ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • The Rise of Insider Risk: Why a New Approach is Needed to Protect Data

    Sponsored by: Code 42

    Now that companies have created a culture of collaboration, allowing employees to use new tools to work in faster and smarter ways, this mean that employees are creating insider risks simply by doing their jobs. Join the discussion with the authors of Inside Jobs: Why Insider Risk is the Biggest Cyber Threat You Can’t Ignore to learn more.

  • The Birds and the Bees: Having the Security Talk With Your Clients

    Sponsored by: ConnectWise

    If you think talking to your clients about security is painful now, imagine having the talk AFTER an incident. Join David Powell, SVP Expansion Sales, and Wes Spencer, CISO, Perch, of ConnectWise, as they discuss how to make this talk as painless as possible.

  • Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis

    Sponsored by: Interos

    The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.

  • SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long

    Sponsored by: Interos

    The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.

  • The Changing Vendor Audit Landscape

    Sponsored by: Livingstone Group

    As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.

  • NWN SecureX Online Workshop

    Sponsored by: NWN Corporation

    Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks Webinar

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • Anatomy of a Hack Webinar

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • The Latest Trends in Data Cataloging for BI

    Sponsored by: Alation

    In this webinar, watch Dresner Advisory Service and Alation discuss the latest trends in data cataloging for BI. Learn about the latest findings from Dresner Advisory Services' second annual Data Catalog Market Study, and discover why 90% of respondents believe that data governance is critical to business success.

  • Agile Data Governance: a Bottom up Approach

    Sponsored by: Alation

    In this webinar with Malcolm Chisholm of First San Francisco Partners, and Aaron Kalb of Alation, learn best practices for implementing agile data governance and how a data catalog can support these initiatives.

  • Manage Your Operational Big Data Like a Super Hero

    Sponsored by: IBM

    Learn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Webinar: 20 Critical Controls for Cyber Defense

    Sponsored by: ISACA

    Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

  • Tips for Expediting Incident Response

    Sponsored by: Threat Track Security

    This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Webcast: Symantec Internet Security Threat Report 2014

    Sponsored by: Symantec Corporation

    Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.

  • Balancing Risk with Agility: Best Practices for Securing Cloud Deployments

    Sponsored by: Trend Micro

    Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Web Security – Virtual Appliance

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

  • Maximum-Strength Threat Detection for Mid-Size Enterprises

    Sponsored by: EMC Corporation

    This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.

  • Best practices in managing requirements in Energy and Utilities industries

    Sponsored by: IBM

    This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.

  • Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World

    Sponsored by: Code42

    In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.

  • Are you minding your business's reputation? What can you do to mind it better?

    Sponsored by: IBM

    Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences