Card Issuer Series: Are Your Security Measures Hurting Your Customer Experience?

"Shopping cart abandonment is on the rise – often fueled by complicated checkout processes or card security prompts. In fact, the estimated value of online shopping carts left behind in 2015 was a staggering $3.38 trillion.*

Join this Card Not Present event with Nick Craig, VP of Payment Security, CA Technologies, to learn the methodology that card issuers can implement to streamline the checkout process and win back some of that lost revenue by providing a better, and more secure shopping experience."
Watch Now

Spotlight

In this report, we’ll examine first why HP StoreOnce and HP Data Protector products are truly game-changing on their own rights. Then, we will look at why they get even "better together” as a complete BURA solution that can be more flexibly deployed to meet backup challenges than any other solution in the market today.


OTHER ON-DEMAND WEBINARS

New Webinar Series Addresses Cybersecurity

Following the release of the National Institute for Standards and Technology (NIST) Cybersecurity Risk Management Framework and a year-long effort by 100 cybersecurity professionals in the broadcast, cable, wireline, wireless and satellite industries to adapt the work to the telecom industry, companies are now poised to consider the best ways to evaluate or implement a cyber risk management program.To advance these efforts, U.S. Telecom is launching a three-part webinar series designed for policy and operational professionals responsible for protecting their networks and customers from cyber threats. The series, scheduled to run May 28, June 18 and July 23, represents an ongoing commitment by industry to enhance capabilities across the sector and broader ecosystem.The May 28 webinar, Telecom Cyber Frameworks, Policies and Business Processes, will examine the core of the NIST framework and how the risk management approach may be applied to an organization. Featured presenters include Jeff Goldthorp with the Federal Communications Commission and Adam Sedgewick from NIST. The June 18 presentation, Telecom Cyber Risk Management, Operational & Technology Requirements will be the first of two sessions focusing on the operational and technology requirements for implementing the framework, including mechanisms for continuous evaluation and improvement. It will also illustrate how companies can create profiles of their current and future risk management capabilities, and prioritize their risk management initiatives.

The rise of privacy: a risk-based approach to privacy oversight, compliance and management

Baker Tilly

With GDPR in force and Google and Facebook facing massive lawsuits, organizations face mounting pressure to demonstrate they are safeguarding private information. Recent hearings on enacting U.S. privacy legislation and California’s privacy law only serve to heighten the need for organizations to ensure a risk-based approach to protect, respond to and address a widening list of data privacy regulations and requirements is in place. In this webinar, Baker Tilly privacy leaders discuss how your organization can prepare for enforcement, ongoing monitoring and compliance in an evolving regulatory landscape.

Securing the Corridors of Knowledge

Sophos

"Device and internet explosion, cloud based learning are the norms of today's educational campuses worldwide. With multiple endpoints, cyber threats loom large in the form of targeted attacks and malware threats. Knowledge corridors must have a right security approach to protect their networks. In this interesting webinar, you get to understand the importance of security in educational institutions and common challenges faced by the campuses in adopting the right security framework. The presenters will also discuss how Cyberoam's Layer 8 defense mechanism helps educational institutions adhere to compliance and evade data breaches."

DDoS and Malware – The Next Generation

For over a decade, the Internet community has struggled with the challenge of large-scale distributed denial of service (DDoS) attacks. However, today's attacks are much more complex than the simple volumetric packet floods of the past. In 2013, we saw the largest attacks increase three fold to over 300Gbps and so far this year the trend continues. Today's DDoS attacks commonly include stealthy, application-layer attacks and are also used as part of broader Advanced Threat campaigns including malware, root kits, trojans, phishing, plus other tools and techniques. This session will explore trends and real-world examples of the modern threat landscape. You will learn about the current threats and how you should plan, prepare and react to them