Webcast by Topic: Data security

Resources available: 10
September 24, 2014 - LIVE AT 10:00 AM PT

Establish Cyber Resiliency: Developing a Continuous Response Architecture

Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or use scans or signatures to detect, respond or prevent advanced threats in your environment.

How to Detect System Compromise & Data Exfiltration

Don't miss our next live demo, where AlienVault security guru Tom D'Aquino will walk you through the steps of a system compromise, including how AlienVault USM detects these nefarious activities every step of the way.

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

While vulnerability assessments are essential, considering vulnerability data in a vacuum limits your ability to prioritize your action plan in an effective way. Learn how to integrate threat intelligence into your vulnerability management strategy.

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

If you're like most IT practitioners, you're busy. Preparing the reports needed to prove PCI DSS compliance requires time you don't have. In this webinar PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Keep Servers Up and Running and Attackers in the Dark

An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of this asymmetric workload. Watch this video to learn how to easily mitigate these attacks.

Will the Real Endpoint Threat Detection and Response Please Stand Up?

This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights.

Securing your Web and Data With One Console

Protect your organization's use of today's dynamic Web and prevent data loss while reducing costs and complexity. Websense® Web Security Gateway Anywhere combines the power of on-premise deployment with the flexibility of Security-as-a-Service (SaaS).

Data loss prevention

InfoWorld contributing editor Roger Grimes explains the technologies and best practices you need to keep sensitive data safe within your enterprise's boundaries - and ensure only authorized employees gain access.

ON DEMAND

Improving Productivity and Reducing Risk with Secure File Transfer

Join John Roman, Director of Information Law at Nixon Peabody, and hear his insights on how his firm has improved productivity while sending critical data securely with YouSendIt’s managed file transfer solution.

ON DEMAND

Managing Mobility: Improve Data Security, Compliance and Manageability – IDC Video Podcast

In this video podcast, IDC's Chief Research Officer, John Gantz, discusses pain points and considerations for managing your mobile workers.

©1994-2014 Infoworld, Inc.