REGISTER

Information Security

panelholdingtn

Recorded:    September 24 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today's expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data "lakes" such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.

BYOD Webcast

Recorded:    February 21 | 2013      Play

69% of organizations have employees using mobile devices to connect to their corporate network, and Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support. This brings not only security concerns, but practical problems with managing a variety of devices that can contain both personal and corporate data. As a result, mobile device management (MDM) and bring your own device (BYOD) solutions for the enterprise are exploding into the market. Choosing the right solution will increase enterprise efficiency, while maintaining security and regulatory compliance, without a massive burden on IT.

The Aberdeen Group

When: Dec 07 2010

Presenting:  Derek Brink, Vice President & Research Fellow, Aberdeen Group

Worries of 2011 – What to look out for and how to tackle them.

Intel

When: Dec 07 2010

Presenting:  Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel

The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.

MDM Security and Compliance

Recorded: June 20 | 2012     

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

Check Point Software

When: Dec 07 2010

Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks

Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.

SonicWALL

When: Dec 07 2010

Presenting:  Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager

The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.

SANS

When: Dec 07 2010

Presenting: Ward Spangenberg, Director, Zynga Game Network; Dave Asprey, Trend Micro; Becky Pinkard, The SANS Institute

Join Ward Spangenberg, Director of Security at Zynga Game Network; Becky Pinkard of SANS Institute and Dave Asprey of VP Cloud Security, Trend Micro as they critically evaluate if vendors are doing enough to prevent the threats from hackers in the cloud.

BT

When: Dec 07 2010

Presenting: Jason Stradley; BT Global Services, US&C Security Practice Lead

Endpoint Security Management: Trust but Verify

OWASP

When: Dec 14 2010

Presenting: Justin Clarke, London Chapter Leader, OWASP

Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.

Quocirca

When: Dec 07 2010

Presenting:  Bob Tarzey, Analyst & Director, Quocirca

In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours.

Symbian Foundation

When: Dec 07 2010

Presenting: Craig Heath, Chief Security Technologist, Symbian Foundation

Fashion accessory, personal entertainment device, social network portal and business tool. People keep their smartphones with them 24 hours a day and expect to use them in all contexts of their life, both business and personal.

techtarget

Held: Jul 08 2010 4:00 am

Presenting: Ron Condon, UK Bureau Chief, TechTarget

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top