Security WebinarsVIEW ALL WEBINARS
EDT: 1:00 p.m. | PDT: 10:00 a.m. | GMT: 17:00 Security continues to be both a top challenge and an investment priority for IT leaders in midsize organizations. By keeping these trends in mind, midsize enterprise IT leaders can select the right mix of strategy and tactics to effectively and affordably strengthen the security posture of their organizations.
EDT: 1:00 p.m. | PDT: 10:00 a.m. | GMT: 17:00 Backup and recovery is a very old, but often expensive and problematic, process for organizations. We look at current trends in backup, alternatives that are available, and their maturity and applicability, as well as best practices to remediating current backup challenges.
EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 15:00 Information Security markets are rapidly changing. Security vendors who fail to tackle these ongoing shifts risk missing opportunities as buyer needs and preferences rapidly evolve. In this session, we'll examine findings from our recently published Market Opportunity Model, Information Security Forecast, Market Trends report, and the Security Buyer Preference Survey results to deliver actionable insights on guidance on the shifting information security market.
EDT: 1:00 p.m. | PDT: 10:00 a.m. | GMT: 17:00 Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the need to run the business.
EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 15:00 As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.
With new breaches every week, IT leaders are in a constant scramble to secure customer data. However, we're left to question what sort of expectations customers have for data privacy. In this session, we review the results of our research into what customers expect when it comes to your use and protection of their data.
Security concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and supporting process continue to grow in number and sophistication. Traditional IT security leaders have become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services. This webinar reviews the lessons learned and informs listeners how to use the past to create the future.
This webinar sets out the current story of cloud security, providing an overview of the unique risks of the various forms of public cloud computing, so that security professionals can help the rest of their organization fully understand and address cloud risks. The unique security challenges of IaaS and SaaS are discussed, a summary of the current and near-term products and practices that can be used to monitor and control the use of public cloud computing are provided.