State of Nevada Addresses Information Security Challenges through Security Community Approach

July 17, 2019

Information security programs in the public sector are required to overcome substantial, unique difficulties, in addition to addressing those same challenges faced by their counterparts in the private sector. Statewide public-sector information security programs must be broad enough to address controls sets from myriad regulatory requirements, properly and effectively secure a wide range of data types, support the business processes and work flows of dozens of agencies (each with their own mandates and requirements), and adapt to the changes in direction and priority that a regular election cycle may bring.

Spotlight

Identity Finder

Identity Finder provides users the ability to prevent identity theft and data leakage by finding and protecting sensitive data. They have quickly grown to become a leader in identity protection and DLP by helping millions of consumers, small businesses, and enterprises across the world. Identity Finder, LLC was founded in 2001 by innovative security experts and is headquartered in New York City. The management team is comprised of globally recognized specialists that are thought leaders in the security and privacy industry. The Identity Finder Series is the company’s flagship line of data leakage prevention products. Using the company’s proprietary AnyFind technology, Identity Finder intelligently and automatically locates social security numbers, credit card numbers, bank accounts, passwords, driver’s licenses, dates of birth, and other private data that can be used to commit identity fraud. The product searches within files, emails, browsers and other system areas where people might

OTHER WHITEPAPERS
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More

Spotlight

Identity Finder

Identity Finder provides users the ability to prevent identity theft and data leakage by finding and protecting sensitive data. They have quickly grown to become a leader in identity protection and DLP by helping millions of consumers, small businesses, and enterprises across the world. Identity Finder, LLC was founded in 2001 by innovative security experts and is headquartered in New York City. The management team is comprised of globally recognized specialists that are thought leaders in the security and privacy industry. The Identity Finder Series is the company’s flagship line of data leakage prevention products. Using the company’s proprietary AnyFind technology, Identity Finder intelligently and automatically locates social security numbers, credit card numbers, bank accounts, passwords, driver’s licenses, dates of birth, and other private data that can be used to commit identity fraud. The product searches within files, emails, browsers and other system areas where people might

Events