ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Protecting Sensitive Payment Data on AWS

    Sponsored by: Amazon Web Services

    While developing an online concessions payment program for local students, Snapper, an account-based solutions provider, realized its current security capabilities could use a tune-up to avoid putting student information at risk. Find out how Snapper strengthened its payment security without making concessions on customer security.

  • Reducing Cybersecurity Risk for SMBs: How Security Awareness Programs Deliver Big Returns

    Sponsored by: MediaPRO

    Tune into this webinar, where Derek Brink, Aberdeen vice president, and Tom Pendergast, MediaPRO's Chief Strategist, discuss how small- and mid-size businesses (SMBs) should consider employee security awareness programs to help address their growing cybersecurity risks.

  • Creating Engaging Privacy Awareness Training for Millennials Webinar

    Sponsored by: MediaPRO

    How do you convince your employees in the millennial generation the importance of privacy when they've grown up with sharing on social media? Watch this on-demand webinar, Creating Engaging Privacy Awareness Training for Millennials to find out.

  • Ensure Data Protection with Fidelis Network

    Sponsored by: Fidelis

    To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Stop Losing Sleep (or Money) Over a Potential Breach

    Sponsored by: Fortinet, Inc.

    What's keeping you up at night? For 46% of organizations, a talent shortage to fight cybersecurity is at the top of the list. Join this webinar to understand breach technology and the shift that is occurring beyond just detection, so your organization can get the sleep it needs.

  • The Impact of GDPR Even if You're Not in the EU

    Sponsored by: Fortinet, Inc.

    Listen in on this informative webcast to learn more about what GDPR compliance means for organizations not located in the EU and how network security technologies come into play with GDPR.

  • PCI DSS & Data Security for Contact Centers: Navigating the Regulatory Landscape

    Sponsored by: Semafone

    With the onslaught of cyberattacks that have occurred this year, data security has never been a higher priority for organizations, especially for contact centers. Learn from 2 leaders in the data security field about top data security regulations, laws and standards affecting contact center governance, and more.

  • Think beyond the traditional approach to security

    Sponsored by: Cylance

    Always being a step behind the hackers is a losing battle – it's time to think beyond the traditional approach of security and consider a new prevention strategy.

  • How to Defeat 2018's Biggest Security Treats

    Sponsored by: Arctic Wolf

    In this webcast, discover keys tools and methods to help you develop a proactive security defense so you can defeat 2018's biggest threats.

  • IT Priorities 2018 - What's happening in security?

    Sponsored by: ComputerWeekly.com

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

  • Spectre and Meltdown Podcast

    Sponsored by: RSA Conference

    Spectre and Meltdown have the potential to affect personal computers, mobile devices, and cloud infrastructure dating back to 1995. Listen to this podcast to hear Paul Kocher's expert take on the Spectre and Meltdown cyberthreats as well as tips and insights into protecting your sensitive data from the attacks.

  • Stop Really Nasty Malware, Pre- and Post-Execution

    Sponsored by: enSilo

    Sophisticated malware is the new weapon of choice for criminals. Tune into this webinar to hear from security expert, Dave Shackleford, as he reviews a security strategy aimed at responding and defending against advanced malware and ransomware threats.

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • Safeguard Your Life Sciences Data with Druva and AWS

    Sponsored by: Amazon Web Services

    Join this webinar tomorrow, September 18th at 9 am PT/12 pm ET to learn how Allergan used Druva and AWS during the acquisition of ZELTIQ Aesthetics. You will hear how Allergan protected against accidental and purposeful data loss, and how backup data can be used for eDiscovery and forensic analysis.

  • Webinar: Financial Services Organizations, Data Privacy, & GDPR

    Sponsored by: Amazon Web Services

    Financial services companies are encouraged to register for this upcoming webinar on Sept 16. You'll learn how insurance carrier Asurion uses a simple, comprehensive data governance solution to discover, protect, and monitor sensitive personal data across all AWS data repositories.

  • Enterprise Data Protection for Healthcare and Life Sciences

    Sponsored by: Amazon Web Services

    Tune into this webinar from AWS and Commvault to find out how a major healthcare organization tackled rapid data growth with the help of a secure, cloud-based data management platform.

  • How Snapper Further Protects Data in Amazon S3 using CWP for Storage

    Sponsored by: Amazon Web Services

    Tune into this webinar on September 13, 2018 (10:00am PT / 1:00pm ET) to learn how Cloud Workload Protection for Storage consistently and reliably protects the data stored in the public cloud using AWS' native capabilities.

  • Protecting Engineering IP in the Age of Collaboration

    Sponsored by: Vera

    Did you know that sharing enterprise information can open up your IP to risk, theft or loss? Listen in on this webinar to learn how to protect valuable engineering IP in a highly collaborative environment.

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • How to Prepare for GDPR

    Sponsored by: AlienVault

    The GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. Take a look at this webcast to uncover a compliance and unified security management approach to prepare for the GDPR.

  • The EU General Data Protection Regulation

    Sponsored by: Oracle Cloud

    The General Data Protection Regulation (GDPR) gets a lot of buzz for what it will do for data privacy – but how much do you really know about what it means? Download this webcast to learn more about different aspects of GDPR, and discover how businesses can approach getting compliant.

  • Why Your Approach to Data Governance Needs a Major Update

    Sponsored by: Delphix

    In this webcast, hear how customers are changing their approach to data governance and adapting to new regulations such as GDPR.

  • What Security People Want: Making DevSecOps Happen with Containers

    Sponsored by: Aqua Security

    Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.

  • Identity Analytics – A more Collective Defense

    Sponsored by: One Identity

    As technology evolves, access management becomes especially difficult when dealing with multiple tools to manage users, groups, computers, permissions, and more. Explore this webcast to gain insight into an identity analytics and risk intelligence SaaS program that can help simplify this task.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.