Practical Advice for Cloud Data Security

"The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned.

This session will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, data security industry expert Ulf Mattson will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment."
Watch Now

Spotlight

Cyber attacks are on the rise, costing companies an average of $7.6m. And yet, the vast majority of these attacks could be prevented by implementing best practices in systems management and creating better managed, more secure systems.


OTHER ON-DEMAND WEBINARS

Information Governance - Where is the Healthcare Industry and Where Are You?

AHIMA

"Led by Deborah Green, MBA, RHIA EVP/Chief Innovation and Global Services Officer of AHIMA, who has had key responsibility for AHIMA's IG initiative, and featuring Katherine Lusk, MHSM, RHIA is the Chief Health Information Management and Exchange Officer for Children's Medical Health System of Texas, who has been instrumental in promoting and shepherding information governance (IG) at her organization, this webinar will provide insights on key findings of the second survey of IG adoption in Healthcare. The webinar will feature: Specific findings on progress in IG adoption A discussion of the evolving disciplines of IG Perspectives on the readiness and needs of professionals working in IG and related roles"
Watch Now

Infosecurity 2016: Cyber Security in the Financial Sector

lan glover

Ian covered key information security topics such as the notable recent breaches in the financial world and why the banks keep getting hacked; the principal threat actors and attack vectors; the main vulnerabilities to critical infrastructure; the enduring benefit of pentesting and cyber security is such an attractive career choice
Watch Now

Defeating APTs: How To Use Live Threat Detection

APTs are hard to find and an increasing threat to enterprise security. Finding them takes coordination between device feeds combined with the intelligence to connect those dots. Where along the chain of attack can these threats be detected and stopped? How does the threat spread if left unchecked and what would it cost? Is your network secure enough? The answers to these enterprise-critical security questions will be discussed in this webcast
Watch Now

The Upcoming SEC and FINRA Cybersecurity Sweeps. Is Your Firm Ready?

Because of all of the sensitive financial information that RIA’s, Broker Dealers and Banks keep regarding their clients, internet security has become a major concern for the wealth management industry. As, hacking techniques are growing more sophisticated, it is hard to tell who could be observing your connection and Internet activity. Due to this cyber-threat the SEC and FINRA will be conducting cybersecurity sweeps of the wealth management industry to make sure you are up to date and taking the latest precautions to protect your clients.Why Hackers Target RIAs and Financial Firms Bank account numbers and social security numbers are not the only thing hackers are looking to steal. Many hackers and rogue traders are hijacking trading accounts from financial firms and making unauthorized trades, as well as stealing funds.How the SEC and FINRA Cybersecurity Sweeps Will Work The SEC and FINRA are aware of these potential security threats and want the industry to get prepared. They have announced that this year they are planning random sweeps to test the defenses of various firms. If a firm’s cybersecurity is not up to the job, the SEC and FINRA could levy large fines as punishment for the oversight.
Watch Now

Spotlight

Cyber attacks are on the rise, costing companies an average of $7.6m. And yet, the vast majority of these attacks could be prevented by implementing best practices in systems management and creating better managed, more secure systems.

resources