IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

DeloitteDelivering value from SIEM

When: Aug 19 2010

Presenting: Chris Burtenshaw, Information & Technology Risk Manager, Deloitte

In a challenging economic climate, delivering value from security technologies like Security Information and Event Management (SIEM) is higher up the agenda than ever before. This presentation discusses some strategies for success, with a few examples of the types of use cases which we've found most valuable to our clients.

Read more...
 
E-mail

SecureWorksBest Practice and Approaches for Log Management

When: Aug 19 2010

Presenting: Ritesh Singhai, Senior Security Engineer, SecureWorks

To protect critical information and business processes and to comply with industry regulations, organisations can no longer rely sole on network level security. They must also monitor a myriad of application on a variety of different platforms. Doing so is a complex, labour intensive undertaking that involves more than simply purchasing security hardware and software.

Read more...
 
E-mail

The 451 GroupThe Integration Lifecycle: Loving Long Logging Lifecycles

When: Aug 19 2010

Presenting: Andrew Hay, CISSP Senior Analyst, Enterprise Security Practice, The 451 Group

The integration of 3rd party products within SIEM and Log Management platforms is often a race to competitive parity. Unfortunately for customers, simply having cursory integration for a product without an ongoing integration lifecycle is about as useful as the platform not supporting the device in the first place.

Read more...
 
E-mail

SecViz.orgLog Visualization in the Cloud

When: Aug 19 2010

Presenting: Raffael Marty, Chief Logger, SecViz.org

Over the past years, organizations have collected more and more data and log files within their networks, systems, and cloud environments.

Read more...
 
E-mail

Security Warrior ConsultingLog Standards & Future Trends

When: Aug 19 2010

Presenting: Dr. Anton Chuvakin; Security Warrior Consulting, Principle

The presentation will discuss how to bring order (in the form of standards!) to the chaotic world of logging. It will give a brief introduction to logs and logging and explain how and why logs grew so chaotic and disorganized.

Read more...
 
E-mail

Aberdeen GroupLeveraging Logs, Information and Events

When: Aug 20 2010

Presenting: Derek Brink, Aberdeen Group, VP & Research Fellow for IT Security

Companies of all sizes are trying to make sense of the incredible volume of data that is being generated by their computing infrastructure and their existing security solutions. Much like the children ice-skating game of "crack the whip", Aberdeen's research indicates that closing the performance gap between leaders and laggards in the front-end - i.e., collecting and managing the data (log management) - helps to accelerate the progress needed in the back-end - i.e., interpreting the data and taking action (security information and event management).

Read more...
 
E-mail

Mercantil CommercebankDLP: From Strategy to Reality!

When: Aug 05 2010

Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security

Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.

Read more...
 
E-mail

SonicWALLPreventing Data Leakage in a Web 2.0 World

When: Aug 05 2010

Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL

The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.

Read more...
 
E-mail

the_coming_waveThe Coming Wave of DLP as a Service: Advantages and Concerns

When: Aug 05 2010

Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security

Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.

Read more...
 
E-mail

PanelPanel Session: Can DLP Get SaaSy?

When: Aug 05 2010

Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum

Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.

Read more...
 
E-mail

QuocircaTo Lose One Set of Data May Be Regarded As Misfortune...

When: Aug 05 2010

Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca

The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.

Read more...
 
E-mail

www.metricstream.comBenefits of IT Risk Management Automation

When: 25 August 2010 @ 2pm EST  

Automating the IT Risk Management process is critical for organizations who want to secure their IT investments from internal and external risks related to information security, infrastructure, project management and business continuity processes.

Read more...
 
E-mail

www.cybersource.comUnderstand The Requirements of PCI Data Security Standards

On-Demand    View Webinar

Getting your US and global business operations compliant with Payment Card Industry Data Security Standards (PCI-DSS) is a must-do. The first step is to understand what the 12 requirements mean. In this on-demand webinar, experts from CyberSource and Trustwave will explore the following topics:

Read more...
 
E-mail

QuocircaMoving towards a Compliance Orientated Architecture

When: Aug 05 2010 4:00 am

Presenting: Clive Longbottom, Business Process Analysis, Quocirca

Moving towards a Compliance Orientated Architecture.

Read more...
 
E-mail

ISAFBest Practices: Preventing Converged Threats

When: Aug 05 2010 6:00 am

Presenting: Dr. David King, Founder & Chair, Information Security Awareness Forum (ISAF)

David is the head of the London branch of the Institute of Information Security Professionals. David has over 25 years of experience in security. He was the former Head of Group Information Security at Aviva and previously a VP and Chief Security Architect at JP Morgan Chase. He has also worked for CapGemini and ICL Defence Systems.

Read more...
 
E-mail

KTN Digital SystemsPreventing Data Loss within Cloud Environments

When: Aug 05 2010 9:00 am

Presenting: Emma Webb-Hobson, KTN Digital Systems

Preventing Data Loss within Cloud Environments.

Read more...
 
E-mail

M86 SecurityData Loss Prevention Doesn't Need to be Daunting

When: Aug 05 2010 10:00 am

Presenting: Bradley Anstis, VP Technical Strategy, M86 Security

Reported data breaches continue to increase year on year and regulatory requirements which aim to stem the tide of data leaks don't seem to be preventing this ever-growing problem.

Read more...
 
E-mail

NokiaProtecting What Matters: The Era of Fences is Over

When: Aug 05 2010 12:00 pm

Presenting: Jay Leek, Nokia, Global Manager, Corporate IT Security

It was not too many years ago when companies thought they were secure by simply deploying a firewall or other network security related solutions. Then came other infrastructure related security solutions, followed by the application security related buzz.

Read more...
 
E-mail

www.aberdeen.comContent-Aware: Aberdeen's 2010 Data Loss Prevention Report

When: Aug 05 2010 4:00 pm

Presenting: Derek E. Brink, CISSP; Aberdeen Group, Vice President and Research Fellow

Aberdeen's fourth annual study on data loss prevention -published on June 30, 2010 - presents the challenges, strategies, best practices and year-over-year comparisons of Best-in-Class organizations in safeguarding their sensitive data using content-aware data loss prevention technologies.

Read more...
 
E-mail

www.TruArx.comExpand Compliance Coverage: How to Identify and Manage Compliance with All of Your Data Security and Privacy Obligations

When: Wednesday, 26 May @ 12PM EST

Presenting: Chris Noell, Executive Vice President, Product Management, TruArx

In this 1-hour webcast, Chris Noell, TruArx EVP of Product Management, discusses why it's important to uncover ALL the data security and privacy regulations which affect your business. Chris will then review obstacles which prevent organizations from managing compliance obligations against more than a handful of regulations.

Read more...
 
E-mail

www.lumension.comGoing Beyond Checkbox Compliance: How to Make Compliance Improve Your Security

When: June 4 @ 11am EST

In today's highly regulated environment, many organizations address compliance as one-off projects where the goal is to ‘get the box checked' by the auditor. This inefficient approach results in time- and resource-intensive work to pour through as many as 40,000 spreadsheets just for one compliance initiative* that provides little value back to the organization. This multiplies exponentially when dealing with multiple regulations.

Read more...
 
Page 4 of 14

Coming Up | On Demand | All 

 

.

Featured Webcasts


EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded:   July 15 | 2014   &...
 
Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded:   Augus...
 
Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel: Why EMV is Not the Only Answer to Payment Security Recorded:   September 16 | 2014 &nbs...
 
Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded:   December 4 | 2014 &nbs...
 

More. . .


Subscribe via Email

 Your Email:

RSVP!

Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner
Banner

bedava porno