Panel: Securing Documents and Data In A Mobile World

"Once upon a time, a knowledge worker accessed proprietary documents on a company-owned desktop computer within the corporate firewall. Today's work environment is dramatically different - sensitive
data and proprietary documents are increasingly produced and accessed outside the firewall, on employee-owned devices. Virtual collaboration is
growing, and the cloud is redefining security paradigms even further. Yet, some things remain the same. Intellectual property must be protected, regulations must be complied with, and individual identities, authentication and privileges must be dynamically managed. This panel will look at how changing use cases and scenarios are changing the threat landscape for corporate IP, and how leading vendors are rising to the occasion to help enterprises meet these challenges. It will also discuss
best practices in developing and executing a forward-looking IP protection strategy."
Watch Now


The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs)


Privacy vs Data Protection

After reviewing the diverging data protection legislation in the EU member states, the European Commission (EC) decided that this situation would impede the free flow of data within the EU zone. The EC response was to undertake an effort to "harmonize" the data protection regulations and it started the process by proposing a new data protection framework. This proposal includes some significant changes like defining a data breach to include data destruction, adding the right to be forgotten, adopting the U.S. practice of breach notifications, and many other new elements. Another major change is a shift from a directive to a rule, which means the protections are the same for all 27 countries and includes significant financial penalties for infractions. This tutorial explores the new EU data protection legislation and highlights the elements that could have significant impacts on data handling practices.

Gartner MQ for Web App Firewall


The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Attend the webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.

"Top Takeaways for National Cyber Security Awareness Month"

"In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise."

DDoS Readiness, Response, and Impact in the Financial Services Industry

Arbor Networks

Availability is one of the core principles in the security CIA triad and one which business leaders tend to grasp more so than other technical risks associated with security. Customers want and expect access to their finances anytime and from anywhere. How is the financial industry grappling with distributed denial of service (DDoS)? What is the financial impact to an institution under DDoS attack? Are financial services firms witnessing an increase in DDoS attacks and duration? If so, what countermeasures are in place to ensure availability does not suffer?