Webinar: Information Security, HR’s Role in Protecting Vital Company and Customer Information

Firms of all sizes have a need to control sensitive information. Some companies may have confidential customer information that if lost could lead to legal liabilities and loss of customer confidence. Other firms are concerned about protecting valuable intellectual property. In either case, HR can play an important role in helping to maintain security. Our one hour webinar will focus on three significant aspects of information security: employee selection, monitoring and controls.This educational webinar has been submitted to the HR Certification Institute (HRCI) for 1 general hour of continuing education credit towards PHR, SPHR and GPHR certifications.When: Thursday, May 15, 2014, 1:00 PM–2:00 PM
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

A DNS Security Architecture as SecOps Force Multiplier

The Domain Name System (DNS) is essentially the central nervous system of the internet—everyone needs it to work because without DNS services, digital business would come to a halt. Cybercriminals know this, too, and use DNS services to launch their attacks while they simultaneously attack the DNS services of their targets.
Watch Now

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

Industrial Cybersecurity: Is Your Facility Protected?

Just last year, cybercriminals attempted to poison the water supply in Florida by hacking into a city’s system. An airplane manufacturer’s confidential customer data files were breached and leaked on the Internet. A major gas pipeline was shut down by a ransomware attack. A major meat producer was forced to close down all its plants. Hackers are now targeting industrial and infrastructure. At the same time, more and more facilities are going to connected operations to empower new efficiencies. How do we keep our facilities protected amid these growing dangers and opportunities?
Watch Now

TW-NL Cyber Opportunity Webinar

In the era of globalization, as the international division of labor goes deeper, the industrial development shifts from “manufacturing economy to service economy” and “from hardware manufacturing to soft manufacturing.” The manufacturing industry aims to enhance its international competitiveness with the added value created by the service industry. As a major producer of global ICT products, Taiwan plays an important role in the security industry supply chain during the China-U.S. trade war. It is high time Taiwan develops “Internet of Things Security” and “Secure Internet of Things” with its complete semiconductor industry supply chain. To grasp this opportunity, Taiwanese manufacturers are striving to become not only product suppliers but also cyber security solution providers by taking advantage of the global cyber security research and development. By offering products with distinguishing cyber security functions to customers based on their needs, Taiwanese manufacturers are expecting to create higher added value.
Watch Now