needs of email encryption vs. mature compliance programs • Why data privacy needs to be addressed in the age of digital adoption • Current challenges and ESG’s tips for solving the encryption adoption dilemma • And more
-
Deep Dive into SOC 2: Gaining a Competitive Edge with Advanced Security Measures
By:
Type: Talk
As the shift to cloud-based solutions, including email systems, becomes more prevalent among global enterprises, the need for stringent security measures and strict compliance is at an all-time high. In fact, the risk factor often takes precedence over contract price negotiations, highlighting its critical importance. In this changing landscape, gaining a comprehensive understanding of SOC 2 compliance is an absolute must for all security professionals. Join experts Raymond Vankrimpen, Partner at Richter, and Alex Loo, CSO at Echoworx, as they explore the crucial role of SOC 2 beyond standard compliance, emphasizing the necessity of choosing a certified SOC2 vendor for enhanced email security. Learn how SOC 2 certification fortifies your defense against email threats, providing your organization an edge. In this webinar, you will: - Learn the ins and outs of SOC 2 terminology using practical examples. - Understand why Penetration Testing is important and how it aids in achieving SOC 2 compliance. - Discover the advantages of partnering with a certified SOC 2 vendor for email security. - Get tips on how to identify a SOC 2 certified vendor. - Hear real stories of how enterprises are leveraging 3rd party SOC 2 to their advantage. This webinar is designed specifically for CISOs and IT Managers. Gain practical insights and concrete examples, devoid of jargon, to boost your real-world benefits. The highlight? You learn from industry experts.
-
Transform Your Encrypted Email with Dynamic Authentication!
By:
Type: Replay
Join us for a webinar tailored for organizations that are determined to lead the pack by prioritizing exceptional customer experience. Stay ahead of the curve with the latest breakthroughs in minimizing password reliance, securing identities, and revolutionizing the encrypted email experience. Discover how top-tier organizations empower their users with self-management and unmatched convenience, setting themselves apart from the competition! Why attend? - Gain insights into how organizations are customizing the authentication process for encrypted emails, giving you an edge with greater flexibility. - Learn practical strategies to tackle common challenges using tools like OpenID and SMS, enhancing your security and minimizing frustrations with encrypted emails. Don’t just keep up—get ahead!
-
Prepare for the quantum era with post-quantum cryptography
By: Utimaco
Type: Product Overview
Utimaco's u.trust General Purpose HSM Se-Series offers quantum-resistant cryptography to secure your infrastructure. Upgrade with Quantum Protect firmware that includes NIST-recommended post-quantum algorithms. Evaluate performance with the free PQC simulator. Read the full product overview to prepare for the quantum future.
-
Encrypted Data Inspection and Mitigation at Scale: Cisco SSLi
By:
Type: Talk
Over 90% of the traffic on the internet today is encrypted. While encryption is great for data privacy and confidentiality, it creates a massive security blind spot for IT. In this webinar, Cisco explains the challenges that encryption is creating for organizations today and presents the Cisco SSLi offer, a scalable, cost-effective solution for high volume management of encrypted traffic. Not only does the SSLi solution reduce security risks by providing visibility into encrypted traffic, it also improves the overall performance of your network by offloading encryption, decryption, and traffic management functions to Cisco Secure ADC, a purpose-build SSL inspection solution and application delivery controller.
-
Why Integrating FHIR with Digital Fax Reduces the Health Document Burden
By:
Type: Video
Implementing eFax and data transformation capabilities enables healthcare providers to improve communication, reduce errors, and ensure timely and accurate diagnoses and treatments. However, closing the reporting loop is crucial for patient safety and efficient healthcare delivery, as failures in communication can lead to missed or delayed diagnoses and incomplete referrals. Watch this webinar from a recent HIMSS Interoperability Showcase demonstration, featuring 6 health data exchange experts, to discover how integrating digital fax technology and the Fast Healthcare Interoperability Resources (FHIR) standard can help you overcome challenges in healthcare interoperability across the care continuum.
-
The myth of email as proof of communication
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
-
A Look at iiRDS — A Standard for Content Interchange
By:
Type: Talk
Have you heard of iiRDS? iiRDS stands for intelligent information Request and Delivery and is an international standard that helps foster document interchange among companies on an ongoing basis. Join Paul Perrotta, the Technical Documentation Wrangler, for a chat with Dr. Harald Stadlbauer, Managing Director at Ninefeb Technical Documentation GmbH, and with Don Bridges, Consulting Manager at JANA, Inc. to discuss what iiRDS is, why you might need it, and resources to help you learn more about it. "Let's Talk Technical Documentation" is brought to you by The Content Wrangler.
-
Electronic Deeds Archive with Decentralized Key Management
By:
Type: Video
The Bundesnotarkammer (Federal Chamber of Notaries) was mandated to build and host a secure platform to preserve all notarial deeds created in Germany. The system requires all documents to be end-to-end-encrypted with keys that are only available to 7,300 notaries. To make this possible, the archive relies on secure identities and devices to create, store, and share keys in the notaries’ offices. This session will cover: Security aspects of the project that ensure the confidentiality and availability of the documents over a period of 100 years. How document encryption and the concept of key domains for the secure key sharing between smart cards works. An overview of decentralized key management and what it means to do all this without having a central master key. Earn 0.25 CPE credits on this session. Keyfactor is an approved (ISC)² CPE Submitter, partner.
-
What Happens When Your Most Visited Web Content is Technical Documentation?
By:
Type: Talk
When Teradata rolled out their shiny new dynamic documentation website, they knew their documentation landscape would change – just not how or how quickly. What happens when the honeymoon is over, the CEO starts googling your docs on the weekends, and you realize you suddenly own the company’s largest web entity? Did the perception of technical documentation change? Switching to modern delivery methods brings big changes. Join Beth McFadden, Technical Project Manager for Content Operations at Teradata Corporation, as she shares her company's journey and lessons learned after moving their vast enterprise content from PDF downloads to web-based dynamic delivery. Learn how the requirements grew, and how Teradata and Fluid Topics worked together to address them. We’ll walk you through the peaks and valleys and provide suggestions for how to be proactive and avoid firefighting.
-
Why Your Email Encryption Solution is Doomed
By:
Type: Video
Have you tried to set up top-notch email encryption... and failed? Up-to-date email encryption solutions are in states of constant change with new use-cases constantly being created. Why do you care? Access concerns, privacy regulations, and the challenges of maintaining an exceptional user experience across generations mean your company needs to adapt. In this webcast Mike Ginsberg, CEO of Echoworx, and The Register’s Tim Phillips, dive into the relentless pressures companies face surrounding messaging and how to do encryption right. Gain insights on: – What five key areas need your immediate attention – The issues and opportunities – How to gain buy-in and ensure adoption
-
Functional Maturity Models for Modernizing Identity Security Solutions (Panel)
By:
Type: Talk
Identity security disciplines have grown in use and importance, and functional capabilities have also evolved: identity governance and administration, web access management, PAM, advanced authentication, and API Management. With these changes, it is important to adopt key tenets to mitigate threats and risks to digital assets and optimize value, regardless of provider. – Intro to identity security functional maturity models – Objectives and key results: where we are and want to be, and knowing when we arrive – How organizations can benchmark themselves to set a roadmap towards enhanced overall security posture Sesh Ramasharma, Global Head of Identity Security (Facilitator) Enterprise Studio by HCL Technologies Sesh has decades of experience delivering program management and advisory services to organizations of all sizes and complexities, and has worked across multiple-vendor solutions in all areas of identity security. CISSP; master's degrees in management and computer applications Vinay Lagisetty Sr Delivery Director, Security and API Management (NA) 20+ years of experience leading large-scale security solution implementations, managed services delivery, and strategic advisory services. TOGAF-certified Architect; computer science and management backgrounds Barry Fair Sr Solution Director for Identity Security and API Management (EMEA) Extensive experience leading team delivering large-scale security solution implementations, managed services delivery and strategic advisory services in EMEA. TOGAF-certified Architect, ITIL-certified professional; extensive background in Service Management Benoit Sot Sr Solution Director, Security of Identity Security and API Management (EMEA) Deep experience leading large scale security solution implementations, managed services delivery and strategic advisory services in EMEA. 25+ years in the security industry, with extensive hands-on experience implementing solutions. CISSP; master’s degree in computer science
-
Functional Maturity Models for Modernizing Identity Security Solutions (Panel)
By:
Type: Replay
Identity security disciplines have grown in use and importance, and functional capabilities have also evolved: identity governance and administration, web access management, PAM, advanced authentication, and API Management. With these changes, it is important to adopt key tenets to mitigate threats and risks to digital assets and optimize value, regardless of provider. – Intro to identity security functional maturity models – Objectives and key results: where we are and want to be, and knowing when we arrive – How organizations can benchmark themselves to set a roadmap towards enhanced overall security posture Sesh Ramasharma, Global Head of Identity Security (Facilitator) Enterprise Studio by HCL Technologies Sesh has decades of experience delivering program management and advisory services to organizations of all sizes and complexities, and has worked across multiple-vendor solutions in all areas of identity security. CISSP; master's degrees in management and computer applications Vinay Lagisetty Sr Delivery Director, Security and API Management (NA) 20+ years of experience leading large-scale security solution implementations, managed services delivery, and strategic advisory services. TOGAF-certified Architect; computer science and management backgrounds Barry Fair Sr Solution Director for Identity Security and API Management (EMEA) Extensive experience leading team delivering large-scale security solution implementations, managed services delivery and strategic advisory services in EMEA. TOGAF-certified Architect, ITIL-certified professional; extensive background in Service Management Benoit Sot Sr Solution Director, Security of Identity Security and API Management (EMEA) Deep experience leading large scale security solution implementations, managed services delivery and strategic advisory services in EMEA. 25+ years in the security industry, with extensive hands-on experience implementing solutions. CISSP; master’s degree in computer science
-
Nutanix and Thales, Hyerconverged & Hypersecure
By:
Type: Video
The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements. In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization. • Understand the types of encryption and their characteristics • Understand the critical role of best-in-class key management • Learn how to go beyond the encryption basics
-
Inbox incursions are more than an annoyance they are a security risk
By: Checkpoint Software Technologies
Type: White Paper
An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.
-
Ephesoft Use Case: Mailroom Automation
By:
Type: Video
Are your time sensitive documents getting lost under mountains of mail or in the abyss of neverending emails and attachments? Ephesoft's intelligent document processing technology instantly classifies, sorts, and extracts data to route them to the right departments, so they get processed faster and more efficiently.
-
How To Generate Value From Technical Documentation User Data
By:
Type: Talk
Join me for a presentation from Christopher Rechtien and Carsten Sieber of kothes Smart Information Solutions about generating business value from technical documentation user data. Attendees will discover: * Meaningful types of technical documentation user data * How content benefits from leveraging user data * Insights from user data collected by a technical documentation delivery portal * How producing meaningful content acts as a guarantor of success This presentation is brought to you by The Content Wrangler and sponsored by kothes Smart Information Solutions.
-
Seal of Trust: Elevate Document Security with eIDAS Qualified Electronic Seals
By:
Type: Talk
In today's digital landscape, integrity and credibility are paramount, and they can be established through qualified electronic seals. Learn how ITSCare, responsible for storing and processing the social data of millions of health insurance policyholders, benefits from eIDAS Qualified Electronic Seals. In this webinar, Jack Piekarski from SIGNIUS, Heiko Klenk from ITSCare and Osvaldo Bucci from cybersecurity provider Utimaco will introduce you to the world of document security, eIDAS compliance, and electronic seals. They will show you how Qualified Electronic Sealing accelerates digitization, prevents fraud, guarantees trust and adds legal value to digital documents. Discover in our webinar: - Qualified Electronic Sealing - The imperative for businesses to adopt electronic seals - Distinguishing electronic seals from electronic signatures - Attaining eIDAS compliance and trust for electronic documents - Various applications for certified electronic seals - The significance of the "qualified" aspect and when it matters. - How qualified document sealing works with SIGNIUS Seal and Utimaco CryptoServer CP5
-
Digital Validation: Achieving modern FDA compliance for modern testing
By:
Type: Video
Traditional document-centric approaches to computer systems validation continue to limit life sciences organizations as they modernize software delivery processes. In this webinar, we will show you how modernizing compliance with Tricentis Vera to support Digital Validation allows teams to shed cumbersome documentation practices by seamlessly embedding compliance management features into leading tools, such as Tricentis qTest and Atlassian Jira.
-
Six Ways to Cure Email Encryption Headaches in Microsoft 365
By: Mailprotector
Type: eBook
As organizations increasingly rely on Microsoft 365 for email communications, ensuring that sensitive data remains protected has never been more critical. Yet, while Microsoft 365 offers three types of email encryption, many MSPs struggle with gaps, complexity, and challenges that could expose their clients to risk.
-
Ansible Partnership 101
By:
Type: Talk
What is the Ansible partner program? How do I certify or validate content? Why would I want to? This webinar is designed to answer all these questions and more. We’ll hit on the basics of what it means to be an Ansible partner and the benefits that come with it, walk through the full process of certifying or validating content and which path you may want to pursue, and answer any questions you may have about it along the way. Live event not at the best time for you? In order to support our global partner ecosystem, all webinars are available on-demand after the live event. Register and you will receive an email reminder for on-demand viewing. *Red Hat collects your personal data when you submit information as a part of the registration process within BrightTalk. By registering for any of our webinars, you agree that Red Hat and the Red Hat Partner Program may contact you by email about products, services, and offerings that may be of interest to you. You may opt out at any time. For more information, please visit our Privacy Policy and Partner Preference Center: https://connect.redhat.com/en/partner-preferences.
-
Boost email security with post-delivery detection and response
By:
Type: Replay
Quickly, effectively, and consistently find and get rid of the email threats that sneak past traditional defenses and into your inboxes. Join Barracuda email security experts for this informative new webinar about all the benefits of post-delivery detection and response and how it can better protect your business.
-
Database Encryption for Government- High Assurance and Compliance
By:
Type: Video
Thales and Microsoft will discuss high assurance database encryption for Government Microsoft SQL Server users. Learn how to: • Enhance the security of your Microsoft SQL database using built-in TDE and the extensible key management feature • Achieve operational ease with centralized key management in a scalable manner across multiple databases • Simplify regulatory compliance by protecting critical master keys in certified hardware with advanced separation of duties capabilities
-
Mastering SSE | Email Eavesdroppers: Keeping Your Messages Private
By:
Type: Replay
In a world where email is a channel for confidential communication, safeguarding your messages from prying eyes is crucial. If you’re tired of worrying about who’s peeking at your emails or if your attachments are wandering off without your permission, this webinar is your digital bodyguard, ready to swoop in and save the day! In this session, you'll discover how to: - Mask Confidential Information: Learn the art of email sleight-of-hand! We’ll show you how to keep the sensitive info within your messages hidden from prying eyes - Remove Unauthorized Recipients: Become a master of email bouncers! Find out how to kick out those unwanted guests from your email threads, ensuring only the right people are in the loop. - Encrypt Attachments: Arm your attachments with high-tech security! We’ll teach you how to encrypt your files so they stay sealed tight, making sure only the right eyes can see them. Don’t let your emails become an open book! Join us to boost your email security skills and turn your inbox into a fortress of confidentiality. With our tips and tricks, you’ll keep your messages private and your mind at ease.
-
Australia Encryption Trends Study – Are you protecting what matters the most?
By:
Type: Replay
With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. But what are the top priorities for Australian organisations? The Australia edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by nCipher, will highlight how leading organisations are applying encryption strategies with detailed insights into the use cases that are growing the fastest. Join us for this webinar to learn about the key insights and findings from this industry-leading study and receive advice on addressing encryption’s top challenges. You'll take away: 1.Data to benchmark your encryption strategy, comparing Australia vs. global trends 2.Which data types are most often encrypted by Australian enterprises 3.How to strengthen encryption key management at scale for mission-critical workloads 4.Where organizations are using hardware security modules (HSM) for increased trust and key protection 5.How to protect identities with cryptographic automation, document signing and code signing solutions
-
Transitioning From Tech Writing To Information Architecture
By:
Type: Talk
Join us for a presentation from Rob Hanna, co-founder of Precision Content, on transitioning from a career in technical writing to a career as an information architect. Rob Hanna has achieved notable recognition in his field, including the Fellow rank from the Society for Technical Communication (STC) and the Enterprise Content Management Specialist (ECMs) designation from AIIM. In 2013, he became an Information Mapping® Certified Consultant™ (IMCC) through Information Mapping International and also holds a Certified Information Professional (CIP) certification from AIIM. Currently, Rob serves as the President and Chief Information Architect at Precision Content Authoring Solutions Inc. in Toronto, Canada. His active involvement extends to being a member of the OASIS DITA Technical Committee, focusing on the Technical Documentation Subcommittee. Additionally, Rob has contributed as a national director for the STC and as the vice-chairman of the STC Certification Commission. Can’t make it? Register, and we’ll send you a link you can use to watch a recording when it’s convenient for you. This educational webinar is brought to you by The Content Wrangler and Precision Content and is sponsored by Heretto, a powerful component content management system (CCMS) platform to deploy help and API documentation in a single portal designed to delight your customers.
-
ISO 27001: What is changing and how it will impact you
By:
Type: Video
Becoming ISO 27001 certified demonstrates that your Information Security Management System (ISMS) is aligned with documented standards and provides your customers with assurance regarding the security of these systems. After the new iteration of ISO 27002 was published in February 2022, a revised version of ISO 27001 is imminent in the weeks to come. Join this webinar led by Scott Bridgen, Global Offering Lead for GRC and Integrated Risk at OneTrust, to understand what the advantages are of being ISO27001 certified and, if you already have the certificate, attend to learn how to best embrace the upcoming changes. You will learn: - Best practices to embrace change in framework including how to communicate with line of business and how much information you must include - Key control changes and how that impacts your program - Elements to prioritise before your next audit - The role of technology and the benefits in both the short and longer term
-
Mapping IT Projects & Tasks To Information Sets
By:
Type: Talk
Infrastructure documentation is often inconsistent, patchy and untrusted - so unnecessary site surveys, audits and workshops are carried out to compensate. This webinar will show how project tasks can be mapped to determine where trusted information sets directly support faster delivery of projects and easier interfacing between teams. Its common sense that good, accurate documentation enables project teams to assess, plan, implement and deliver changes to IT infrastructure efficiently and predictably.
-
Mapping IT Projects & Tasks To Information Sets
By:
Type: Talk
Infrastructure documentation is often inconsistent, patchy and untrusted - so unnecessary site surveys, audits and workshops are carried out to compensate. This webinar will show how project tasks can be mapped to determine where trusted information sets directly support faster delivery of projects and easier interfacing between teams. Its common sense that good, accurate documentation enables project teams to assess, plan, implement and deliver changes to IT infrastructure efficiently and predictably.
-
How do you get into a CyberSecurity or Cloud Security Career in 2021?
By:
Type: Talk
How do you get into a CyberSecurity or Cloud Security Career in 2021? Panelists: Caroline Wong Caroline is the CSO at Cobalt.io, a Pentest as a Service (PtaaS) platform that simplifies security and compliance needs of DevOps-driven teams with workflow integrations and high-quality talent on-demand. Caroline is a strategic leader with strong communications skills, cybersecurity knowledge, and deep experience delivering global programs. My practical information security knowledge stems from broad experience as a Cigital consultant, a Symantec product manager, and day-to-day leadership roles at eBay and Zynga and is also an author. Her writings have helped many in DevSecops and Security Metrics. Email: caroline@cobalt.io My-Ngoc "Menop" Nguyen Menop is An accomplished, highly skilled, solutions-oriented Executive with notable success in leading, growing, maturing, and sustaining businesses and is a SANS Certified instructor holding the GSLC, GSTRT, GPEN and GCIH certifications and is a SANS certified instructor. She is also CISSP certified and is the current CEO of Secured IT Solutions, a Las Vegas based security firm that specializes in Cyber Security, IT and management consulting. Email: myngocn@gmail.com Jessica Donahue Hays Principal CyberSecurity Account Manager Jessica Donahue is a Principal Account Manager at Hays, specializing in Cybersecurity. Located in Raleigh, NC, she is a consultant, advisor, and expert in the Triangle on Security, IT, and Tech hiring and recruiting. Jessica helps her clients with their hiring strategy and provides valuable market insight and information on salary trends. She connects her clients with highly qualified and skilled candidates who meet their hiring needs through contract, contract-to-hire and full time employment. If you are having trouble filling your Cybersecurity position, reach out to Jessica! Email: jessica.donahue@hays.com