The Security of Big Data: An Enterprise Perspective

"Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step"
Watch Now

Spotlight

Building a business case to justify fraud-prevention technology investments is, unfortunately, not as straightforward as one might expect. The impact of online fraud on a financial institution is multifaceted and complex.


OTHER ON-DEMAND WEBINARS

Emerging Threats, Hackers and Attackers: Stories from the SOC

Alert Logic

Cyber attacks are ever-evolving and it can feel like you are struggling just to keep up. It’s time to get ahead of the game. Join us for the latest attack trends and threat insights from Alert Logic’s own SOC analysts. You’ll hear what’s happening on the front lines of cybersecurity defense, and which attack vectors are worth watching out for. We’ll also discuss the costs of running your own SOC and share some alternative approaches to get 24/7 dedicated coverage and better intelligence than you can access on your own.

Now You See Me, Now You Don't - Ensuring Network Privacy in the Cloud

"Data centers are being transformed with server virtualization, cloud computing, and software-defined networks. As your business consolidates servers and data centers, and extends workloads into hybrid and public clouds, how can you ensure data is properly isolated in multi-tenant environments? How do you provide broader access for mobile devices and BYOD while avoiding unauthorized exposure of corporate resources? Warren Wu, Senior Director of Product Marketing for Data Center at Fortinet will discuss: - Network visibility challenges in private and public clouds - North-south vs east-west topologies for virtual switch traffic - Physical vs virtual firewalls and security appliances - Managing security in the cloud and from the cloud - Four key considerations for architecting network security for the cloud"

Can I Still Use The Cloud? Now That Safe Harbor is Dead

A webinar for IT Security, Legal and Compliance Managers. The EU-US Safe Harbor agreement for data transfers has been declared invalid. Hear what this means for you, your organization and your data on EU citizens. Can you save data in US cloud services, and if so, what do you need to know to ensure you don’t break privacy laws. Join us for this webinar to hear: · What does the recent European Court of Justice ruling mean to me? · Do I need to review my contracts with US cloud providers? · Am I responsible for shadow IT services in the cloud? · What other steps can I take to be lawful? · How can I proactively protect my data in the cloud?

"Continuous Third Party Monitoring Powers Business Objectives"

bitsight

"In “Continuous Third Party Monitoring Powers Business Objectives,” BitSight CTO and Co-founder Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy will discuss the value businesses are finding in using a solution that has a constant eye on third party cyber threats. Boyer and Murphy will also discuss: - The results of the study BitSight commissioned Forrester Consulting to undertake, examining how IT decision-makers feel about objective, reliable and continuous monitoring. - What can be done beyond compliance to increase security performance. - Which industries stand to benefit most from using automated, objective information security data. - Specific use cases for continuous monitoring and how they help companies improve information security performance. "