Most Popular

E-mail

Live Webcast!The New Data De-identification: Enabling Business Agility while Protecting Data Assets

Recorded:   April 23 | 2014     Attend

Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

Read more...
 
E-mail

deloitte1Top 10 Emerging IT Audit Issues

29 Sep 2009 12:00 pm Presenting Michael Juergens; Deloitte & Touche LLP, Principal

Compliance requirements and resource constraints have focussed IT Audit procedures on the bare essentials of IT controls.

Read more...
 
E-mail

Live WebcastHow to Achieve Compliance and Secure the Public and Private Cloud

Recorded:    December 5 | 2013     View

New initiatives such as cloud computing are imposing significant security risks on the corporation, network, IT and the day to day activities of the business. How do businesses maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

Read more...
 
E-mail

Numara FootPrints Service Catalog: The Friendly Face of IT

(Archived)This webinar and service catalog demo will show you how Numara FootPrints Service Catalog will help your organization quickly provide an attractive menu of services tailored to your customers while providing transparency of service costs - all integrated into your service management workflow.

Read more...
 
E-mail

qualystnA Risk-Based Approach to PCI Compliance: Evolving Compliance Strategies to Meet Changing Business Demands

Recorded: 19 March 2010    View Webinar

This session will explore how the global marketplace and current business environment is impacting companies of all sizes through competitive and regulatory pressures. The discussion will cover how an outsourced/managed PCI solution can help companies address their compliance challenges and improve business performance.

Read more...
 
Page 2 of 30

Coming Up | On Demand | All 

 

.

Featured Webcasts


EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded:   July 15 | 2014   &...
 
Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded:   Augus...
 
Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel Discussion: Why EMV is Not the Only Answer to Payment Security Panel: Why EMV is Not the Only Answer to Payment Security Recorded:   September 16 | 2014 &nbs...
 
Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded:   December 4 | 2014 &nbs...
 

More. . .