Recorded: April 23 | 2014 Attend
Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.
Recorded: August 14 | 2013 Play
Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.
When: Aug 05 2010
Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL
The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.
When: Aug 05 2010 6:00 am
Presenting: Dr. David King, Founder & Chair, Information Security Awareness Forum (ISAF)
David is the head of the London branch of the Institute of Information Security Professionals. David has over 25 years of experience in security. He was the former Head of Group Information Security at Aviva and previously a VP and Chief Security Architect at JP Morgan Chase. He has also worked for CapGemini and ICL Defence Systems.
Recorded: March 18 | 2013 View
Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.
When: Aug 05 2010
Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum
Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.
When: Aug 05 2010 9:00 am
Presenting: Emma Webb-Hobson, KTN Digital Systems
Preventing Data Loss within Cloud Environments.
When: Aug 05 2010
Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security
Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.
When: Aug 05 2010
Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca
The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.
When: Aug 05 2010 10:00 am
Presenting: Bradley Anstis, VP Technical Strategy, M86 Security
Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don't seem to be preventing this ever-growing problem.
When: Aug 05 2010
Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security
Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.
When: Aug 05 2010 4:00 am
Presenting: Clive Longbottom, Business Process Analysis, Quocirca
Moving towards a Compliance Orientated Architecture.
When: Aug 05 2010 12:00 pm
Presenting: Jay Leek, Nokia, Global Manager, Corporate IT Security
It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz.