IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive No. 7 Multimedia (View All Report Types)
 
The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Prevent Dangerous Insider Threats
sponsored by OptioLabs
WEBCAST: It only takes a casual glance over someone's shoulder for a malicious insider to steal the sensitive data on a trusted user's screen. This webcast explores this little-known "eavesdropper" threat and explains how you can combat it.
Posted: 08 Dec 2015 | Premiered: Dec 8, 2015

OptioLabs

Australia Department of Prime Minister & Cabinet on G20 Tech
sponsored by Dimension Data
VIDEO: In a world first, the 2014 G20 used cloud for secure networking and virtual desktop. Learn how a new benchmark was set.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

TOPICS:  IT Management
Dimension Data

How to Improve on Your Current Email Security
sponsored by Proofpoint, Inc.
WEBCAST: This webcast explores some of the options available to you for improving and strengthen your email security. Access it and learn how you can build on current email security measures by adding advanced encryption, threat intelligence, and more.
Posted: 04 Jan 2016 | Premiered: Dec 31, 2015

Proofpoint, Inc.

Office Move
sponsored by Dell, Inc. and IntelĀ®
VIDEO: In this lighthearted video, find out how one office move consisted of using Dell, Citrix, and Intel technology to help simplify the process. Watch now and you'll see how they were able to get systems up and running with very little work and time.
Posted: 22 Jan 2016 | Premiered: 22 Jan 2016

Dell, Inc. and IntelĀ®

Strategies for IT security suites
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Purchasing a suite of IT security tools can be convenient, but may result in functional overlap and other problems. Learn how to make security suites work for you.
Posted: 10 Dec 2015 | Premiered: 06 Dec 2015

SearchSecurity.com

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement