Security WebinarsVIEW ALL WEBINARS
EDT: 10:00 a.m. | PDT: 7:00 a.m. | GMT: 14:00 This webinar sets out the current story of cloud security, providing an overview of the unique risks of the various forms of public cloud computing, so that security professionals can help the rest of their organization fully understand and address cloud risks. The unique security challenges of IaaS and SaaS are discussed, a summary of the current and near-term products and practices that can be used to monitor and control the use of public cloud computing are provided.
EDT: 2:00 p.m. | PDT: 11:00 a.m. | GMT: 18:00 Many organizations are evaluating IaaS public clouds as disaster recovery locations instead of building or using an existing secondary data center. Well examine deployment approaches for leveraging Amazon Web Services (AWS) or Microsoft Azure for disaster recovery.
Many organizations continue to struggle to manage software license compliance audits effectively, resulting in undefended, unbudgeted and unmanaged costs. This webinar takes you through the audit process, helping you understand how to respond to an audit letter and manage the audit effectively, both internally and externally, to mitigate risk.
UEBA tools can successfully detect malicious and suspicious activity that otherwise goes unnoticed, but these new detection tools employ unfamiliar approaches (data science, nondeterministic methods, machine learning), and thus create their own deployment and operation challenges. This webinar covers the approaches that work with UEBA.
Security concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and supporting process continue to grow in number and sophistication. Traditional IT security leaders have become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services
As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.
Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the need to run the business.
Information Security markets are rapidly changing. Security vendors who fail to tackle these ongoing shifts risk missing opportunities as buyer needs and preferences rapidly evolve. In this session, we'll examine findings from our recently published Market Opportunity Model, Information Security Forecast, Market Trends report, and the Security Buyer Preference Survey results to deliver actionable insights on guidance on the shifting information security market.