IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

PanelData-Centric Security: Staying Ahead of the Threat Curve

When:    Sept 21 | 2016       Attend

Over recent years, several organizations have suffered damaging data breaches where sensitive data was stolen. Alarmingly, things seem to be getting worse, and the results can be devastating. With the expanding threat landscape and the rise of the data-centric enterprise, companies must have parallel development of their security architecture to protect their sensitive data. But in the time it's taken for data security to catch up with the changing environment, organizations have found their compliance and data protection programs vulnerable.

Read more...
 
E-mail

PanelBest Practices to Prevent Data Breaches in 2016

Recorded:    December 10 | 2015       Attend

In 2014 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

Read more...
 
E-mail

Live WebcastCompliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection

Recorded:   August 20 | 2014      Play

With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

Read more...
 
E-mail

Coming Up!Rethinking Email Security: Best Practices to Protect and Maintain Private Communications

Recorded:   May 6 | 2014      Attend

2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.

Read more...
 
E-mail

Live WebcastLessons Learned From the Target Data Breach

Recorded:   March 18 | 2014     Play

In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

Read more...
 
E-mail

On-DemandImplementing a Business-Driven Security Strategy

Recorded:     October 17 | 2013     Play

Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates, address highly dynamic regulatory and compliance challenges, and secure the enterprise against a wide barrage of new and evolving sophisticated threats. Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  Next 
  •  End 
  • »
Page 1 of 9

Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner

bedava porno