IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Multimedia (View All Report Types)
Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


Why Innovation Matters: Discussing 8x8's Patents and Technologies
sponsored by 8x8, Inc.
VIDEO: Watch this informative webcast to hear executives from 8x8 reflect on their culture of innovation and discuss why it matters to customers and to the cloud communications industry. You'll find out how their patents and technologies have changed the business communications market.
Posted: 23 Nov 2015 | Premiered: 22 Jan 2015

8x8, Inc.

The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO: This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015


How to Turn Data into Actionable Threat Intelligence
sponsored by BrightPoint Security
VIDEO: This brief video presents a way to automate the analysis of threat intelligence, turning it into data you can use to enhance your security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

Webcast: Putting Fault Tolerance to the Test - A Vendor Lab Review by Howard Marks
sponsored by Pivot3
WEBCAST: In this webinar, Howard Marks, Chief Scientist at, tests a three node enterprise HCI to see just how efficient and resilient systems using erasure coding are. View this webcast now to get an insider's look at this enterprise system's performance.
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Classify and Secure All Your Sensitive Data
sponsored by Identity Finder, LLC
VIDEO: This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.
Posted: 12 Oct 2015 | Premiered: 27 Dec 2013

Identity Finder, LLC

Move Away from Traditional Cybersecurity
sponsored by BitDefender
VIDEO: This brief video gives you a glimpse at how your cybersecurity can look to the future instead of remaining stuck in the past.
Posted: 08 Oct 2015 | Premiered: 20 May 2015


Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement