When: Aug 19 2010
Presenting: Dr. Anton Chuvakin; Security Warrior Consulting, Principle
The presentation will discuss how to bring order (in the form of standards!) to the chaotic world of logging. It will give a brief introduction to logs and logging and explain how and why logs grew so chaotic and disorganized.
When: Aug 19 2010
Presenting: Andrew Hay, CISSP Senior Analyst, Enterprise Security Practice, The 451 Group
The integration of 3rd party products within SIEM and Log Management platforms is often a race to competitive parity. Unfortunately for customers, simply having cursory integration for a product without an ongoing integration lifecycle is about as useful as the platform not supporting the device in the first place.
When: Aug 19 2010
Presenting: Raffael Marty, Chief Logger, SecViz.org
Over the past years, organizations have collected more and more data and log files within their networks, systems, and cloud environments.
When: Aug 20 2010
Presenting: Derek Brink, Aberdeen Group, VP & Research Fellow for IT Security
Companies of all sizes are trying to make sense of the incredible volume of data that is being generated by their computing infrastructure and their existing security solutions. Much like the children ice-skating game of "crack the whip", Aberdeen's research indicates that closing the performance gap between leaders and laggards in the front-end - i.e., collecting and managing the data (log management) - helps to accelerate the progress needed in the back-end - i.e., interpreting the data and taking action (security information and event management).
When: Aug 05 2010
Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security
Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.
When: Aug 05 2010
Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security
Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.
When: Aug 05 2010
Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL
The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.
When: Aug 05 2010
Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum
Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.
When: Aug 05 2010
Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca
The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.
Recorded: July 14 @ 3PM EST
Presented by: Michael Rasmussen and Eric Young
500 million on Facebook, 75 million on LinkedIn. Many of these users are actively utilizing social media for business purposes - as increasingly the usage of social media is about communications, collaboration and communities - your users are bringing these tools into the workplace - to connect with customers, prospect new business and collaborate with partners.
On-Demand View Webinar
Getting your US and global business operations compliant with Payment Card Industry Data Security Standards (PCI-DSS) is a must-do. The first step is to understand what the 12 requirements mean. In this on-demand webinar, experts from CyberSource and Trustwave will explore the following topics:
When: Aug 05 2010 4:00 am
Presenting: Clive Longbottom, Business Process Analysis, Quocirca
Moving towards a Compliance Orientated Architecture.
When: Aug 05 2010 6:00 am
Presenting: Dr. David King, Founder & Chair, Information Security Awareness Forum (ISAF)
David is the head of the London branch of the Institute of Information Security Professionals. David has over 25 years of experience in security. He was the former Head of Group Information Security at Aviva and previously a VP and Chief Security Architect at JP Morgan Chase. He has also worked for CapGemini and ICL Defence Systems.
When: Aug 05 2010 9:00 am
Presenting: Emma Webb-Hobson, KTN Digital Systems
Preventing Data Loss within Cloud Environments.
When: Aug 05 2010 10:00 am
Presenting: Bradley Anstis, VP Technical Strategy, M86 Security
Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don't seem to be preventing this ever-growing problem.
When: Aug 05 2010 12:00 pm
Presenting: Jay Leek, Nokia, Global Manager, Corporate IT Security
It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz.
When: Aug 05 2010 4:00 pm
Presenting: Derek E. Brink, CISSP; Aberdeen Group, Vice President and Research Fellow
Aberdeen's fourth annual study on data loss prevention -published on June 30, 2010 - presents the challenges, strategies, best practices and year-over-year comparisons of Best-in-Class organizations in safeguarding their sensitive data using content-aware data loss prevention technologies.
Recorded: June 4 @ 11am EST
In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.
Presenting: Chris Noell, Executive Vice President, Product Management, TruArx
In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.
Maintaining payment security doesn't require adding even more proverbial locks and bolts to your infrastructure. In fact, you can secure your payment process - including complying with PCI-DSS standards - with less complexity and time, while adding more scalability. In the upcoming CyberSource webinar, you'll see how your peers are adopting a safer, more secure approach by eliminating all contact with payment data - a strategy we call Enterprise Payment Security 2.0.
Held: Jul 22 2010 10:00 am
Presenting: Simon Goldstein; Fiserv, Director, Risk Management, CISA, CISM
Regulations, examiners, internal and external auditors, as well as customers increasingly probe your business for details about your risk management practices.
Held: Jul 22 2010 11:00 am
Presenting: Brian Barnier; Value Bridge Advisors, Principal
IT Risk 2.0!? Am I ready? OMG, did I even do IT Risk 1.0? "Risk Management" has skyrocketed on both business and IT leader's priority lists - financial crisis, gulf oil spill, cyber-attacks, network failures, product liability.
Held: Jul 22 2010 12:00 pm
Presenting: Jeramy Cooper-Leavitt, Orbitz World Wide, Director of Compliance
Compliance laws and new technologies can have a great impact on the business infrastructure and business process that we support as security and compliance professionals.
Held: Jul 22 2010 5:00 pm
Presenting: Jeremiah Grossman, WhiteHat Security, CTO and Founder
Information security threats are way up, fraud losses continue to rise, regulatory fines are increasingly common, and budgeted dollars to solve these myriad of problems are in short supply.