Security Breach Law Multimedia

(View All Report Types)
Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 08 Feb 2021 | Premiered: Feb 19, 2020

TechTarget

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Free broadband for all, big data, taxes and the CW500 IT leaders club
sponsored by ComputerWeekly.com
PODCAST: This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.
Posted: 22 Nov 2019 | Premiered: Nov 19, 2019

TOPICS:  Tax Law
ComputerWeekly.com

Free broadband for all, big data, taxes and the CW500 IT leaders club
sponsored by ComputerWeekly.com
PODCAST: This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.
Posted: 15 Nov 2019 | Premiered: Nov 19, 2019

TOPICS:  Tax Law
ComputerWeekly.com

Free broadband for all, big data, taxes and the CW500 IT leaders club
sponsored by ComputerWeekly.com
PODCAST: This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

TOPICS:  Tax Law
ComputerWeekly.com

Staying Out of the Next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn how to build an effective data protection solution to reduce leakage risk and comply with regulatory demands.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to prep for data breaches lurking on the horizon
sponsored by BROADCOM, Inc
WEBCAST: Anytime intelligent hackers conduct a series of high-profile breaches, security professionals raise their eyebrows and are on high alert. Tune into this recorded roundtable session to discover actionable steps that can improve your company’s security posture from 3 field experts.
Posted: 10 Aug 2022 | Premiered: Aug 10, 2022

TOPICS:  .NET
BROADCOM, Inc

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

What the new EU data protection rules mean for IT marketers
sponsored by ComputerWeekly.com
WEBCAST: The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.
Posted: 30 May 2017 | Premiered: May 30, 2017

ComputerWeekly.com

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Endpoint Security
sponsored by Magna5
VIDEO: So, you want to ensure that all your endpoint devices and applications are consistently patched and updated? But you want to be confident that your data is protected, controlled, and visible? Luckily within this short video, you can learn how to with Magna5 Endpoint Security.
Posted: 14 Jun 2021 | Premiered: 14 Jun 2021

TOPICS:  .NET
Magna5

The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO: During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011

FireEye

PCI DSS Simplified: What You Need to Know
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AT&T Cybersecurity

PCI Compliant Yesterday. Still Compliant Today?
sponsored by Tripwire, Inc.
WEBCAST: This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
Posted: 29 Jan 2010 | Premiered: Jan 29, 2010

Tripwire, Inc.

Webcast: Symantec Internet Security Threat Report 2014
sponsored by Symantec Corporation
WEBCAST: Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
Posted: 09 May 2014 | Premiered: May 9, 2014

Symantec Corporation

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Securing Your APIs: What You Need to Know
sponsored by Veracode, Inc.
WEBCAST: If you have APIs unaccounted for out in the wild, they’re just a security breach waiting to happen. But how can your organization balance tight security with fast development times? This webinar dives into what you need to know to secure your APIs, including how to shift left effectively and how to solve the runtime security problem. Tune in here.
Posted: 11 Jun 2022 | Premiered: Jun 11, 2022

TOPICS:  .NET
Veracode, Inc.

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity