ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • How to Defeat 2018's Biggest Security Treats

    Sponsored by: Arctic Wolf

    In this webcast, discover keys tools and methods to help you develop a proactive security defense so you can defeat 2018's biggest threats.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Stop All Imposter Threats Coming Into and Going Out of your Organization

    Sponsored by: Proofpoint, Inc.

    Hear from John Pescatore from SANS and Ryan Terry from Proofpoint to learn about imposter threats coming into and going out of your organization. Uncover how to prevent phishing attacks and email spoofing

  • Avoid the GDPR Pitfall: Unlock Your Unstructured Content

    Sponsored by: Ephesoft

    80% of most organizations' content is unstructured, according to IDC – and this leaves a majority of customer data unsearchable. This could be a problem for GDPR compliance. Watch this video for 3 steps to unlock your unstructured content, including how machine learning can play a role in helping you gain insights out of this unstructured data.

  • Threat-Proof Security Infrastructure

    Sponsored by: Oracle

    How does your organization plan to secure all aspects of data, storage and more? Explore this webcast to uncover an approach to keeping information safe and ensuring compliance simultaneously.

  • Cyber Security Survival Kit for Your Business

    Sponsored by: Oracle

    Cyber threats against individuals and businesses are evolving constantly. And as data becomes more and more valuable, the consequences of a breach in your system carry higher stakes than ever before. In this video, learn how Oracle's "security survival kit" can help your business negate cyber threats.

  • The EU General Data Protection Regulation

    Sponsored by: Oracle Cloud

    The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant.

  • Why Your Approach to Data Governance Needs a Major Update

    Sponsored by: Delphix

    In this webcast, hear how customers are changing their approach to data governance and adapting to new regulations such as GDPR.

  • The GDPR: A Rule to Rule Them All

    Sponsored by: RSA Conference

    Breach regulation as we know it will change with the arrival of the EU's GDPR.This webcast explores the new requirements for data breach notifications with the GDPR and what your organization should be doing to comply.

  • Spectre and Meltdown Podcast

    Sponsored by: RSA Conference

    Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • Stop Really Nasty Malware, Pre- and Post-Execution

    Sponsored by: enSilo

    Sophisticated malware is the new weapon of choice for criminals. Tune into this webinar to hear from security expert, Dave Shackleford, as he reviews a security strategy aimed at responding and defending against advanced malware and ransomware threats.

  • Advanced Threat Protection Integration

    Sponsored by: Phantom Cyber

    How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats.

  • Expanding the Threat Intelligence Horizon

    Sponsored by: Phantom Cyber

    How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • Five Milestones to GDPR Success

    Sponsored by: Proofpoint, Inc.

    The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.

  • 2018 Security Predictions for an Unpredictable World

    Sponsored by: WhiteHat Security

    Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.

  • Lessons Learned from an Enterprise-Scale Data Migration Project

    Sponsored by: Scribe Software Corporation

    Listen in as Lars Muller (from CRM Partners AG) gives expert advice on how to migrate data to the cloud, detailing a strategic step-by-step approach to integrating data safely and effectively.

  • Getting the Most out of your AppSec Program

    Sponsored by: WhiteHat Security

    According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.

  • What Keeps Me Up At Night?: Concerns of a CISO

    Sponsored by: enSilo

    Watch this webcast to uncover a list of security concerns facing CISOs today as well as pre-infection protection strategies to lessen these concerns.

  • Enabling Healthcare with Trusted Access

    Sponsored by: Duo Security

    Within the healthcare industry there is an immense amount of data that needs to be secured. Take a look at this webcast to learn more about the need for security improvement within the healthcare industry.

  • PCI DSS & Your Call Center: The Do's & Don'ts of Compliance

    Sponsored by: Semafone

    According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.

  • The Perils & Pitfalls of Pause & Resume Call Recording

    Sponsored by: Semafone

    The average cost of a data breach has risen to $4 million, according to the Cost of a Data Breach Study: Global Analysis. Explore this webinar to gain insight into security within the payment card industry and uncover PCI DSS compliance regulation information.

  • Improving Cybersecurity in the Contact Center: How to Prevent a Data Breach

    Sponsored by: Semafone

    According to the Semafone's State of Data Security in Contact Centers Report, more than 40% of agents do not report data breach attempts. Take an in-depth look at this webinar to gain a better understanding of the payment card industry and how to advance your security to prevent data breaches from occurring.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.