Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   State Law  >  

California Security Breach Information Act

RSS Feed    Add to Google    Add to My Yahoo!
California Security Breach Information ActMultimedia (View All Report Types)
 
Can the CIO dilemma be solved?
sponsored by IBM
PODCAST: Many companies are benefiting from a smarter approach to infrastructure and architecture.Access this podcast aimed at IT decision makers who are using technology to transform their organizations and improve business performance. Find out how you can turn your company into a smarter organization and make your IT become more strategic.
Posted: 18 Mar 2013 | Premiered: Mar 18, 2013

IBM

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

SearchCIO.com

Business Information University Classroom: Taking Advantage of Advanced Analytics
sponsored by SearchBusinessAnalytics
VIRTUAL ENVIRONMENT: In this comprehensive Advanced Analytics Classroom, celebrated BI consultant Thomas Rathburn shares the secrets of implementing a successful predictive analytics and data mining program. Learn some best practices, get insight into key trends and developments, discover potential challenges, and more.
Posted: 14 Feb 2013 | Premiered: 12 Feb 2013

SearchBusinessAnalytics

Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

The Inevitable Threat to Your Share Price
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast highlights the criticality of investing in security upfront to prevent data breaches, instead of merely focusing on the clean-up process. View now to see how this could save IT costs, and brand reputation, in the long-run.
Posted: 05 Feb 2014 | Premiered: Feb 5, 2014

Hewlett-Packard Limited

Rethinking Email Security: Best Practices to Protect and Maintain Private Communications
sponsored by Voltage Security, Inc.
WEBCAST: This webcast offers 9 best practices for successful policy-based encryption to improve email security.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Voltage Security, Inc.

Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

7 Ideas to Improve Network Security in Healthcare
sponsored by Palo Alto Networks
WEBCAST: View this webcast to reveal 7 critical steps to improve healthcare IT security despite increasing network complexities.
Posted: 27 Dec 2013 | Premiered: Sep 30, 2013

Palo Alto Networks

HP Cybercrime
sponsored by Hewlett-Packard Company
WEBCAST: This resource takes a look at some of the growing threats in today's IT landscape and outlines the need for an effective security management strategy.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.

The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO: During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011

FireEye

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Mercy Health System Speeds Access to EpicCare and Increases Clinician Satisfaction
sponsored by Imprivata
WEBCAST: This webcast demonstrates how one hospital was able to benefit from single sign-on technology that helped foster physician satisfaction while meeting HIPAA compliance regulations.
Posted: 05 Jun 2012 | Premiered: Jun 5, 2012

Imprivata

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Protecting Your Multi-Platform Network: The New Wave of Attacks
sponsored by ESET
WEBCAST: Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.
Posted: 20 Jun 2011 | Premiered: Jun 20, 2011

ESET

This Month in the Threat Webscape for July 2009
sponsored by Websense, Inc.
VIDEO: In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time.
Posted: 02 Sep 2009 | Premiered: 01 Sep 2009

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement