Security WebinarsVIEW ALL WEBINARS
EDT: 9:00 a.m. | PDT: 6:00 a.m. | GMT: 13:00 The EU General Data Protection Regulation (GDPR) hovers over organizations like the sword of Damocles, with fines theoretically at an all-time high. Beyond that, there are, of course, many reasons to 'get privacy', including consumer trust, employee satisfaction and proper ethics. Organizations are at different levels of preparation toward GDPR compliance. Join this webinar to make sure your organization is properly prepared and that you havent overlooked any of the top 10 basic changes that need your attention before and after May 25, 2018.
EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 16:00 As organizations struggle to deal with the evolving security threat landscape, there has been a resurgence in interest on deception techniques. Simple honeypots have evolved into distributed deception platforms and existing security solutions have also started to include deception components. This webinar focuses on using deception as a "low-friction" method to detect lateral threat movement and as an alternative or a complement to other detection technologies.
EDT: 9:00 a.m. | PDT: 6:00 a.m. | GMT: 14:00 Organizations are attempting to grow their digital security teams as way to combat intensifying security threats. However, this also means that the existing shortage in qualified, experienced digital security talent is increasing. This webinar presentation, based on case studies, will share how taking a "lean" approach to staffing your digital security team can help you alleviate this challenge.
Cybersecurity concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and its supporting process are increasing in number and sophistication. Traditional IT security leaders have now become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services. This webinar reviews the cybersecurity lessons learned and informs you how to use the past to create the future.
Warning: Your data is not all neatly defined, structured, organized and secured in your datacenter. Determining or defining the data that matters most, where it is or will be stored, who is or will be responsible for it must be clearly understood and defined in order to be GDPR compliant and for your data to be properly secured. The impact of big data projects, the continued migration to cloud platforms and applications, IoT projects, blockchain experiments can create new threats if a clear governance strategy is not in place. In this webinar, we'll help you determine what you need to do to be compliant and ensure data security in 2018 and beyond.
Chief Information Security Officers (CISOs) must change the ways they manage and communicate about cybersecurity risk in the future of digital business. Successful security and risk management leaders should leverage Gartner's Cognition/Sentiment Model to make better risk trade-offs and lead the conversation at the board level.
ON-DEMAND VIDEO FROM GARTNER SYMPOSIUM/ITEXPO 2017 "Data lakes are being positioned as a key target to be used in analytics, IoT applications and more. But they are a ticking time bomb for compliance, privacy and other data security because they have none of the data security capabilities leading commercial DBMSs provide as a matter of course. Creating a policy-driven governance model and selecting the required technology is a critical priority.
Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, Erik T. Heidt will identify the major architectural components of IoT architecture and perform risk analysis of each. We will focus on examining security within the Edge. A model of breaking down Edge systems into architectural components that are suited for security analysis will be provided.