REGISTER

Webinars:

malware

29 Sep 2009 2:00 pm Presenting Lenny Zeltser SANS Technology Institute

Malicious software is an integral and dangerous component of many breaches.

continuous

29 Sep 2009 4:00 pm Presenting Paul Reymann; CEO of Reymann Group in association with Tripwire

Compliance used to be a periodic and mostly manual project driven by audit dates and deadlines.

barclays

8 Sep 2009 10:00 am Presenting Becky Pinkard, Barclays Bank, Head of Attack and Data Monitoring

Becky was recruited by Barclays to develop the global monitoring programme with the goal of supplying real-time alerting of critical security and data leakage

information

27 Aug 2009 5:00 pm Presenting Robert Brownstone; Law & Technology Director; Fenwick & West LLP

Information-Risk-Management (IRM)- Policies and Protocols Maximizing preparedness for eDiscovery and Litigation.

iia

30 Sep 2009 2:00 pm Presenting Lily Bi; The Institute of Internal Auditors; Director, Technology Practices

-Explore the relationship between IT and Business
-Define IT audit universe

ibm

8 Sep 2009 5:00 am Presenting James Rendell, IBM, Senior Technology Specialist

James Garnered Extensive pre and post-sales consulting experience while working for US-based technology companies . . .

developing

27 Aug 2009 3:00 pm Presenting Linda Kostic; Director, ERM at E*Trade Financial

Many organizations are learning that in today's environment, an information security risk management program has become a key component of an Enterprise Risk Management program.

deloitte1

29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal

Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.

mm

8 Sep 2009 12:00 pm Presenting John Moynihan; Managing Director at Minuteman Governance

John will provide attendees with an overview of how to confront unauthorized database access, an emerging threat within all industries and sectors.

benefits

27 Aug 2009 12:00 pm Presenting Jack Jones, Founder, Risk Management Insight

Frustrated with management's lack of support for security initiatives, priorities and efforts?

application

29 Sep 2009 11:00 am Presenting Shreeraj Shah; Blueinfy Solutions, Founder and Director

Enterprise application source code, independent of languages and platforms, is a major source of vulnerabilities.

gss

8 Sep 2009 6:00 am

Presenting David Hobson, Global Secure Systems Ltd, Managing Director

Threat Assessments, Attacks, & Countermeasure are . .

intersection

27 Aug 2009 11:00 am Presenting David Koenig, CEO of The Governance Fund

Risk Management and Corporate Governance, particularly the failures thereof, have been recieving substantial attention in the media and in the boardroom.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top