Security WebinarsVIEW ALL WEBINARS
EDT: 9:00 a.m. | PDT: 6:00 a.m. | GMT: 13:00 Security concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and supporting process continue to grow in number and sophistication. Traditional IT security leaders have become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services
EDT: 1:00 p.m. | PDT: 10:00 a.m. | GMT: 17:00 UEBA tools can successfully detect malicious and suspicious activity that otherwise goes unnoticed, but these new detection tools employ unfamiliar approaches (data science, nondeterministic methods, machine learning), and thus create their own deployment and operation challenges. This webinar covers the approaches that work with UEBA.
2pm AEST | 12midnight EDT | 4am GMT The 2017 CIO Agenda highlights the importance of building a digital ecosystem for enterprises. Security and Risk Management leaders must understand CIO priorities and incorporate Security and Risk Management practices into the digital ecosystem to reap growth benefits.
As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.
Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the need to run the business.
Information Security markets are rapidly changing. Security vendors who fail to tackle these ongoing shifts risk missing opportunities as buyer needs and preferences rapidly evolve. In this session, we'll examine findings from our recently published Market Opportunity Model, Information Security Forecast, Market Trends report, and the Security Buyer Preference Survey results to deliver actionable insights on guidance on the shifting information security market.
Security continues to be both a top challenge and an investment priority for IT leaders in midsize organizations. By keeping these trends in mind, midsize enterprise IT leaders can select the right mix of strategy and tactics to effectively and affordably strengthen the security posture of their organizations.
With new breaches every week, IT leaders are in a constant scramble to secure customer data. However, we're left to question what sort of expectations customers have for data privacy. In this session, we review the results of our research into what customers expect when it comes to your use and protection of their data.