IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive No. 7

RSS Feed   
Homeland Security Presidential Directive No. 7 Multimedia (View All Report Types)
 
Avoid the GDPR Pitfall: Unlock Your Unstructured Content
sponsored by Ephesoft
VIDEO: 80% of most organizations' content is unstructured, according to IDC – and this leaves a majority of customer data unsearchable. This could be a problem for GDPR compliance. Watch this video for 3 steps to unlock your unstructured content, including how machine learning can play a role in helping you gain insights out of this unstructured data.
Posted: 23 Apr 2018 | Premiered: 20 Apr 2018

Ephesoft

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Mission Impossible? Trusting Disparate Endpoints
sponsored by Citrix
VIDEO: Today's enterprise security landscape is heavily endpoint and user-dependent. You need to protect all sensitive enterprise data regardless of endpoint. In this webinar, you will learn how to secure your enterprise in an endless sea of endpoints.
Posted: 05 Feb 2018 | Premiered: 05 Feb 2018

Citrix

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

How to Build a Security Strategy
sponsored by Proofpoint, Inc.
VIDEO: The healthcare industry still lags other industries in deploying commonly accepted security technology. In this webinar, learn about the current state of healthcare security and how to build and implement a holistic security architecture.
Posted: 25 Apr 2018 | Premiered: 19 Apr 2018

Proofpoint, Inc.

Vident Health: More Than the Sum of its Parts
sponsored by McAfee, Inc.
VIDEO: Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

McAfee Cloud Visibility-Community Editioin
sponsored by McAfee, Inc.
VIDEO: Cloud services provide many benefits, but Shadow IT can expose sensitive data. Find out if your company is at risk.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement