Recorded: March 10 | 2011   

Understanding and complying with the PCI Data Security Standard (PCI DSS) can be a daunting task - especially if your organization has limited time and resources. The new PCI DSS 2.0 standard, which took effect Jan. 1, requires testing a virtualized environment to ensure that if you put multiple accounts onto a single processor, there is still segregation of data and all the data is protected.

Simplify GRC

Recorded: Jan 26 2011  

In this panel discussion we will address the challenges IT teams face as a result of siloed, inefficient point tool approaches to administering and enforcing security and compliance policy across hybrid IT infrastructures.

Recorded: Nov 16 2010  

Integrating IT Risk Management systems is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Recorded: Sept 29 2010  

Presenting: Chris Noell, EVP of Product Management at TruArx

For many organizations, Sarbanes-Oxley compliance is mandatory, but automation of the self-assessment process can make it less painful. There are many advantages to using an IT GRC tool to automate assessments such as speed, efficiency, data integrity, and improved analysis.

Recorded: Sept 23 2010

Presenting: Brian Zawada, Avalution Consulting & John DiMaria, eFortresses

There has been much debate regarding which guidelines or standards are best suited for organizational business continuity and management.

Recorded: 25 August 2010

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Recorded: Wednesday, July 21st @ 2pm EST

Presented By: Michael Rasmussen, Corporate Integrity, and Chris Noel, TruArx.

In today's economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program.

Taneja Group

When: Jan 13 2011

Presenting: Dave Bartoletti; Taneja Group, Senior Analyst

In this presentation, Taneja Group analyst Dave Bartoletti will share his insights, strategies and outlook on the rapidly emerging field of cloud-based data protection, including backup, recovery, replication and DR.


When: Jan 13 2011

Presenting: Javier Carrillo, Lead Business Continuity Planner

Individuals are sometimes thrust into the world of Oz (Business Continuity) with little or no background in the area. Through their journey in Oz, they stumble upon resources and find frequent barriers to success.

The Economist

When: Jan 13 2011

Presenting:  Vicki Gavin, Head of Business Continuity, The Economist Group

Join Vicki Gavin, Head of Business Continuity as she explores the emerging challenges in 2011 for business resilience in the supply and industry chain.


When: Jan 13 2011

Presenting: Paul Rivett, Operations Director, CNet Training

What is the perception of BCDR & cloud backup - are they useless you test them?


When: Jan 13 2011

Presenting: Ibrahim Hasan, CEO, Act Now Training

Ibrahim Hasan is a recognised expert on data protection, freedom of information and surveillance law. He was previously Principal Solicitor at Calderdale Council and has worked for Bradford Council and Nottinghamshire County Council.


When: Jan 13 2011

Presenting:  Shankar Swaroop, Director of BCDR, NEXCOM

An organization's resiliency is directly related to the effectiveness of its continuity capability. An organization's continuity capability—its ability to perform its essential functions continuously—rests upon key components and pillars, which are in turn built on the foundation of continuity planning and program management.

When: Jan 13 2011

Presenting: Ashar Baig; Chairman of Cloud Backup & Recovery, SIG, SNIA

Most companies are so focused on data backup that they often forget "why" they are backing up their data in the first place. Data protection (backup, snapshots, replication, CDP, etc.) is just a means to an end.


When: Dec 07 2010

Presenting: Ward Spangenberg, Director, Zynga Game Network; Dave Asprey, Trend Micro; Becky Pinkard, The SANS Institute

Join Ward Spangenberg, Director of Security at Zynga Game Network; Becky Pinkard of SANS Institute and Dave Asprey of VP Cloud Security, Trend Micro as they critically evaluate if vendors are doing enough to prevent the threats from hackers in the cloud.

The Aberdeen Group

When: Dec 07 2010

Presenting:  Derek Brink, Vice President & Research Fellow, Aberdeen Group

Worries of 2011 – What to look out for and how to tackle them.


When: Dec 07 2010

Presenting:  Bob Tarzey, Analyst & Director, Quocirca

In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours.


When: Dec 07 2010

Presenting: Jason Stradley; BT Global Services, US&C Security Practice Lead

Endpoint Security Management: Trust but Verify

Check Point Software

When: Dec 07 2010

Presenting: Alwyn Nash, Endpoint Technical Director Check Point Software Technologies; Meint Dijkstra, Computerlinks

Alwyn is an experienced professional with 15 years of experience in the IT business. He has held previous positions with Pointsec Mobile Technologies, Royal London Insurance, EDS and the UK Armed Forces.

Symbian Foundation

When: Dec 07 2010

Presenting: Craig Heath, Chief Security Technologist, Symbian Foundation

Fashion accessory, personal entertainment device, social network portal and business tool. People keep their smartphones with them 24 hours a day and expect to use them in all contexts of their life, both business and personal.


When: Dec 07 2010

Presenting:  Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel

The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.


When: Dec 07 2010

Presenting:  Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager

The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.


When: Dec 14 2010

Presenting: Justin Clarke, London Chapter Leader, OWASP

Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.


When: Sept 09 2010

Presenting: John Walker, Expert GovCloud Panel, ENISA & MD, Secure Bastion

John is a 'proven' visionary in the field of Cyber Security. He is an ENISA Listed Expert Panel Member, the MD of Secure Bastion, and Professor & PhD Mentor at Nottingham Trent University.






Log in

Please Login to download this file

Username *
Password *
Remember Me







Go to top