How May I Support You?
When: Jun 10 2010 4:00 am
Presenting: Howard Kendall, SDI Europe; Don Page, Marval Group, Louise McDonald, Swinton Group
Getting the right people, creating the culture where you are keeping them motivated, business relevant, informed, continually improving and cost effective, is only truly viable with the development of service based skills and understanding across IT Services.
Managing an Incident; No Room for Democracy
When: Jun 24 2010 2:00 pm
Presenting: David Hutcheson, Managing Director, Glen Abbot Ltd
This presentation will give clear and practical advice on how to run an incident, what to make sure your Incident Management plan covers and how to pick your team.
Going Beyond Checkbox Compliance: How to Make Compliance Improve Your Security
Recorded: June 4 2010
In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.
Expand Compliance Coverage: How to Identify and Manage Compliance with All of Your Data Security and Privacy Obligations
Recorded: 26 May 2010
Presenting: Chris Noell, Executive Vice President, Product Management, TruArx
In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.
Extending Your Risk and Compliance Program: Vendor Management Best Practices
When: Wednesday, July 21st @ 2pm EST
Presented By: Michael Rasmussen, Corporate Integrity, and Chris Noel, TruArx.
In today's economic climate, many organizations outsource parts of their business to take advantage of cost savings and solution-expertise. However, as vendor relationships increase, it becomes more difficult to manage them. The risks assumed by outsourcing can be significant without a vendor management program.
Podcast | Top 5 Compliance Management Pitfalls to Avoid in 2010
Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.
Six Keys to Healthcare IT Security and Compliance
Recorded: 7 April 2010
Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension
Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.
Top 10 Risks in Application Security
When: Jun 04 2010 8:00 am
Presenting: Sebastien Giora, French Chapter Leader, OWASP
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
Software Development Life Cycle: Who's responsible for security?
When: Jun 03 2010 2:00 pm
Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP
From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.
Automated Application Defenses To Thwart Advanced Attackers
When: Jun 03 2010 12:00 pm
Presenting: Michael Coates; Mozilla, Web Security Engineer
Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.
Emergent Standards in Secure Software Development
When: Jun 03 2010 4:00 am
Presenting: Justin Clarke, UK Chapter Leader, OWASP
One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.
Legal Hold Strategies: Preserving Evidence & Avoiding Spoliation
When: May 27 2010 4:00 pm
Presenting: Doug Smith; Wiley Rein, Records Manager
The risks associated with spoliation of evidence are causing organizations everywhere to examine their procedures for evidence preservation. This seminar will offer step by step guidance for instituting and maintaining effective legal holds.
How E-Discovery Will Affect Your Life as a Storage Professional
When: May 27 2010 2:00 pm
Presenting: David Stevens; Carnegie Mellon University
Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe.
eDiscovery in Exchange 2010: Are Third-Party Solutions Necessary?
When: May 27 2010 1:00 pm
Presenting: Rick Dales; Proofpoint, VP Product Management, Archiving
Without the right tools in place, collecting, processing, and reviewing electronic data for eDiscovery can be time-consuming, expensive, and expose a business to significant legal risks.
E-Discovery and E-Disclosure: The view from the front lines
When: May 27 2010 12:00 pm
Presenting: Nick Patience; The 451 Group, Research Director
E-Discovery and E-Disclosure: The view from the front lines
E-disclosure in Litigation: Avoid the Pitfalls
When: May 27 2010 6:00 am
Presenting: Clive Freedman, 3VB
Planning the disclosure exercise in litigation Litigation hold discussions with the other party using a questionnaire to identify categories and locations of documents (Goodale v Ministry of Justice)
Riding the New Wave of Enterprise Mobility
When: May 06 2010 1:00 pm
Presenting: Robert Whiteley, Research Director, Forrester; Chris Witeck, Director of Product Management, SonicWall
Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester's extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers - the "mobile wannabe" - who, together, are making up a larger and larger portion of your workforce.
A Pragmatic Approach to Compliance with Policy-Based Encryption
When: Apr 29 2010 12:00 pm
Presenting: Ken Liao; Proofpoint, Encryption Specialist
Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners.
Service Cloud: Been There, Done That: A Case Study
When: May 25 2010 6:00 am
Presenting: Frank Rejwan, Group Chief Operating Officer
Join Frank Rejwan who will his discussing the successful adoption of cloud computing.
Roundtable: Understanding the Factors behind Cloud Adoption
When: May 25 2010 8:00am
Presenting: Peter Judge, Editor, eWeek Europe
Join Peter Judge, UK Editor of eWeek Euorpe, hosting a roundtable session to discuss how we can understand the factors behind cloud adoption.