REGISTER

Live Webcast!

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

OpenText

Recorded:     March 18 | 2013    View

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Quocirca

When: Aug 05 2010

Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca

The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.

Panel

When: Aug 05 2010

Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

the_coming_wave

When: Aug 05 2010

Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security

Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.

SonicWALL

When: Aug 05 2010

Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL

The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.

Mercantil Commercebank

When: Aug 05 2010

Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security

Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.

Banner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top