Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   State Law  >  

Breach Notification Law

RSS Feed    Add to Google    Add to My Yahoo!
Breach Notification Law Multimedia (View All Report Types)
On-Demand Webinar: Driving IT Innovation in the Enterprise
sponsored by Mendix
WEBCAST: According to Michael Krigsman, meeting app delivery demand starts by putting the right competencies, processes and technologies in place. Watch this interactive discussion for insight into how your team—and organization—can adapt and thrive in the digital era.
Posted: 24 Jul 2015 | Premiered: Jul 24, 2015


Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

Business Information University Classroom: Taking Advantage of Advanced Analytics
sponsored by SearchBusinessAnalytics
VIRTUAL ENVIRONMENT: In this comprehensive Advanced Analytics Classroom, celebrated BI consultant Thomas Rathburn shares the secrets of implementing a successful predictive analytics and data mining program. Learn some best practices, get insight into key trends and developments, discover potential challenges, and more.
Posted: 14 Feb 2013 | Premiered: 12 Feb 2013


Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Enterprise

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013


Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HPE
sponsored by Hewlett-Packard Enterprise
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Enterprise

Trusted Computing in a Hybrid Cloud Environment
sponsored by Intel and IBM
WEBCAST: In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.
Posted: 05 Oct 2015 | Premiered: Jun 11, 2015

Intel and IBM

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010


APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

What’s New with IBM Cognos Business Intelligence V10.1
sponsored by IBM
PRODUCT DEMO: See what's new in IBM Cognos Business Intelligence V10.1 that makes it possible to connect everyone in your organization with the insight, analytics and information they need to make better, faster, smarter decisions.
Posted: 07 Feb 2011 | Premiered: 07 Feb 2011


Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Getting Ready for BlackBerry Enterprise Service 10.2
sponsored by BlackBerry
WEBCAST: This exclusive video examines how your organization can get your system ready for one of the latest mobile management tools, detailing what steps you can take to ensure that your transition is seamless, simple and pain-free.
Posted: 11 Dec 2013 | Premiered: Dec 11, 2013


CA ARCserve Replication r15 and CA ARCserve High Availability r15 Evaluation Software
sponsored by arcserve
SOFTWARE DOWNLOAD: CA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now.
Posted: 28 Jun 2010 | Premiered: 28 Jun 2010


PCI Compliant Yesterday. Still Compliant Today?
sponsored by Tripwire, Inc.
WEBCAST: This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
Posted: 29 Jan 2010 | Premiered: Jan 29, 2010

Tripwire, Inc.

BlackBerry Java Development Environment
sponsored by BlackBerry
TRIAL SOFTWARE: The BlackBerry® Java® Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java ME™) applications for Java-based BlackBerry® smartphones
Posted: 18 Feb 2008 | Premiered: 18 Feb 2008


CA Compliance Manager for z/OS
sponsored by CA Technologies.
WEBCAST: Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk.
Posted: 12 May 2009 | Premiered: May 12, 2009

CA Technologies.

WebEx MeetMeNow
sponsored by WebEx Communications, Inc.
TRIAL SOFTWARE: Secure hosting of online meetings allows small to medium-sized businesses (SMBs) to cost-effectively collaborate with remote employees and partners. Try this free 14-day Web conferencing software trial to learn the benefits of secure online meetings.
Posted: 30 Jan 2007 | Premiered: 30 Jan 2007

WebEx Communications, Inc.

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013


Improve Your Automated Decisions with Business Rules & Events
sponsored by IBM
VIDEO: Watch this 5-minute video to understand how business rules and business events processing can be used to create intelligent decision automation solutions across a variety of industries and applications. Featured industry scenarios: Healthcare, Retail and Financial Services.
Posted: 10 Oct 2011 | Premiered: 07 Oct 2011


Cirrus Configuration Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Manager.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.

Information Governance - an Enterprise Imperative (Hurwitz & Assoc)
sponsored by IBM
SOFTWARE DEMO: Learn why Hurwitz & Associates deems information governance an imperative for the enterprise in this video featuring Marcia Kaufman.  The video was created for the 2010 Virtual IOD event.
Posted: 17 Mar 2011 | Premiered: 17 Mar 2011


Introduction to VMware View 5
sponsored by VMware, Inc.
WEBCAST: VMware View™ 5 simplifies IT management while increasing end user freedom by delivering desktop services from your cloud. Building upon VMware's leadership in desktop virtualization, VMware View 5 delivers a high-performance user experience while giving IT greater policy control. View this webcast to learn more about VMware view 5.
Posted: 21 Aug 2012 | Premiered: Aug 21, 2012, 01:40 EDT (05:40 GMT)

VMware, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Oracle HR Analytics: Driving Return on Human Capital Investment
sponsored by ORACLE APAC
PODCAST: In this podcast, you'll hear from Lexy Martin, the director of Research and Analytics for CedarCrestone, and the author of a recent, in-depth Oracle white paper on HR Analytics, as she talks about current trends in HR and how firms are using analytics to gain insights on their HR operations and performance.
Posted: 22 Mar 2011 | Premiered: Mar 21, 2011


PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009


Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006


Security Practices for Vmware
sponsored by Vyatta Inc.
WEBCAST: This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.
Posted: 03 Aug 2012 | Premiered: Jun 20, 2012

Vyatta Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement