Research Library

Powered by

Data Security Multimedia

  • The GDPR: A Rule to Rule Them All

    Sponsored by: RSA Conference

    According to the GDPR, organizations must ensure "appropriate security and confidentiality of the personal data". This webcast explores the new requirements for data breach notifications with the GDPR and what your organization should be doing to comply.

  • Spectre and Meltdown Podcast

    Sponsored by: RSA Conference

    Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.

  • The General Data Protection Regulation (GDPR) is Here

    Sponsored by: BackOffice Associates

    In this webcast, Enza Iannopollo, security & risk analyst at Forrester Research, demonstrates how to get started on building a risk management policy that will best suit the needs of your company.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • How Abtran Secured their Business

    Sponsored by: IBM

    With the expansion of digital and online services, companies must improve their security to stay ahead of cyber threats. Tune into this webcast to uncover a case study and learn how a company in Ireland overcame an influx of threats targeting their data.

  • Wimbledon Increases Security to Focus on the Court, not the Cloud

    Sponsored by: IBM

    The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.

  • Stop Really Nasty Malware, Pre- and Post-Execution

    Sponsored by: enSilo

    Sophisticated malware is the new weapon of choice for criminals. Tune into this webinar to hear from security expert, Dave Shackleford, as he reviews a security strategy aimed at responding and defending against advanced malware and ransomware threats.

  • Advanced Threat Protection Integration

    Sponsored by: Phantom Cyber

    How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats.

  • Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance

    Sponsored by: Evident

    Time is running out for companies that process personal data of those within the EU to be in compliance with the GDPR. This webcast reveals 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted.

  • Expanding the Threat Intelligence Horizon

    Sponsored by: Phantom Cyber

    How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.

  • Protecting Your Sensitive Data

    Sponsored by: Symantec

    Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.

  • The Future of Privileged Management

    Sponsored by: One Identity

    The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • Regulating Privileged Access: When to Require Human Approval Workflows

    Sponsored by: One Identity

    Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.

  • Identity Analytics – A more Collective Defense

    Sponsored by: One Identity

    As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.

  • How a Biotech Firm Streamlined Data Protection on AWS

    Sponsored by: AWS - Rubrik

    This webcast reveals how to simplify data backup and recovery for cloud environments, mobilize apps and data from data centers to AWS securely and control on-premises and cloud apps.

  • Five Milestones to GDPR Success

    Sponsored by: Proofpoint, Inc.

    The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.

  • Contextual Access to Apps and Data Anywhere Anytime on Any Device

    Sponsored by: Citrix

    This webcast offers a strategic approach to securing access to apps and data on any desktop or device.

  • Recover from Malware and Ransomware

    Sponsored by: Citrix

    Cyberattacks, such as malware and ransomware, can cost millions in lost revenue and productivity. This webcast offers strategies for protecting against such attacks and securing access to desktops, applications, and data.

  • 2018 Security Predictions for an Unpredictable World

    Sponsored by: WhiteHat Security

    Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.

  • Lessons Learned from an Enterprise-Scale Data Migration Project

    Sponsored by: Scribe Software Corporation

    Listen in as Lars Muller (from CRM Partners AG) gives expert advice on how to migrate data to the cloud, detailing a strategic step-by-step approach to integrating data safely and effectively.

  • Getting the Most out of your AppSec Program

    Sponsored by: WhiteHat Security

    According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.

  • PCI DSS & Your Call Center: The Do's & Don'ts of Compliance

    Sponsored by: Semafone

    According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.