ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Security, Compliance & ERP

    Sponsored by: SAP

    In this comprehensive webinar, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.

  • Security, Risk and Governance Breach Defense: Anatomy of a Breach

    Sponsored by: Micro Focus

    The odds of experiencing a data breach are 1 in 4. And as seen from breaches including Equifax, Yahoo and Uber, the effects are costly. But how can organizations keep secure? There needs to be a plan. In this webcast, Rob MacDonald discusses how organizations can use the NIST Framework to strengthen their defenses against a breach.

  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy

    Sponsored by: Forcepoint

    Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.

  • Employing a Risk Adaptive Model to Detect and Prevent Threats From Within

    Sponsored by: Forcepoint

    Striking a balance between maximizing productivity and minimizing risk requires a security program that can identify and respond to the insider threat. In this webcast Forcepoint Senior Security Strategist Homayun Yaqub, discusses the foundations that underpin an effective program. Watch now to learn more.

  • Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?

    Sponsored by: Forcepoint

    In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.

  • Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms

    Sponsored by: Mimecast

    Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    Learn about the most dangerous new attack techniques in this follow-up to the popular RSA Conference 2019 SANS Institute keynote panel. See how these new threats work, what's coming next, and the best ways to bolster your defense against them. Watch now.

  • H2 2018 Cybercrime Report Webinar

    Sponsored by: LexisNexis Risk Solutions

    In this Cybercrime Report webinar, explore key findings and trends from the H2 2018 Cybercrime Report, including how a stunning number of transactions capture global bot attacks from new geographies and how there has been a significant increase in transactions originating from mobile devices.

  • Risk Assessment with Secure Content Management

    Sponsored by: Micro Focus

    Tune into this webinar to learn how Micro Focus's Secure Content Management suite and its components help mitigate risk through the data assessment process.

  • Ensure Privacy Protection Through Your Digital Transformation

    Sponsored by: Micro Focus

    Today, the race to digital transformation is a vital one. However, as enterprises begin their digital transformation journey, they have to make privacy protection a top priority. In this webcast, Becky Arenson and Carole Murphy discuss how to minimize the risk of digital transformations with a unified technology framework.

  • Zero Trust Security: Supporting a CARTA approach with Network Security

    Sponsored by: Tigera

    In this webinar, discover how Christopher Liljenstolpe is using a continuous adaptive risk and trust assessment (CARTA) approach with network security.

  • Avoid the Breach With Effective Application Security Testing

    Sponsored by: HackerOne

    Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.

  • Shipping Fast

    Sponsored by: Trend Micro, Inc.

    In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.

  • 2019: No Oscars for Bad Threat Actors

    Sponsored by: DomainTools

    There has been a massive increase in the number and types of cybersecurity threats over the years. In this webcast, experts from DomainTools discuss some cyber forecasts and predictions for the coming years including IoT devices, automation, breaches and more.

  • The Beginner's Guide to Mitigating Phishing Attacks

    Sponsored by: DomainTools

    Phishings attacks are a common form of fraud that is most commonly done by disguising malicious links to distribute malware. In this webcast, Corin Imani, Senior Security Advisor at DomianTools discusses real world examples, the steps to executing a phishing attack and ways to remediate a phishing attack.

  • Using Dynamic Data and Advanced Analytics to Secure Your Ecosystem

    Sponsored by: CyberGRX

    Download this webinar to learn about the insights and capabilities that can help you identify which third parties pose the greatest risk to your business.

  • Solving the Cybersecurity Skills Shortage

    Sponsored by: Arctic Wolf

    22% of respondents suffered a security breach at their law firms, according to a survey conducted by the American Bar Association. Download this webcast to explore the challenges of finding cybersecurity personnel and what you can do to find qualified personnel that will help you protect your data.

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • Integrated Security Operations - The Difference between Knowing and Guessing

    Sponsored by: ServiceNow

    Cyberattacks are getting more sophisticated and in turn, harder to defend and protect against. Access this webinar to gain insight into integrated security operations strategies.

  • Why Websites Stay Vulnerable: And What You Can Do About It

    Sponsored by: WhiteHat Security

    Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.

  • Getting the Most out of your AppSec Program

    Sponsored by: WhiteHat Security

    According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.

  • Orchestration of App-Driven Security Policies

    Sponsored by: Silver Peak

    Take a look at this webcast to discover how to orchestrate security policies within applications.

  • Get Real Time Threat Detection Starting on Day 1 with AlienVault USM

    Sponsored by: AT&T Cybersecurity

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • Manage Your Operational Big Data Like a Super Hero

    Sponsored by: IBM

    Learn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.