Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2011

    How to Protect Your Computer From Identity Thieves

    In this Webcast, the presenter gives expert video advice on: how to protect their computer from identity thieves. A couple of the things that one can do to protect from people who are trying to steal information from one include blocking their computer from someone always having access to it...

    Provided By Videojug

  • Webcasts // Jan 2011

    Risk Maker Risk Taker: A Manager's Guide To Risk

    Risk management is a vital training topic for any organization. Whether you're implementing a new strategic plan or coordinating a single event, risk involves the culture, processes and structures through which potential opportunities and possible adverse effects are fully weighed and considered.

    Provided By CRM Learning

  • Webcasts // Jan 2011

    DataRoket

    DataRoket makes data integration simple. Getting the right data, to the right people at the right time is critical to cutting costs, increasing margins and becoming a competitive force in the own industry. Tapping "All" of the data; from one's databases, the applications, the web, social media and even just...

    Provided By DEMO

  • Webcasts // Dec 2010

    Obama~s Nominees To Federal Judgeships Lag

    The pace of confirmations to the federal bench has slowed in recent years, and President Obama's nominees to the federal district courts and appeals courts have faced considerable partisan resistance. Visiting Fellow the presenter says historically, well-qualified presidential nominees were routinely confirmed to the bench, but that's no longer the...

    Provided By Brookings Institution

  • Webcasts // Dec 2010

    Secure Data Management and Processing: Leveraging the Web for Secure Data Processing

    Kane County's Circuit Court Clerks office is leveraging the web to transform how orders of protection are accessed, completed, submitted, reviewed, and approved. The more integrated, automated processes translate into better protection for victims of domestic violence.

    Provided By Adobe Systems

  • Webcasts // Dec 2010

    How to Protect Your Company From Social Engineering Attacks

    The presenter is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security speaker. The presenter offers advice for companies on how to prepare themselves for potentially dangerous social engineering situations: basic security awareness training, the...

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    Business Insights Webcast: Security and Management Convergence on the Desktop (Level 100)

    As deployment planning for and deployment of Windows 7 gets underway, IT departments have the opportunity to re-evaluate investments, tools, and processes to ensure they are more responsive to user needs around client computing. Desktop management and security are two key elements in delivering an improved user experience, and aligning...

    Provided By Microsoft

  • Webcasts // Dec 2010

    Save YOUR Energy - Automating NERC CIP Compliance

    Save the energy - automate NERC CIP compliance. The attendees of this webcast will learn more about how one can automate the provisioning, configuration, tracking, and reporting of digital and analog assets to automate key NERC CIP processes.

    Provided By BMC Software

  • Webcasts // Dec 2010

    L0phtCrack 7: The Next Level of Password Auditing and Recovery

    L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn't halted since.

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    On demand webcast: Harnessing Oracle GRC to Control Your E-Business Suite 12.1 Upgrade

    Oracle E-Business Suite (EBS) 12.1 offers new capabilities for customers across the application suite, aligning with business objectives in every department, while lowering overall cost of ownership. Making the upgrade requires managing change by balancing risk and control with speed and performance. Implementation is recommended using a "design-in" approach to...

    Provided By Oracle

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    Orchestrate Digital Initiatives to Better the Customer Experience

    An increasing share of business' customer interactions take place online, and in response, businesses are shifting investments to digital venues. But these efforts don't always result in a compelling customer experience. How does a business supercharge its digital strategy and deliver a great experience to their clients? Attend this...

    Provided By IBM

  • Webcasts // Nov 2010

    CA & Red Hat Present: Who's Securing Your JBoss Applications?

    Single-sign on, strong user authentication, and centralized security policy management are keys to securing any mission critical infrastructure. After this webcast, the will, gain a better understanding of how CA and Red Hat collaborate together Learn how and why customers use identity and access management tools in their mission critical...

    Provided By Red Hat

  • Webcasts // Nov 2010

    HALDB Best Practices

    The attendees of this webcast will learn about IMS High Availability Large DataBases (HALDBs) in this informative webcast. The presenter interviewed several users and compiled a comprehensive set of best practices for moving to and maintaining HALDBs.

    Provided By BMC Software

  • Webcasts // Nov 2010

    Taming the Information Explosion with IBM System Storage

    Today's IT departments are being asked to meet tomorrow's storage challenges with yesterday's solutions. In this special announcement webcast, an IBM storage executive and a recognized storage analyst will discuss a host of new offerings in our storage portfolio. You'll learn about innovative technologies that are fully integrated and...

    Provided By IBM

  • Webcasts // Nov 2010

    Unisys ClearPath MCP 13.0 Security Overview

    The Unisys ClearPath MCP 13.0 Release includes many important security features, such as Secure Telnet, 2-tier secure WebEnabler, and secure TCPIPNATIVESERVICE port files, a new Role-Based Access Control subsystem for applications, Locum Real-time Monitor for real-time security monitoring, and many other incremental features. This technical webcast gives an overview of...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath OS 2200 Encryption Insights

    Encrypting sensitive data is an essential part of a strategy for protecting business assets and complying with governmental and industry regulations. This technical webcast includes insights gained from the use of Cipher API, the ClearPath OS 2200 product that uses to encrypt the stored data. After a brief overview, this...

    Provided By Unisys

  • Webcasts // Nov 2010

    TechTalk: 2048-Bit SSL Certificates - Are You Ready?

    Through this webcast one will discover how to efficiently manage this change and what actions one need to take now that will ease the transition to 2048-bit and still maintain the highest performance and security standards. In this webcast one will learn about: why SSL/TLS is moving to 2048-bit certificates...

    Provided By Citrix Systems

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Nov 2010

    What the Unisys Security Index Means for You

    National security, identity theft and credit card fraud are the top security concerns of the American public. These findings are the latest results of the, a biannual survey of America's sense of financial, national, Internet and personal security. So what do these results mean? What steps are Americans taking to...

    Provided By Unisys

  • Webcasts // Nov 2010

    7 Tips and 2 Models: Find a MSSP that Fits Your Business

    Tune in with John Ramsey and hear about 2 models for handling network security and 7 tips on choosing a managed security services provider. You'll learn the benefits of working with an MSSP, and how important a provider's industry knowledge is to their business. Part 2 of a 4 part...

    Provided By Megapath

  • Webcasts // Nov 2010

    Hosted VoIP: What about Service Quality?

    Listen to this podcast and Learn the basics on how hosted voice services work. Join Joel Thomas and get insight into small business advantages for adopting hosted voice, types of businesses that benefit most from hosted VoIP, and quality indicators for evaluating service providers.

    Provided By Megapath

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    MSDN Webcast: Security Talk Series: Fixing Application Security Issues the Right Way (Level 300)

    This Webcast show Fixing Application Security Issues the Right Way. What is security? It's about protecting assets: Tangible assets, such as a webpage or customer database, and fewer tangible assets, such as the company's reputation. A threat is a potential event that can adversely affect an asset, whereas a successful...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Detecting Data Leakage and Cyber Threats to PHI With Security Information Management

    In this webcast, the presenters say about healthcare entities address increasing compliance requirements and implement electronic health record systems, the relentless risk of data leakage and cyber threats becomes even more challenging. Protected Health Information (PHI) is vulnerable to both insider actions and outsider threats.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Understanding TCO and ROI for VMware View 4 - Purpose Built for Desktops

    Total cost of ownership (TCO) is one of the key criteria for evaluating desktop architecture. In this webcast, listen to VMware and IDC talk about measuring TCO and ROI for a VMware View? implementation. We cover IDC findings on real cost savings achieved by VMware View customers, the methodology used...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered.

    The enterprise-class public cloud is real. But how do you ensure you're leveraging the VMware technology you know and trust? Learn how VMware vCloud? and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers...

    Provided By VMware

  • Webcasts // Oct 2010

    TechNet Webcast: Hypervisor-Agnostic Management: Integrating VMware Into System Center (Level 300)

    In this webcast, presenters focus on best practice methods and real-world deployment examples for extending Microsoft System Center Operations Manager and Microsoft System Center Virtual Machine Manager to monitor and manage VMware. This podcast demonstrate the nworks Management Pack for VMware and nworks PRO Pack for VMware from Veeam Software...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Podcast: The Promise of Content-Aware Identity and Access Management

    The Promise of Content-Aware Identity and Access Management Published: 13 Oct 2010 This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy. Please view to learn more.

    Provided By CA

  • Webcasts // Oct 2010

    Dependable Data Protection That Saves You Time and Money

    Join us for a Webcast on two of the most important storage challenges facing enterprises today: backup and recovery. When systems crash and there is no way to recover your important data, you face the potential for lost revenue and customer dissatisfaction. Oracle's Dave Krenick, Open Storage Product Manager, and...

    Provided By Oracle

  • Webcasts // Oct 2010

    Cut Your Storage Costs in Half

    Around the world, companies such as yours are struggling to overcome the challenges associated with massive data growth and resource constraints. Tiered storage can help alleviate data management burdens as well as provide operational efficiencies and cost savings. Watch this webcast and find out how Oracle's extensive range of...

    Provided By Oracle

  • Webcasts // Oct 2010

    Accelerating Business with Integrated Content Management

    How can you turn exploding volumes of digital and paper based content into a business asset rather than a productivity killer? Explore Oracles' standards based solutions for the entire information lifecycle including document and records management, document capture and image processing, high performance flash and disk storage and highly...

    Provided By Oracle

  • Webcasts // Oct 2010

    Archive Strategy

    Oracle invites you to view our Oracle + Sun Product Strategy Webcast series. You'll get the chance to learn more about the combination of Sun and Oracle?and what it means for you. These informative, on-demand sessions offer strategies for Sun's major product lines related to the combination, explain how Oracle...

    Provided By Oracle

  • Webcasts // Oct 2010

    Best Practices for Entitlement Certification by Michael Liou

    Entitlements certification, also known as attestation, is becoming an increasingly common approach to responding to compliance audits. This process of asking business managers to validate the need for employees' sensitive access allows organizations to demonstrate action which minimize security risk by identifying and eliminating unnecessary access. During this webcast, Michael...

    Provided By CA

  • Webcasts // Oct 2010

    Mainframe Disaster Recovery Old Concepts and New Challenges

    Listen to this webcast and hear Jon Toigo discuss this primer for data protection and data recovery in mainframe storage. Jon will examine the requirements and the challenges for building an effective mainframe storage data protection and recovery plan, with emphasis on techniques for auditing and testing the plan for...

    Provided By CA

  • Webcasts // Oct 2010

    Business Insights Webcast: Desktop Lockdown: Securing Endpoints With Microsoft Security Products (Level 100)

    Securing network endpoints using Microsoft solutions provides flexibility to growing businesses that want to securely supply workers with the IT functionality they need. The benefits of deploying Microsoft Forefront technologies for identity and security management can be best viewed through three core principles, protect everywhere / access anywhere, integrate and...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2010

    Protecting Sensitive Data in an Enterprise With No Boundaries

    Email was once a nice-to-have application, as was running a corporate website. Now both are critical to enterprises, with millions at stake if they experience an outage. With this in mind, it's impossible to ignore the rapid adoption of mobile devices, social networks, IM, texting and other alternate communications, and...

    Provided By Unisys