Security WebinarsVIEW ALL WEBINARS
EST: 1:00 p.m. | PST: 10:00 a.m. | GMT: 18:00 Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, Erik T. Heidt will identify the major architectural components of IoT architecture and perform risk analysis of each. We will focus on examining security within the Edge. A model of breaking down Edge systems into architectural components that are suited for security analysis will be provided.
The EU General Data Protection Regulation (GDPR) hovers over organizations like the sword of Damocles, with fines theoretically at an all-time high. Beyond that, there are, of course, many reasons to "get privacy", including consumer trust, employee satisfaction and proper ethics. Organizations are at different levels of preparation toward GDPR compliance. Join this webinar to make sure your organization is properly prepared and that you haven't overlooked any of the top 10 basic changes that need your attention before and after May 25, 2018.
This webinar sets out the current story of cloud security, providing an overview of the unique risks of the various forms of public cloud computing, so that security professionals can help the rest of their organization fully understand and address cloud risks. The unique security challenges of IaaS and SaaS are discussed, a summary of the current and near-term products and practices that can be used to monitor and control the use of public cloud computing are provided.
Many organizations continue to struggle to manage software license compliance audits effectively, resulting in undefended, unbudgeted and unmanaged costs. This webinar takes you through the audit process, helping you understand how to respond to an audit letter and manage the audit effectively, both internally and externally, to mitigate risk.
UEBA tools can successfully detect malicious and suspicious activity that otherwise goes unnoticed, but these new detection tools employ unfamiliar approaches (data science, nondeterministic methods, machine learning), and thus create their own deployment and operation challenges. This webinar covers the approaches that work with UEBA.
Security concerns continue as organizations globally grapple with technology changes affecting them. Threats to that technology and supporting process continue to grow in number and sophistication. Traditional IT security leaders have become digital security leaders as they expand support to address risks for technology-savvy engineering and physical environments while embracing expanded roles for cloud and mobile services
IDaaS as an IAM delivery method has been gaining in popularity, and more providers are entering the market. The functionality and time to value offered has been steadily improving. But is IDaaS right for your organization? This webinar provides the information you need to make a decision for your organization and understand the market offerings.