Security WebinarsVIEW ALL WEBINARS
As we have often heard, "Those who cannot remember the past are condemned to repeat it." This session examines major hacking incidents, including the recent hack of the Democratic National Committee, to look for lessons learned, to predict future attack trends and to outline defensive strategies to address these trends.
Risk and the business value of IT are both based on the technology dependencies of business outcomes. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the need to run the business.
Information Security markets are rapidly changing. Security vendors who fail to tackle these ongoing shifts risk missing opportunities as buyer needs and preferences rapidly evolve. In this session, we'll examine findings from our recently published Market Opportunity Model, Information Security Forecast, Market Trends report, and the Security Buyer Preference Survey results to deliver actionable insights on guidance on the shifting information security market.
Security continues to be both a top challenge and an investment priority for IT leaders in midsize organizations. By keeping these trends in mind, midsize enterprise IT leaders can select the right mix of strategy and tactics to effectively and affordably strengthen the security posture of their organizations.
With new breaches every week, IT leaders are in a constant scramble to secure customer data. However, we're left to question what sort of expectations customers have for data privacy. In this session, we review the results of our research into what customers expect when it comes to your use and protection of their data.
This webinar sets out the current story of cloud security, providing an overview of the unique risks of the various forms of public cloud computing, so that security professionals can help the rest of their organization fully understand and address cloud risks. The unique security challenges of IaaS and SaaS are discussed, a summary of the current and near-term products and practices that can be used to monitor and control the use of public cloud computing are provided.
Applications are under increasing threat, especially as more are exposed through mobility, cloud and APIs. Applications must be secured with a combination of practices and technologies to enable agile development, continuous integration and DevOps. In this webinar, learn how to make application security easy for developers and architects.