Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed   
Industrial Safety Multimedia (View All Report Types)
Making GRC Understandable, Actionable, and Auditable for New Regulations
sponsored by ServiceNow
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018


Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Wimbledon Increases Security to Focus on the Court, not the Cloud
sponsored by IBM
WEBCAST: The Wimbledon website sees a 300% increase in cyberattacks year after year. Take a look at this webcast case study to uncover how Wimbledon is fighting back against hackers by implementing a strategy that has significantly reduced the number of breaches.
Posted: 08 Mar 2018 | Premiered: Mar 8, 2018


Regulating Privileged Access: When to Require Human Approval Workflows
sponsored by One Identity
VIDEO: Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013


Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015


Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014


Webcast: Unlocking New Insights and Opportunities with Big Data
sponsored by IBM
WEBCAST: In this exclusive webcast, learn how you can use big data to create new business value, maintain relevance, and achieve greater operational efficiency.
Posted: 05 Sep 2013 | Premiered: Aug 19, 2013


Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Stronger Business Insights for Finance Leaders
sponsored by IBM
VIDEO: This brief video considers one system that sheds light business performance metrics, with particular focus on analytics and business intelligence. Watch now to see if a system like this can help your senior executives steer your business down the right path.
Posted: 16 Dec 2015 | Premiered: 16 Dec 2015


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement