IT Agents  >   IT Workforce  >   Executive Management  >  

Information Security Officers

RSS Feed    Add to Google    Add to My Yahoo!
Information Security OfficersMultimedia (View All Report Types)
 
Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

IBM Cognos 8 Business Intelligence Online Demo
sponsored by IBM Cognos
SOFTWARE DEMO: Complete capabilities in a single product. See key features for IT and business users.
Posted: 11 Sep 2008 | Premiered: 11 Sep 2008

IBM Cognos

It's Not "If" You Collaborate, But "How"
sponsored by Cisco Systems, Inc.
VIDEO: To learn more about who collaborates and why, Cisco recently conducted one of the first comprehensive studies of the personal and cultural factors associated with successful adoption of network based collaboration. Read the full report, and find out more about how collaboration transforms business.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

Cisco Systems, Inc.

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

What’s New in CA Workload Automation
sponsored by CA Technologies
WEBCAST: IT needs to drive business revenue but frequently business demand is outpacing IT budgets and resources. Watch this webcast that discusses present day scheduling and data center challenges and trends in workload automation.
Posted: 21 Jun 2011 | Premiered: Jun 15, 2011

CA Technologies

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

KPN Focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

Information Governance Symposium: The Mobile Influence on Information Management Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: With the proliferation of BYOD, cloud, and social media within the enterprise, benefits like cost savings, along with improved customer relations and employee satisfaction often overshadow the cons. This classroom provides expert insights into the issues that those trends are throwing into information security and governance processes.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Video: Incorporate SIM tools to stay compliant
sponsored by HP Enterprise Security
VIDEOCAST: This resource outlines potential benefits of SIM and log analysis such as improvements in access control, data leak prevention and much more.
Posted: 10 Apr 2012 | Premiered: Apr 9, 2012

HP Enterprise Security

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


Information Governance Symposium: Leverage predictive coding, analytics tech for information governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 28 Jan 2014 | Premiered: 31 Jan 2014

SearchCompliance.com

Healthcare Security Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Health IT is an everchanging industry with new HIPAA compliance regulations to consider. As more and more mobile devices are being brought into the hospital networks more security concerns arise. This Classroom will answer all your questions on the evolution mobile Health IT, and the importance of protecting patient data.
Posted: 15 Mar 2013 | Premiered: 20 Mar 2013

SearchHealthIT.com

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

Secure Sync Demo
sponsored by Iron Mountain
WEBCAST: Tracking and managing your media inventory can be a very complex proposition. Between tape rotation schedules, retention policies, generating inventory reports, as well as complying with audit trails and regulatory compliance. Most importantly, though, in the event of a disaster, you need your backup data.
Posted: 17 May 2011 | Premiered: May 17, 2011

Iron Mountain

SearchSecurity.com University: SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

SearchSecurity.com University: Web-bourne Malware
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson examines trends in Web-borne malware, including contemporary attacker and malware trends, and recent cutting-edge attack methods, and details the technologies and tactics enterprises can put in place to achieve "quick wins" to reduce malware risk and long-term strategies to harden browsers, enhance detection and educate users.
Posted: 14 Jan 2014 | Premiered: 15 Jan 2014

SearchSecurity.com

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

SearchSecurity.com University: Network Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Posted: 07 Aug 2013 | Premiered: 07 Aug 2013

SearchSecurity.com

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement