Beating the Insider Threat: Is Printing Cybersecurity's Weakest Link?

HP

IT Security practitioners have long acknowledged that the insider threat poses a clear and present danger to secure systems. Whether or not authorized users have malicious intent, their proximity to sensitive data makes them dangerous. In our recent survey of your peers, 81 percent reported that they have an IT Security Plan in place. But many, if not most, lacked the tools to protect against insiders.
Watch Now

Spotlight

Network security a few years ago was not a part of an organization's annual budget where traditional wired computers sent secure information to the server placed in an isolated network and traditional routers with a basic firewall performed the job of securing an organization's network


OTHER ON-DEMAND WEBINARS

Best Practices for Mitigating Network Security Risks

Cradlepoint

With the rapid growth of mobile devices, cloud-based applications, credit card purchases, and the Internet of Things in the distributed enterprise, maintaining network security is more difficult, and more important, than ever before. Data breaches come in all shapes and sizes, and with increasing prevalence. From passwords to phishing, educating a company’s staff early and often is one of the most effective ways to mitigate cyber security risks.
Watch Now

Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks

"There's been a lot of talk the past few years about BYOD/PC and how IT has to embrace it to stay competitive. But, BYO can be very complex to implement -- there are legal issues regarding privacy, IP security issues, and of course issues of on-boarding and off-boarding employees using a multiplicity of devices from remote locations. Why not start simply with a CYOD/PC program instead? It provides the employees access to some of the cool toys they want but IT can still maintain ownership, security, and overall management. In this informative video, learn how to implement a highly cost effective and secure CYOD/PC program."
Watch Now

Mobile Risk Analysis: Take Your Mobile App Security to the Next Level

Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
Watch Now

Always On, Always Moving – Securing the Mobile Workforce

The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure
Watch Now

Spotlight

Network security a few years ago was not a part of an organization's annual budget where traditional wired computers sent secure information to the server placed in an isolated network and traditional routers with a basic firewall performed the job of securing an organization's network

resources