Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   State Law  >  

Security Breach Law

RSS Feed    Add to Google    Add to My Yahoo!
Security Breach Law Multimedia (View All Report Types)
 
Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

SearchCIO.com

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Network Security Monitoring
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016

SearchNetworking.com

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement