REGISTER

ISAF

When: Aug 05 2010 6:00 am

Presenting: Dr. David King, Founder & Chair, Information Security Awareness Forum (ISAF)

David is the head of the London branch of the Institute of Information Security Professionals. David has over 25 years of experience in security. He was the former Head of Group Information Security at Aviva and previously a VP and Chief Security Architect at JP Morgan Chase. He has also worked for CapGemini and ICL Defence Systems.

KTN Digital Systems

When: Aug 05 2010 9:00 am

Presenting: Emma Webb-Hobson, KTN Digital Systems

Preventing Data Loss within Cloud Environments.

M86 Security

When: Aug 05 2010 10:00 am

Presenting: Bradley Anstis, VP Technical Strategy, M86 Security

Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don't seem to be preventing this ever-growing problem.

Nokia

When: Aug 05 2010 12:00 pm

Presenting: Jay Leek, Nokia, Global Manager, Corporate IT Security

It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz.

www.aberdeen.com

When: Aug 05 2010 4:00 pm

Presenting: Derek E. Brink, CISSP; Aberdeen Group, Vice President and Research Fellow

Aberdeen's fourth annual study on data loss prevention -published on June 30, 2010 - presents the challenges, strategies, best practices and year-over-year comparisons of Best-in-Class organizations in safeguarding their sensitive data using content-aware data loss prevention technologies.

www.lumension.com

Recorded: June 4 @ 11am EST

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

www.TruArx.com

Presenting: Chris Noell, Executive Vice President, Product Management, TruArx

In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.

CyberSource

Recorded: 31 March 2010   

Maintaining payment security doesn't require adding even more proverbial locks and bolts to your infrastructure. In fact, you can secure your payment process - including complying with PCI-DSS standards - with less complexity and time, while adding more scalability. In the upcoming CyberSource webinar, you'll see how your peers are adopting a safer, more secure approach by eliminating all contact with payment data - a strategy we call Enterprise Payment Security 2.0.

Fiserv

Held: Jul 22 2010 10:00 am

Presenting: Simon Goldstein; Fiserv, Director, Risk Management, CISA, CISM

Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices.

Value Bridge

Held: Jul 22 2010 11:00 am

Presenting: Brian Barnier; Value Bridge Advisors, Principal

IT Risk 2.0!? Am I ready? OMG, did I even do IT Risk 1.0? "Risk Management" has skyrocketed on both business and IT leader's priority lists - financial crisis, gulf oil spill, cyber-attacks, network failures, product liability.

Orbitz

Held: Jul 22 2010 12:00 pm

Presenting: Jeramy Cooper-Leavitt, Orbitz World Wide, Director of Compliance

Compliance laws and new technologies can have a great impact on the business infrastructure and business process that we support as security and compliance professionals.

WhiteHat Security

Held: Jul 22 2010 5:00 pm

Presenting: Jeremiah Grossman, WhiteHat Security, CTO and Founder

Information security threats are way up, fraud losses continue to rise, regulatory fines are increasingly common, and budgeted dollars to solve these myriad of problems are in short supply.

techtarget

Held: Jul 08 2010 4:00 am

Presenting: Ron Condon, UK Bureau Chief, TechTarget

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

ISACA

Held: Jul 08 2010 6:00 am

Presenting: Mark Henshaw, Director ISACA London, Chairman ISACA Winchester

Intrusion Prevention- are we joking?
- When your business is a target, can you really prevent sponsored intrusion?

SecureWorks

Held: Jul 08 2010 7:00 am

Presenting: Paul Pearston,Senior Security Engineer, SecureWorks

Best Practices for Managing Intrusion Prevention Effectively.

Vodafone

Held: Jul 08 2010 10:00 am

Presenting: Marco Ermini: Vodafone Group Services, Network Security Manager

Marco will share his experiences, and the top risks he faced when implementing IPS at Vodafone.

NetworkComputing

Held: Jul 08 2010 12:00 pm

Presenting: Mike Fratto; Network Computing, Editor

Before you can prevent an attack, you have to detect it. Traditional signature based IDS's are prone to false positives and can only detect malicious traffic it has signatures for.

Interhack

Held: Jul 08 2010 4:00 pm

Presenting: C. Matthew Curtin, Interhack, Founder

Intrusion prevention technology is understandably focused on using network data to detect and to stop intrusions in progress. When (not if) intrusion prevention systems fail to prevent intrusions, can they provide any value to the management of an incident?

Advanced Reliability

Held: Jun 24 2010 11:00 am

Presenting: Robert Shiveley, Mission-Critical Platform Marketing Manager, Data Center

Over the past decade dramatic changes have been taking place in the datacenter. Long gone are the days when Sun was the "dot" in .com and companies were scrambling to put in place e-Commerce strategies and place their businesses on the Internet super highway.

Fusion Risk Management

Held: Jun 24 2010 12:00 pm

Presenting: Daniel A. Dec; Fusion Risk Management, SVP, Information Security

This presentation will discuss the challenges and benefits of developing and managing an Operational Risk Management Program (ORMP).

SonicWALL

Held: Jun 24 2010 3:00 pm

Presenting: Matt Dieckman; SonicWALL, Product Manager

At the beginning of this 2010, the harsh winter storms raging across the US brought many businesses to their knees - including even the most prepared of organizations like the Federal Government.

Oracle

Held: Jun 24 2010 5:00 pm

Presenting: Frank Leonetti, Oracle Professional Services, Practice Manager: BC/DR

Frank has been a featured and keynote speaker at several North American conferences including: DRJ, DRIE, CPM, CIO Forum, InfoWorld, Marcus Evans BC/Security Conference and several ACP events.

qualystn

Recorded: 19 March 2010   

This session will explore how the global marketplace and current business environment is impacting companies of all sizes through competitive and regulatory pressures. The discussion will cover how an outsourced/managed PCI solution can help companies address their compliance challenges and improve business performance.

enterasyslogo

Recorded: 28 Jan 2010

Presenting: Dennis Boas, Security Solutions, Enterasys Networks

Abstract: In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.

Banner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top