ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Standards Multimedia

  • Panel Discussion: Securing the Cloud

    Sponsored by: Dell SecureWorks

    The current pandemic has had considerable impacts on business environments and cloud usage – causing security leaders to revisit their cloud security strategies. In this webinar, join a panel of Secureworks security leaders as they explore the common challenges organizations are facing in securing their cloud environments.

  • Cloud Insiders - Risk and Compliance in the Hybrid Cloud

    Sponsored by: Xtravirt

    A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Combating Threats with the DDoS Defenders at Tata

    Sponsored by: TATA Communications

    In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • SailPoint Identity Now: Certification Creation

    Sponsored by: SailPoint Technologies

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

  • SailPoint Identity Hub: Search, Track & Manage Access

    Sponsored by: SailPoint Technologies

    The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.

  • Identity Governance for Workday

    Sponsored by: SailPoint Technologies

    In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.

  • SailPoint Identity Now: Certification Process Overview

    Sponsored by: SailPoint Technologies

    In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.

  • SailPoint Identity Now: Dashboard Overview

    Sponsored by: SailPoint Technologies

    In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • The Evolution of Automation: Unite People and Opportunity for Growth

    Sponsored by: Red Hat

    To ensure the productivity and security needs of today’s organizations are being met, IT leaders are embracing the benefits of automation for unifying their people and processes. Watch this webinar for an in-depth look at the Red Hat Ansible automation platform – its key features, capabilities and success stories.

  • Modernizing SOCs with Advanced Threat Intelligence

    Sponsored by: Bitdefender

    This webinar provides a comprehensive look at the challenges, threats, and trends as they relate to today’s SOCs, and offers insight into embracing tactical, operational and strategic threat intelligence. Join Jarret Raim and Daniel Clayton, IT security leaders at Bitdefender, as they discuss the need to modernize your SOC.

  • Threat Intelligence Driven Detect and Response Operations

    Sponsored by: Bitdefender

    Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.

  • Securing Your Data Stored in OneDrive: SailPoint Demo

    Sponsored by: SailPoint Technologies

    In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.

  • MITRE ATT&CK: Security Evaluation Overview

    Sponsored by: BlackBerry

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

  • MITRE ATT&CK: The Power of Prevention

    Sponsored by: BlackBerry

    In this brief webinar, join industry experts as they provide insight into optimizing the MITRE ATT&CK framework using artificial intelligence and machine learning – providing an overview of the framework and why it’s important, as well as the role of AI for enhance threat detection and prevention.

  • Panelist Discussion with Q&A

    Sponsored by: BlackBerry

    In this 14-minute panelist discussion with Q&A, join industry experts as they provide insight into commonly asked questions and hot topics surrounding the MITRE ATT&CK framework – discussing topics from hypothetical testing scenarios to its efficacy as a resource during the COVID-19 pandemic, and more. Watch now to get started.

  • Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal

    Sponsored by: Itergy

    After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.

  • Where Law and Tech Will Collide in 2020

    Sponsored by: RSA Conference

    The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.

  • Shor's Algorithm

    Sponsored by: Thales

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • How Threat Modeling & Attack Simulation Works

    Sponsored by: Coalfire

    In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.