REGISTER

email 14 48

Live Webcast!

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

Live Webcast

Recorded:   March 18 | 2014     Play

In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

panelholdingtn

Recorded:   February 5 | 2014      Play

Providing services and features to website visitors often requires deploying many third party service providers for analytics, marketing, payment processing, and data management. Managing risk from these third parties is vitally important in a landscape filled with new threats and regulations. The nature of these relationships requires that information be shared, and risk accrues whenever sensitive information is shared with or processed by third parties.

PCI DSS 3.0

Recorded:   January 21 | 2014      Play

The official release of PCI DSS v3.0 is here, now what? Voltage Security have invited a PCI DSS QSA to assist you with your PCI challenges by providing recommendations on how to execute a seamless upgrade from PCI DSS version 2.0 to 3.0. Find out why it's no longer acceptable to strive for compliance over real-time security. And learn how the new standard brings a whole new meaning to 'business as usual'.

Live Webcast

Recorded:    December 5 | 2013     View

New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

Navigating PCI Security Mountains in the Cloud

Recorded:   November 6 | 2013      View

Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging.

On-Demand

Recorded:     October 17 | 2013     Play

Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed.

panelholdingtn

Recorded:    September 24 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. Today's expanded IT infrastructure, including Social, Mobile and Cloud Computing, is collecting more data, including sensitive data, and now significant security risks are being compounded as the data is being concentrated in large data "lakes" such as Hadoop. As a result CIOs are looking at upgrades, new technologies and new strategies to assure security while delivering the required services.

Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Navigating PCI Security Mountains in the Cloud

Recorded:   May 15 | 2013     

Organizations outsourcing card data to the cloud face significant security risks. As soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI Data Security Standard becomes increasingly challenging. Cloud users and cloud service providers need to understand what their roles and responsibilities are when it comes to protecting this data. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for PCI-DSS. 

Roundtable

When:   April 4 | 2013      Play!

Organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors, and gaining a complete view of an organization's risk exposure is increasing in complexity.

april2tn

Recorded:   April 2 | 2013     Watch

Information Governance is an essential element to your compliance planning and execution. With evolving regulatory demands and increased litigation, the imperative to gain control over business content has never been more critical. Experts know that managing the retention and disposition of business information reduces litigation risk and legal discovery costs. But with the best of plans, there are challenges to face and decisions to make. Add in the maturation of technology and security issues, and the challenges seem to grow exponentially.

OpenText

Recorded:     March 18 | 2013    View

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

BYOD Webcast

Recorded:    February 21 | 2013      Play

69% of organizations have employees using mobile devices to connect to their corporate network, and Gartner predicts that through 2017, 90% of enterprises will have two or more mobile operating systems to support. This brings not only security concerns, but practical problems with managing a variety of devices that can contain both personal and corporate data. As a result, mobile device management (MDM) and bring your own device (BYOD) solutions for the enterprise are exploding into the market. Choosing the right solution will increase enterprise efficiency, while maintaining security and regulatory compliance, without a massive burden on IT.

www.itgrcforum.com

Recorded: October 3 | 2012    

For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the environment and increased cyber security threats have led to a rethinking of this approach. With more than 365 security incidents reported in 2011 affecting over 126 million records, many organizations are rethinking the way they approach security, risk management, and compliance.

MDM Security and Compliance

Recorded: June 20 | 2012     

The rapid evolution of consumer devices and a growing demand from employees are changing the ways in which organizations deliver mobility solutions to the workforce. There are any number of new mobile devices and emerging technologies to help today's professionals do their jobs in any location, and these technologies bring a range of new challenges, from security, compliance and risk management, to cost and human capital management.

www.itgrcforum.com

Recorded: May 17 | 2012    

Governance, risk management and compliance (GRC) processes are extensive; they are how an organization is directed and managed to achieve goals, considering risks to achievement, and complying with applicable laws and regulations.

www.itgrcforum.com

Recorded: March 23 | 2012    

Senior management at all levels are pressured to improve their organizations risk management capabilities. In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders in all sectors.

HISPI

Recorded: February 1 | 2012          

Cloud Computing has been hailed as the long sought after answer of low cost computing , where users can remotely store their data into the cloud and enjoy the on-demand high quality applications and services from a shared platform of computing resources. By outsourcing their data storage, users can be relieved from the burden of local data storage and maintenance, in some cases eliminating IT departments all together.

CHASE Paymentech

Recorded: October 13 | 2011   

The Payment Card Industry Data Security Standard (PCI DSS) provides data protection requirements for organizations that process card payments. These requirements have even been adopted as law by some US states (e.g., Minnesota, Nevada, Washington). While organizations that fully comply with PCI DSS are considered compliant credit-card processors, compliance and security are not one in the same.

www.itgrcforum.com

Recorded: October 12 | 2011   

Today, enterprises around the globe operate IT processes covering areas such as security, availability, infrastructure and IT project management. These processes support the core business processes that organizations use to operate successfully.

Panel Discussion

Recorded: September 14 | 2011   

This event will discuss an overall payment security landscape, the costs associated with managing payment data, and the benefits of Tokenization. Attendees will learn how payment security solutions, such as encryption and tokenization can go beyond complying with PCI–DSS requirements and reduce the scope of PCI, while keeping data safe and alleviating the overall impact on your business.

www.agiliance.com

Recorded: August 11 | 2011   

As the number of regulations that affect Global 2000 organizations can easily exceed a dozen, many companies struggle to map multiple frameworks and specifications across configurations settings. This leads to cost-inefficiency, inaccuracies, and often audit fatigue.

PCI Compliance Guidelines

Recorded: 2011    Listen Now

Annual costs of data management are soaring. So how can your business stay ahead of the curve to achieve and maintain compliance with the Payment Card Industry Data Security Standards (PCI DSS) and still deal with potentially millions of points of vulnerability?

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top