28 Jul 2009 9:00 am Presenting Phil D'Angio, VeriSign EMEA, Head of Business Development
Making PKI and Two Factor Authentication simple and cost effective: Hundreds of public and private organisations use PKI and One Time Password (OTP)credentials to secure transactions and interations with their employees, customers and business partners every day.
28 Jul 2009 7:00 am Presenting Geoff Llewellyn, Intellect UK & RPM Business Consulting Ltd, Board
Training in Economics and Social Science at London and Oxford Universities,Geoff's business experience spans both public and private sectors unified by a focus on change management . .
28 Jul 2009 6:00 am Presenting Patrick Curry, Clarion Identity Ltd, Director
The future of IAM is Federated ID and Access Management, but the issues are much more than technological. The rate of change in society is disturbing . .
28 Jul 2009 5:00 am Presenting Gilles Trachsel, Product and Solutions Marketing Manager, Juniper Network
Juniper offers the industry's only high-performance adaptive threat management solutions that leverage a dynamic cooperative product portfolio and network-wide visibility and control to increase the security.
28 Jul 2009 4:00 am Presenting Martin Smith MBE, The Security Company Limited, Founder
Martin Smith has led a fasciniation and varied 25 year carrer in the workl of security and is now one of Europe's most experienced corporate IT security practicioners. .
13 Aug 2009 9:00 am Presenting Toby Stevens, Director, Enterprise Privacy Group
Privacy and Data Protection have risen to the top of the Information Governance agenda, yet the processes to ensure compliance and proactive risk management are poorly understood by many organisations.
Much of the value of BRMS is achieved when it is combined with a larger SOA strategy and BPM. This video demonstrates clear requirements for reuse using the multichannel use case for retail banking.
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions. Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success.
(Archived)This webinar and service catalog demo will show you how Numara FootPrints Service Catalog will help your organization quickly provide an attractive menu of services tailored to your customers while providing transparency of service costs - all integrated into your service management workflow.
Presenting Martin Holzke, Director & Author, SoftQualm
Even more businesses get involved in on or other form of auditing, whether its finance(Sarbanes-Oxley, SAS70 etc.) or quality (ISO 9000, Six Sigma etc.)related to mention only those two areas . . .
Presenting: Jason Keogh, CTO and Founder of iQuate
Traditional IT inventory and audit packages are invaluable for analyzing risk across the IT estate. In effect they widen the audit universe . . .
Presenting: Barry Lewis, co-author: Wireless Networks for Dummies; Cerberus ISC
Secure Mobile Computing: Audit and control of memory sticks to Smartphones . . .
Presenting Paul Reymann; CEO of Reymann Group
Compliance used to be a periodic and mostly manual project driven by audit dates and deadlines. But those days are gone . . .
Presenting: Brandon Dunlap, Managing Director of Research, Brightfly
Unlike Y2K, which came and went, the recent spate of regulatory actions have accumulated on American companies like barnacles. . .
Presenter: Hussain Hasan; Managing Director,Technology Risk Management Service
Virtualization Technology Threats and Myths. There are 4 types of Virtualization . . .
Presenting: Doug Shin, Audit and Information Security Consultant
This session will outline and review the basic elements of Internal IT Audit function, including the differences betweeen External and Internal Audit, the purpose and value of Internal Audit function and other relevant topics . . .
Presenting: Jose Dias, CISA, Director American Express
This session discusses new trends and best practices on Application Audits. Similarities and differences between Infrastructure, Application, and Integrated Audits . . .
(Archived) Warren Kruse: VP, Data Forensics and Analytics, Encore Discovery Solutions
Spoilation: It's not always intentional. Not having a a plan before an incident or having inadequate documentation . . .
(Archived) Sean Regan, Product Marketing Manager, Enterprise Vault, Symantec Corp
Organizations are increasingly being ordered to produce email messages and other electronic files relevant to E-Discovery cases. The penalties for noncompliance with a court's discovery order can be severe . . .
(Archived) Steve Burgess, President of Burgess Computer Forensics
Digital Investigation and e-Discovery with Steve Burgess . . .
(Archived) Jeffrey S. Follett, Partner at Foley Hoag LLP
Whether mining data for e-discovery compliance or just going about its daily business, your company faces a welter of confusing and sometimes conflicting legal obligations and interests relating to information security and privacy . . .
(Archived) Robert Brown; Senior Director, Litigation Consulting at First Advantage
Preparing for e-discovery requires isolation specific data using a process that will withstand legal scrutiny. With virtually all communication and business processes captured on digital media, computer forensics can become critical to locating and interpreting electronic evidence . . .
(Archived) Stephanie Giammarco Partner at BDO Consulting
This session is aimed towards attorneys and in-house professionals who are involved with e-discovery. This interactive discussion will provide real-life examples of "E-Discovery Exceptions" . . .