IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Presidential Decision Directive 63

RSS Feed   
Presidential Decision Directive 63 Multimedia (View All Report Types)
 
The Future of Digital IAM
sponsored by WSO2, Inc.
VIDEO: If you're currently evaluating an Identity solution or exploring IAM, this webinar is for you. Download now to learn about the future of IAM and its forecasted trends.
Posted: 13 May 2019 | Premiered: 13 May 2019

WSO2, Inc.

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

The Power of Bro and Why You Should Include It in Your Security Infrastructure
sponsored by Corelight
VIDEO: Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do their jobs quickly and effectively.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019

Corelight

ITSM and Digital Transformation – Where Are We?
sponsored by Serviceaide
WEBCAST: Hear from ITSM and IT automation experts as they discuss the impending evolution of ITSM under the pressures of digital transformation – and how technology like AI, machine learning, and process automation will become crucial to a successful IT service strategy.
Posted: 17 Jun 2019 | Premiered: Nov 27, 2018

Serviceaide

Micro Focus DXC Podcast
sponsored by Micro Focus & DXC Technology
PODCAST: Many annual threat reports give valuable information into what types of threats enterprises are falling victim to. But, many fail to reveal what enterprises are actually doing to combat those threats. In this podcast, learn about what companies' perceptions of the related risks are, what their current defense strategies are, and more.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Micro Focus & DXC Technology

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Important Things You Need to Know about Storing Your Identity
sponsored by RSA Conference
WEBCAST: Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.
Posted: 31 Jul 2019 | Premiered: May 16, 2019

RSA Conference

Achieving Secure Authentication and Zero-Trust Security Without Agents or Proxies
sponsored by Silverfort
WEBCAST: Silverfort can enable organizations to enforce secure authentication – including MFA, adaptive authentication and zero trust – without deploying software agents or proxies. Tune into this webinar to learn more.
Posted: 15 Jul 2019 | Premiered: Jul 15, 2019

Silverfort

Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking
sponsored by RSA Conference
WEBCAST: Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.
Posted: 31 Jul 2019 | Premiered: Mar 5, 2019

RSA Conference

How to Automate Mobile AppSec without the Staff
sponsored by Data Theorem
WEBCAST: The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement