Recorded: with Gartner | 2011 View Webinar
When companies share sensitive documents with partners outside the corporate network, security, compliance and collaboration are often seen as a tradeoff. You can lock information down behind the firewall with strict policies and centralized control, but without collaboration. Or you can use a collaboration portal, but at the expense of security and the ability to enforce corporate confidentiality policies.
Recorded: 2011 Listen Now
Annual costs of data management are soaring. So how can your business stay ahead of the curve to achieve and maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS) and still deal with potentially millions of points of vulnerability?
Recorded: September 14 | 2011 View Webinar
This event will discuss an overall payment security landscape, the costs associated with managing payment data, and the benefits of Tokenization. Attendees will learn how payment security solutions, such as encryption and tokenization can go beyond complying with PCI–DSS requirements and reduce the scope of PCI, while keeping data safe and alleviating the overall impact on your business.
The UCF is the only IT compliance framework that helps you manage conflicting and overlapping compliance requirements across hundreds of different regulations, allowing you to comply once and attest to many requirements including PCI, Sarbanes-Oxley, HIPAA, CobiT, NIST, and hundreds more.
Recorded: June 30 | 2011 View Webinar
In this session we will provide a detailed analysis on how PCI DSS 2.0 impacts your IT operations (e.g., network engineering, server management, and applications development); intended for technical audience.
Presenter: Tim Dunn, Vice President of Strategy, CA Technologies Security Europe
Traditional Identity and Access Management (IAM) platforms were built with one primary scenario in mind, to run on an enterprise's premises for their tightly scoped user community. The business and technology world has moved on, businesses want to be more innovative and agile. Gaining a competitive edge means exploiting technologies such as cloud, virtualisation, worker mobility enablement, personal device adoption, and business collaboration tools. IAM has become pivotal in enabling business innovation.
Presenter: Alan Priestly, Director, Cloud Marketing EMEA, Intel
Today, cloud access security requires more than a simplistic secure VPN tunnel or single sign on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. From a compliance standpoint it is a growing nightmare involving orphaned accounts, infected clients, and un-auditable silos of user activity data left outside enterprise control. In this session, Intel showcases key technologies that are being used in the market today to build a trusted client to cloud connection.
Presenter: Jason Wood, Assistant Professor, Jack Welch, President of WoodCPA Plus P.C.
The presentation will discuss audit considerations in a cloud computing environment. Technology professionals can learn what to expect from their auditors, and auditors can learn what areas to review in a cloud environment.