IT Management  >   Systems Operations  >   Security  >  

Cyber Security Enhancement Act of 2002

RSS Feed   
Cyber Security Enhancement Act of 2002 Multimedia (View All Report Types)
 
Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

PCI DSS & Your Call Center: The Do's & Don'ts of Compliance
sponsored by Semafone
WEBCAST: According to the Ponemon Institute, on average security breaches cost $4 million annually. To prevent breaches and the large costs that come along with it, complying with policy regulations is important. This webinar provides insight into the importance of the PCI DSS regulation and offers approaches for becoming compliant.
Posted: 09 Jan 2018 | Premiered: Jan 9, 2018

Semafone

Security and the de-Commoditization of Data
sponsored by Juniper Networks
WEBCAST: According to recent reports, 81% of breaches involve stolen or weak passwords. In this webcast, learn how to prevent a security attack and protect your organization from a data breach.
Posted: 20 Feb 2018 | Premiered: Sep 30, 2017

Juniper Networks

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

Improving Cybersecurity in the Contact Center: How to Prevent a Data Breach
sponsored by Semafone
WEBCAST: According to the Semafone's State of Data Security in Contact Centers Report, more than 40% of agents do not report data breach attempts. Take an in-depth look at this webinar to gain a better understanding of the payment card industry and how to advance your security to prevent data breaches from occurring.
Posted: 08 Jan 2018 | Premiered: Jan 8, 2018

Semafone

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

What Security Threats Can We Expect in 2012?
sponsored by Websense, Inc.
WEBCAST: View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
Posted: 15 Dec 2011 | Premiered: Dec 15, 2011

Websense, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement