Using Permaculture to Cultivate a Sustainable Security Program

For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Security, Privacy, and Compliance in 2023: Predictions, Expectations, and Preparations for Data Management in a Post-Pandemic Environment

Learn what the results of the 2022 eDiscovery Unfiltered report indicate about the direction of data management over the next 12 months and how your legal team can navigate current and future security, privacy, and compliance challenges in its approach from a panel of leaders including Marla Crawford, general counsel of Cimplifi, and Paul Lewis, chief executive officer of Calamu in a discussion moderated by industry analyst, Ari Kaplan.
Watch Now

Anatomy of a Ransomware Attack

Organizations are destined to pay a ransom if they can’t recover encrypted files quickly – not to mention experience significant revenue and brand damage. Let Insight and Rubrik provide visibility into the scope of damage, fast restore from uncompromised backups of important files for business continuity, and alerts that uncover unusual behavior from the ransomware infection.
Watch Now

Kubernetes Security

Kubernetes security is becoming more challenging as the number of clusters running cloud-native applications continues to multiply rapidly. Challenges range from allowing in only legitimate traffic and enabling least-privileged communications between services to defend against attacks moving laterally between clusters, to validating how a workload is operating within the expected guardrails.
Watch Now

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now