Benchmarks for Corporate Cybersecurity

SIA

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.
Watch Now

Spotlight

In the Client Briefing Center at Discover London, Andrzej Kawalec discusses the cyber attack moment, realizing action must be taken and managing security disruption.Today, we engage with customers, partners and employees in more industries and channels than ever before, from web, mobile, social media and messaging to purchasing and banking. Enterprises are facing increased compliance, disruptive competition, new levels of internal and external security and availability risks that can halt or severely compromise their business. Hewlett Packard Enterprise (HPE) continuously tests and innovates so your security and digital protection transformation positions you to stay safely ahead of the curve.


OTHER ON-DEMAND WEBINARS

Webinar Week: Access Denied- Is Authentication the Unsolvable Information Security Problem?

"Industry experts are almost unanimous in their acceptance of authentication as the unsolved problem facing the information security industry. Passwords are both forgettable and inadequate, memorable information is easily sought out via social networking sites, two-factor authentication can be inconvenient, three-factor authentication is inconvenient, biometrics are treated with suspicion… As an industry, the authentication problem is yet to be cracked, and the consequence is enormous. Authentication is at the heart of anything meaningful we do online, and the ability to authenticate online in a secure, timely and convenient way is crucial in today’s world. This webinar will take a look at the problem, the existing offerings, and potential future solutions."

Overcoming Cloud & Security Challenges

Synoptek

74% of Healthcare organizations report leveraging the Cloud to achieve financial savings and operational efficiencies. However, recent findings show over 60% of these organizations are experiencing Cloud adoption challenges and Security anxiety. It is essential for Healthcare organizations to overcome these challenges as there is a much larger digital transformational trend ahead, where Cloud will become a crucial component of patient care innovation. Join Healthcare IT veterans from Microsoft & Synoptek, as they discuss the future of Cloud for Healthcare and best practices to help you overcome Cloud challenges and achieve higher levels of operational efficiency, security, and HIPAA compliance in the Cloud.

Best Practices for Protecting Sensitive Data from Insider Threats

"Insider threats have shifted to include both traditional insiders - individuals with access to critical data as part of their work, and privileged users - and the compromise of legitimate users' credentials by sophisticated malware and advanced persistent threats (APTs). In this session, Sol will drill into the nature and extent of insider threats today and look at how to combat them, including: - What are the various risk mitigation strategies available to businesses of different sizes - Compare the efficacy of some of the best protection measures to block insiders from compromising enterprise networks and extracting data - What are some of the best practices for protecting sensitive data from insider threats "

Insurance Document Automation Solutions: Addressing Cyber Security

Currently, one of the biggest concerns for many CIOs in the insurance industry is ensuring they aren’t the next company on the front page due to a leak of corporate documents—with employee and/or customer data shared around the world. In addition, the concerns over how to manage cyber security coverages is a pervasive topic across the industry.The content security challenges facing these CIOs is enormous in a world where SharePoint is pervasive, Outlook continues to be a primary collaboration tool, and the simplicity of sharing information externally via DropBox or similar tools is obvious. The ability to secure content wherever it’s deployed and to secure email messages—as well as the associated attachments—is critical.

Spotlight

In the Client Briefing Center at Discover London, Andrzej Kawalec discusses the cyber attack moment, realizing action must be taken and managing security disruption.Today, we engage with customers, partners and employees in more industries and channels than ever before, from web, mobile, social media and messaging to purchasing and banking. Enterprises are facing increased compliance, disruptive competition, new levels of internal and external security and availability risks that can halt or severely compromise their business. Hewlett Packard Enterprise (HPE) continuously tests and innovates so your security and digital protection transformation positions you to stay safely ahead of the curve.

resources