EGUIDE:
In this infographic, learn five steps to implement a risk-based security strategy that naturally delivers compliance as a consequence of an improved security posture.
EGUIDE:
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. In this expert e-guide, learn how to update your IR process.
PRESENTATION TRANSCRIPT:
In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
WEBCAST:
Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
PRODUCT DEMO:
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
WHITE PAPER:
This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
PRESENTATION TRANSCRIPT:
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more.
PODCAST:
Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
EZINE:
In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.