IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Multimedia (View All Report Types)
 
Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: That malicious actors are mostly out for low hanging fruit. With the resources found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Addressing Cybersecurity in Healthcare Strategically
sponsored by Symantec Corporation
WEBCAST: What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.
Posted: 23 May 2016 | Premiered: Apr 1, 2016

Symantec Corporation

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Demo of OptioAware by OptioLabs
sponsored by OptioLabs
VIDEO: View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.
Posted: 25 Mar 2016 | Premiered: 21 Dec 2015

OptioLabs

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.
Posted: 27 Aug 2007 | Premiered: Oct 10, 2007, 12:00 EDT (16:00 GMT)

Shavlik Technologies

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM EDT. Get information on the latest Microsoft Patches and how they could affect you and your network environment.
Posted: 10 Aug 2007 | Premiered: Nov 14, 2007, 12:00 EST (17:00 GMT)

Shavlik Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement