Improve Security, Privacy and Compliance with Continuous Oversight

Isaca

The concept of monitoring information system security has long been recognized as sound and valuable management practice. For additional consideration, a large portion of compliance requirements for information security and privacy are supported by such monitoring. Security programs must be aligned with privacy and compliance programs to ensure those areas of data protection compliance are appropriately met and monitored, and then actions based on maturity levels must be aligned with information assurance programs.
Watch Now

Spotlight

"According to Forrester Research, bring-your-own-technology (BYOT) will remain a thorny issue for CIOs in every industry, geographic region, and company size over the next five years. They have recently published their 2012 report examining how and why bring-your-own-technology (BYOT) will vary across 20 industries.
Download this Forrester report, ""Industry Contexts and Constraints Diversify Approaches for Bring-Your-Own-Technology,"" to understand how companies can devise secure yet flexible policies that enable mobile workers to safely get work done on the go."

OTHER ON-DEMAND WEBINARS

DevOps with Simulation

Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster testing
Watch Now

2018 Threat Report and Top Malware

Webroot

If there’s one thing that came through loud and clear in Webroot’s analysis of malware and other threats in 2017, it’s that, when it comes to cybersecurity, change is the only constant. While analysts, researchers, and security companies worked quickly to identify and block emerging threats, attackers were just as quick in finding new ways to evade defenses. Join this Channel Futures webinar to learn more about the discoveries and analysis of threat activity throughout 2017, the top malware of 2017 and how to be better equipped to overcome modern cybercrime in 2018.
Watch Now

Key Steps to Identify Risk & Master Vendor Risk Management

BitSight

In today’s interconnected technology ecosystem, companies increasingly rely on third-party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte, 83% of today’s business leaders lack confidence in third-party VRM processes. Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program.
Watch Now

Thinking Like a Cyber Attacker: Strategies for Defense

Veracode

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
Watch Now

Spotlight

"According to Forrester Research, bring-your-own-technology (BYOT) will remain a thorny issue for CIOs in every industry, geographic region, and company size over the next five years. They have recently published their 2012 report examining how and why bring-your-own-technology (BYOT) will vary across 20 industries.
Download this Forrester report, ""Industry Contexts and Constraints Diversify Approaches for Bring-Your-Own-Technology,"" to understand how companies can devise secure yet flexible policies that enable mobile workers to safely get work done on the go."

resources