ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Ensure Data Protection with Fidelis Network

    Sponsored by: Fidelis

    To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Stop Losing Sleep (or Money) Over a Potential Breach

    Sponsored by: Fortinet, Inc.

    What's keeping you up at night? For 46% of organizations, a talent shortage to fight cybersecurity is at the top of the list. Join this webinar to understand breach technology and the shift that is occurring beyond just detection, so your organization can get the sleep it needs.

  • The Impact of GDPR Even if You're Not in the EU

    Sponsored by: Fortinet, Inc.

    Listen in on this informative webcast to learn more about what GDPR compliance means for organizations not located in the EU and how network security technologies come into play with GDPR.

  • PCI DSS & Data Security for Contact Centers: Navigating the Regulatory Landscape

    Sponsored by: Semafone

    With the onslaught of cyberattacks that have occurred this year, data security has never been a higher priority for organizations, especially for contact centers. Learn from 2 leaders in the data security field about top data security regulations, laws and standards affecting contact center governance, and more.

  • Protecting Engineering IP in the Age of Collaboration

    Sponsored by: Vera

    Did you know that sharing enterprise information can open up your IP to risk, theft or loss? Listen in on this webinar to learn how to protect valuable engineering IP in a highly collaborative environment.

  • Think beyond the traditional approach to security

    Sponsored by: Cylance

    Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.

  • How to Defeat 2018's Biggest Security Treats

    Sponsored by: Arctic Wolf

    In this webcast, discover keys tools and methods to help you develop a proactive security defense so you can defeat 2018's biggest threats.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Spectre and Meltdown Podcast

    Sponsored by: RSA Conference

    Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • Stop Really Nasty Malware, Pre- and Post-Execution

    Sponsored by: enSilo

    Sophisticated malware is the new weapon of choice for criminals. Tune into this webinar to hear from security expert, Dave Shackleford, as he reviews a security strategy aimed at responding and defending against advanced malware and ransomware threats.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • 2018 Security Predictions for an Unpredictable World

    Sponsored by: WhiteHat Security

    Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.

  • Lessons Learned from an Enterprise-Scale Data Migration Project

    Sponsored by: Scribe Software Corporation

    Listen in as Lars Muller (from CRM Partners AG) gives expert advice on how to migrate data to the cloud, detailing a strategic step-by-step approach to integrating data safely and effectively.

  • Getting the Most out of your AppSec Program

    Sponsored by: WhiteHat Security

    According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.

  • PCI DSS & Your Call Center: The Do's & Don'ts of Compliance

    Sponsored by: Semafone

    According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.

  • The Perils & Pitfalls of Pause & Resume Call Recording

    Sponsored by: Semafone

    The average cost of a data breach has risen to $4 million, according to the Cost of a Data Breach Study: Global Analysis. Explore this webinar to gain insight into security within the payment card industry and uncover PCI DSS compliance regulation information.

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • How to Prepare for GDPR

    Sponsored by: AlienVault

    The GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. Take a look at this webcast to uncover a compliance and unified security management approach to prepare for the GDPR.

  • The EU General Data Protection Regulation

    Sponsored by: Oracle Cloud

    The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant.

  • Why Your Approach to Data Governance Needs a Major Update

    Sponsored by: Delphix

    In this webcast, hear how customers are changing their approach to data governance and adapting to new regulations such as GDPR.

  • Identity Analytics – A more Collective Defense

    Sponsored by: One Identity

    As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.