IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

Live Webcast!The New Data De-identification: Enabling Business Agility while Protecting Data Assets

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

Read more...
 
E-mail

Big Data WorldManaging Security and Compliance in a Big Data World

Recorded:    August 14 | 2013     Play

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Read more...
 
E-mail

OpenTextSeeing the Big Picture with Big Data Discovery

Recorded:     March 18 | 2013    View

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Read more...
 
E-mail

Mercantil CommercebankDLP: From Strategy to Reality!

When: Aug 05 2010

Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security

Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.

Read more...
 
E-mail

SonicWALLPreventing Data Leakage in a Web 2.0 World

When: Aug 05 2010

Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL

The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.

Read more...
 
E-mail

the_coming_waveThe Coming Wave of DLP as a Service: Advantages and Concerns

When: Aug 05 2010

Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security

Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  Next 
  •  End 
  • »
Page 1 of 6

Subscribe via Email

 Your Email:
Banner