ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces

    Sponsored by: Netskope

    SASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.

  • Navy Federal Credit Union on Security During Crisis

    Sponsored by: Synack

    Leading an organization or a team during the COVID-19 pandemic is a challenge regardless of title. However, the CISO is uniquely armed with the skills to respond, manage and lead a team during crisis. In this podcast, hear from the CISO of Navy Federal Credit Union as he shares his methods for building trust and maintaining business as usual.

  • Arrow & RSA Video 2: Protect and Optimize Your Workforce with RSA SecurID Access

    Sponsored by: Arrow & RSA

    Digital transformation initiatives and approaches to remote workers have accelerated, and these changes bring new challenges and risks. In this webinar, learn how to address these new risks from an identity and access management perspective and how new capabilities in RSA SecurID Access strive to help you succeed in today’s environment.

  • Continuous Compliance on AWS

    Sponsored by: AWS Mphasis/Stelligent

    Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.

  • Taking Your Third Party Security Program to the Next Level

    Sponsored by: Panorays

    Today, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.

  • How to Elevate Your Threat Intelligence Program

    Sponsored by: DomainTools

    According to the SANS 2020 Cyber Threat Intelligence Survey, 82% of organizations find value in threat intelligence, however, only 4% of respondents had processes in place to measure effectiveness. So, how do you demonstrate and quantify the value of your threat intelligence program? View this Forrester-sponsored webcast to learn the answer.

  • Evaluating and Measuring DDoS Risk During the COVID-19 Era

    Sponsored by: Akamai Technologies

    Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.

  • How to Identify Threats Faster and Increase Productivity

    Sponsored by: DomainTools

    With the rapid-fire speed of alerts and multitasking required in infosecurity, security operation center (SOC) professionals often must determine the potential outcomes of events with limited context. How can your teams reduce operational risk and be more productive? Watch this webinar to learn how to address this challenge and others.

  • NWN SecureX Online Workshop

    Sponsored by: NWN Corporation

    Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.

  • Vendor Risk Management by Deloitte

    Sponsored by: ServiceNow

    ServiceNow Vendor Risk Management supports enterprises with their Vendor Risk Management process and enables them to support the Vendor Risk Lifecycle with ease. It provides a centralized process for managing vendor portfolios, assessing vendor risks including the tiering process and completing a remediation lifecycle. Learn more here.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Refining risk resolution for the new normal

    Sponsored by: ServiceNow

    If the COVID crisis has taught us anything it’s that adaptability is necessary for success. In this session, you will learn how enhancements to Advanced Risk Assessment will get you information more quickly, so you can get ahead of risks.

  • Build Resilience for Your Business in the New/Next Normal into 2021 and Beyond

    Sponsored by: ServiceNow

    In this new normal, most companies don't have a complete picture of what's happening in various parts of their business. To stay ahead of risks and plan for recovery means having visibility and control, and the right software can help you achieve both. Watch this video to learn about Business Continuity Management from ServiceNow.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • How to Re-establish Your Network and Security Perimeter

    Sponsored by: Insight

    Data protection is being prioritized now more than ever. Organizations are looking for ways to improve their posture and maintain their business integrity by managing investments based on the correct risk profile. But when it comes to security, correctness takes time. Watch this webcast for a pragmatic approach to privacy and security.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • The Latest Trends in Data Cataloging for BI

    Sponsored by: Alation

    In this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.

  • Agile Data Governance: A Bottom-Up Approach

    Sponsored by: Alation

    In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.

  • Barracuda Advanced Threat Protection for SD-WAN

    Sponsored by: Barracuda

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.