REGISTER

Check Point Software

When: Dec 07 2010

Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks

Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.

Symbian Foundation

When: Dec 07 2010

Presenting: Craig Heath, Chief Security Technologist, Symbian Foundation

Fashion accessory, personal entertainment device, social network portal and business tool. People keep their smartphones with them 24 hours a day and expect to use them in all contexts of their life, both business and personal.

Intel

When: Dec 07 2010

Presenting:  Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel

The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.

SonicWALL

When: Dec 07 2010

Presenting:  Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager

The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.

OWASP

When: Dec 14 2010

Presenting: Justin Clarke, London Chapter Leader, OWASP

Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.

ENISA

When: Sept 09 2010

Presenting: John Walker, Expert GovCloud Panel, ENISA & MD, Secure Bastion

John is a 'proven' visionary in the field of Cyber Security. He is an ENISA Listed Expert Panel Member, the MD of Secure Bastion, and Professor & PhD Mentor at Nottingham Trent University.

OWASP

When: Sept 09 2010

Presenting: Dennis Groves, Co-founder, OWASP

This panel session will explore the impact of the cloud on web application security.

BSI

When: Sept 09 2010

Presenting: David Fatscher, British Standards Institute

Panelists:
Richard Soley, CEO, Object Management Group (OMG)
David Fatscher, ICT Sector Development Manager, British Standards Institute (BSI)

Verizon Business

When: Sept 09 2010

Presenting: Michael Dahn, Director PCI Compliance, Verizon Business

The number one question on peoples' minds is: Can I be PCI Compliant in the Cloud? Organizations are planning millions of dollars on migrating to a variety of public/private cloud combination's and the lingering question is how compliance will impact these plans.

PayPal

When: Sept 09 2010

Presenting: Eve Maler, PayPal, Identity Evangelist

Digital identities started to "move into the cloud" in the last decade, delivering on use cases such as cross-domain single sign-on and attribute-based authorization. With the rise of consumer identity providers and cloud-based software development, we face new opportunities and threats.

SonicWALL

When: Sept 09 2010

Presenting: Patrick Sweeney; SonicWALL, VP of Product Management

The ease-of-use, high scalability and low maintenance of cloud computing are just some of the benefits that are driving adoption of this new trend within the enterprise. Gartner confirms this in a recent report* that revealed that cloud computing rates as the second highest technology priority in 2010, behind only virtualization.

Forrester

When: Sept 09 2010

Presenting: Jonathan Penn; Forrester Research, Vice President

Underpinned by both technology and economic disruptions, cloud computing is a sustainable, long-term IT paradigm that will fundamentally change the way business customers and individual users engage with technology providers. At the moment, most customers are confused by the overused "cloud" term and are concerned over the risks of cloud computing.

Deloitte

When: Aug 19 2010

Presenting: Chris Burtenshaw, Information & Technology Risk Manager, Deloitte

In a challenging economic climate, delivering value from security technologies like Security Information and Event Management (SIEM) is higher up the agenda than ever before. This presentation discusses some strategies for success, with a few examples of the types of use cases which we've found most valuable to our clients.

SecureWorks

When: Aug 19 2010

Presenting: Ritesh Singhai, Senior Security Engineer, SecureWorks

To protect critical information and business processes and to comply with industry regulations, organisations can no longer rely sole on network level security. They must also monitor a myriad of application on a variety of different platforms. Doing so is a complex, labour intensive undertaking that involves more than simply purchasing security hardware and software.

Security Warrior Consulting

When: Aug 19 2010

Presenting: Dr. Anton Chuvakin; Security Warrior Consulting, Principle

The presentation will discuss how to bring order (in the form of standards!) to the chaotic world of logging. It will give a brief introduction to logs and logging and explain how and why logs grew so chaotic and disorganized.

The 451 Group

When: Aug 19 2010

Presenting: Andrew Hay, CISSP Senior Analyst, Enterprise Security Practice, The 451 Group

The integration of 3rd party products within SIEM and Log Management platforms is often a race to competitive parity. Unfortunately for customers, simply having cursory integration for a product without an ongoing integration lifecycle is about as useful as the platform not supporting the device in the first place.

SecViz.org

When: Aug 19 2010

Presenting: Raffael Marty, Chief Logger, SecViz.org

Over the past years, organizations have collected more and more data and log files within their networks, systems, and cloud environments.

Aberdeen Group

When: Aug 20 2010

Presenting: Derek Brink, Aberdeen Group, VP & Research Fellow for IT Security

Companies of all sizes are trying to make sense of the incredible volume of data that is being generated by their computing infrastructure and their existing security solutions. Much like the children ice-skating game of "crack the whip", Aberdeen's research indicates that closing the performance gap between leaders and laggards in the front-end - i.e., collecting and managing the data (log management) - helps to accelerate the progress needed in the back-end - i.e., interpreting the data and taking action (security information and event management).

the_coming_wave

When: Aug 05 2010

Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security

Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.

Mercantil Commercebank

When: Aug 05 2010

Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security

Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.

SonicWALL

When: Aug 05 2010

Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL

The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.

Panel

When: Aug 05 2010

Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

Quocirca

When: Aug 05 2010

Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca

The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.

panelholdingtn

Recorded: July 14 @ 3PM EST

Presented by: Michael Rasmussen and Eric Young

500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

MetricStream TPRM

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top