Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now

Spotlight

"Health care organizations are challenged to protect patient data and comply with regulations governing health care entities. Having well-documented policies and controls, along with expert recommendations, are in an important part of reducing risk and achieving compliance with the Health Insurance Portability and Accountability Act (HIPAA).
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures."

OTHER ON-DEMAND WEBINARS

Emerging Threats, Hackers and Attackers: Stories from the SOC

Alert Logic

Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game. Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cybersecurity defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.
Watch Now

Information is power: The role of threat intel in cloud security

Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

Cyber Threat Hunting: Identify and Hunt Down Intruders

InfoSec Institute

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our upcoming webinar series. Senior security researcher and InfoSec Instructor Jeremy Martin discusses what it takes to be modern-day threat hunter during this on-demand webinar, Cyber Threat Hunting: Identify and Hunt Down Intruders. The webinar covers: The job duties of a Cyber Threat Hunting professional.
Watch Now

Mitigate Identity-Related Breaches in the Era of Digital Transformation

KuppingerCole

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.
Watch Now

Spotlight

"Health care organizations are challenged to protect patient data and comply with regulations governing health care entities. Having well-documented policies and controls, along with expert recommendations, are in an important part of reducing risk and achieving compliance with the Health Insurance Portability and Accountability Act (HIPAA).
Areas that are frequently found to be deficient during HIPAA compliance reviews include annual and ongoing risk assessments, undocumented policies and controls and unwritten processes or procedures."

resources