Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // Jul 2015

    Live Webcast: Unlock Data Streams with IBM Streams and Apache Spark Streaming

    Spark is a next-generation framework for large-scale, in-memory distributed data processing, with greater performance and easier to use APIs compared to most big data solutions.  Spark also comes with a stream processing framework called Spark Streaming, which uses a micro-batch concept to process streaming data in near-real-time. During this...

    Sponsored By IBM

  • Webcasts // Jun 2015

    On-Demand Webcast: Gain More Value and Actionable Insights from Your Data with Powerful Customer Analytics

    Customers are using mobile devices – and multiple channels – to connect with companies, and many organizations scrambling to keep up. Some are gaining a significant advantage by moving mobile analytics and development to the cloud for both content and peripheral services. That's because cloud-enabled software as a service (SaaS)...

    Sponsored By IBM

  • Webcasts // Jun 2015

    On-Demand Webcast: How to put IBM Watson to work for powerful information access and insights

    Most organizations struggle to deliver the information and insights their front-line staff need for top performance. The challenges that must be overcome are the amount of information that needs to be digested; the fact that it is scattered among many different silos and across hybrid cloud infrastructures; and the...

    Sponsored By IBM

  • Webcasts // Jul 2015

    Data Security in the Cloud and Data Breaches: Lawyer's Perspective

    In this webcast, the presenters will be presenting about the lawyers perspective on data security breaches and recent developments and trends in data security breaches. They will also discuss issues relating to managing and responding to data security issues in the cloud. They will also explain about addressing security and...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    10 Deadly Sins of SQL Server Configuration

    Databases are the backbone of the applications that run the world and store the personal data. Microsoft's SQL server one of the primary database platforms used in enterprise environments today. This webcast will cover 10 common weak SQL server configurations and the practical attacks that help hackers gain unauthorized access...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Cloud IDS: Intrusion Detection for Shared Hosting

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Stick a Pin in Certificate Pinning: How to Inspect Mobile Traffic and Stop Data Exfiltration

    With the rise of encrypted traffic, more and more companies are deploying SSL inspection platforms to decrypt SSL. Unfortunately, these companies quickly discover that they cannot decrypt all traffic, particularly communications to mobile apps that use certificate pinning. What is certificate pinning? It's a method of preventing Man in the...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    The Benefits in Externalizing DMZ-as-a-Service in the Cloud

    Organizations often place critical infrastructure in the DMZ which means that attackers able to enter the DMZ can inflict damage to the network. A more recent approach is to implement a DMZ below the traditional DMZ (adds a security layer). However, when a website is attacked, all DMZ layers frequently...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Applying Big Data Technology to Security Use Case

    The big data technology suite can only be effective when applied correctly. It solves certain problems well, provided the design assumptions are true. This webcast will explain which problems in the security domain are the kinds that Hadoop and big data technologies were designed to solve and what conditions need...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Spam, Phish and Other Things Good to Eat

    In this webcast, the presenter will demo and release the source code for FeelingPhishy, a PHP tool the presenter created after getting several complaints from people in the industry that existing open source spam campaign solutions were too difficult to setup, had incomplete instructions or didn't work effectively.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Compliance Vs. Security - How to Build a Secure Compliance Program

    In this webcast, the presenter will overview of the issues with achieving and maintaining regulatory compliance, overview of 2014 data breaches and the common failure points, client case studies of PCI DSS and HIPAA security problems and recommendations on meeting regulatory compliance and maintaining a secure environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Exploring the Relationship Between Compliance and Risk Management

    In this webcast, the presenter will discuss the correlation between compliance and risk management, explaining how the users cannot have compliance without risk management. The presenter will go into defining compliance and risk management, what makes up a compliance program versus a risk management program and the core goals and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Designing a "Big Data" Platform for Threat Analytics

    So the users have been asked to use "Big data" can make their company more secure. How do they do that? What design considerations should they consider? What are the high level business and technical requirements? Here is a prescriptive guide to the questions and decisions they'll need to make...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Data Breach: If You're Not Prepared, You Can't Be Responsive

    In this webcast, the presenter will provide attendees with lessons learned from recent data breaches and provide an overview of the components of a proactive incident response plan, including: identification of types of events, obligations of vendors, roles and responsibilities, specific notice obligations and post event assessment protocol.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Critical Infrastructure: The Cloud Loves Me, the Cloud Loves Me Not

    Interdependency between public cloud services and critical infrastructure are both hard and soft. Will this cross domain technology flirtation lead to long term relationships or fatal attractions? The presenters examine case studies supporting both scenarios and their complex conundrums if everything is critical, perhaps nothing is critical? How much security...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Private Cloud Security Best Practices

    In this webcast, the presenter will focus on security architecture and controls that are keys to building a secure foundation for private software defined datacenter or cloud infrastructure. The presenter continues to consult on a number of subject matters including strategy, virtualization, messaging, database and infrastructure optimization.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Applied Detection and Analysis Using Flow Data

    While network flow data isn't a new concept, it is easily one of the most powerful data types the users can have in their arsenal as a network defender. It is incredibly low overhead, easy to setup and maintain, and provides tremendously flexible capabilities for Network Security Monitoring (NSM) detection...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Five Practical Things You Aren't Doing to Secure Your Information, But Could Be

    In this webcast, the presenter will present five things that each audience member could be doing, right now, to protect the information assets of the organization they work for. Not user education. Not theoretical policies. Not magic hand waving.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Privacy Notions for Data Publishing and Analysis

    Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research, developing innovative technologies and services, intelligence and counterterrorism operations...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Apr 2015

    Hadoop Security: Seven Ways to Kill an Elephant

    Many companies are getting Hadoopy often with little or no consideration of security because big data is on their list of cool projects. Infosec is in this game but big data is moving at a pace faster than the controls are being considered.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Crypto in the Cloud

    Although cloud services become more and more popular, security concerns of the customers prevent a stronger adoption. Customers are mainly afraid of data leakage and loss of data. In this webcast, several cryptographic mechanisms are explained that may help to protect the user against these aforementioned risks.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Defining an Abstract Architecture for Managing Unstructured Data Using MongoDB - Use Case of VDrive

    Knowledge access and knowledge sharing is essential in contemporary classrooms. Building an university-level digital storage is important for empowering knowledge access. It is a way to improve efficient knowledge distribution and collaboration among students. Considering the importance of the knowledge sharing, it is important that its foundation is solid, efficient...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Scada Deep Inside: Protocols and Security Mechanisms

    In this webcast, the presenter will share the experience in analysis of most popular open and vendor's specific proprietary industrial protocols. For each protocol will be presented packet structure, real examples, in-secure features and possible hacks, at the end of the topic the presenter will share the practical approach, methodology...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Don't Get Caught on Cloud 9

    Cloud solutions require that public and private entities release physical control over their systems and data. This webcast will provide attendees with a presentation of how to plan and secure data running on cloud solutions to avoid service and data risks while maintaining control at improved performance and cost.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Who Has My Data and How Did They Get It?

    The need for increased visibility and controls over who has access to application data and unstructured data is becoming increasingly important to prevent breaches. And when there is a breach, how do the users expedite decisions to resolve the breach? Data breaches underwent explosive growth in 2013: 740 million records...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Communicating Risk to Senior Executives

    How do the users explain to the business that just accepting the risk is not an okay way to mitigate risk? Are they prepared for a breach like the University of Maryland breach and the infamous target breach? The threat landscape has changed from they might be attacked to they...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security Risk Management

    In this webcast, the presenter will cover the topics include: security risk management, risk can be defined as "The possibility of loss or injury", security investments aim to mitigate risk, and are a trade-off, they also involve risk, and cost money, people are often not naturally good at judging risk,...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Backups, Redundancy, and the Cloud

    In this webcast, the presenter will cover the topics include: backups and redundancy confidentiality, integrity, and availability, objectives recover from events, prevent problems, data backups, backups can help mitigate various risks backup plans, Recovery Point Objectives (RPO), Recovery Time Objectives (RTOs), etc.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Build Yourself a Risk Assessment Tool

    In this webcast, the presenter explains the ingredients for a risk assessment tool and how the users go about to build one for their organization. Risk assessment should reflect the overall security knowledge and experience accumulated over the years in the company. This knowledge is company-specific, and applying it should...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SAP Business Objects Attacks - Espionage and Poisoning of Business Intelligence Platforms

    In this webcast, the presenter will explain about the SAP business objects attacks. SAP systems provide business intelligence platforms, which can be a promising target for business espionage. Business executives make their strategic decisions and report on their performance based on the information provided by their business intelligence platforms.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Pragmatic Cloud Security: What Infosec Practitioners Have Been Waiting For

    Applying security standards consistently across environments has typically been a struggle for security practitioners. Maintaining accurate system baselines in dynamic, complex ecosystems is a challenge that makes asset management a seemingly impossible process to control in traditional environments. With the elastic capabilities of cloud services such as AWS, it may...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net