Videos
-
Gearing up to meet GDPR compliance requirements
In this webcast, attorney Nicholas Merker discusses the necessary steps companies should be taking to meet the EU's looming GDPR compliance requirements.
-
GDPR rules putting a spotlight on consumer data privacy
Nick Merker, a partner at Ice Miller law firm, discusses how GDPR rules are influencing data privacy efforts and offers tips about how U.S. companies can remain GDPR compliant.
-
Mobile endpoints require new look at cybersecurity awareness training
In this webcast, learn how non-traditional mobile endpoints are forcing organizations to re-examine their data protection techniques, including cybersecurity awareness training.
-
Q&A: Mitigating enterprise security threats
Security expert Georgia Weidman explains how enterprise mobility and the IoT are fueling enterprise security threats and offers pointers on fortifying cybersecurity strategies.
-
Modern enterprise cybersecurity further complicated by mobility, IoT
In this webcast, data security expert Georgia Weidman discusses how changing network perimeters create numerous complications for enterprise cybersecurity strategies.
-
Corporate network: Assumptions vs. reality
Security expert Georgia Weidman explains the assumptions versus the realities of corporate network security, and highlights the biggest risk factors facing modern enterprises.
-
The evolution of technology and IoT
In this webcast, CISO Demetrios Lazarikos discusses IoT's significance in the evolution of technology and its influence in consumers' everyday lives.
-
IoT security issues and vulnerabilities
In this webcast, CISO Demetrios Lazarikos explains the fear stemming from IoT security issues such as exploitation.
-
IoT cybersecurity: Q&A
In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices.
-
Webcast: Developing the information security maturity model
In this webcast, CISO Demetrios Lazarikos discusses the information security maturity model and shares a brief history of companies' approach to information security.
-
Corporate ignorance remains a big cloud information security risk
Despite numerous advancements in cloud-specific data protection technology, some companies remain in the dark about their cloud information security responsibilities.
-
Tabletop cybersecurity exercises essential to infosec training
In this video Q&A, representatives from Delta Risk LLC, discuss why tabletop cybersecurity exercises are hugely beneficial to companies' infosec training programs.
-
Information security role moving beyond tech expertise
As business operations become increasingly digitized, companies and their CISOs have had to rethink how the information security role influences company culture.
-
Governance, compliance integration could be key to C-suite GRC buy-in
In part three of this webcast, Jeffrey Ritter outlines hypothetical case studies to depict the intersection of governance and compliance process design.
-
Generating wealth from compliance records management
As analytics data draws top dollar, companies can realize new sources of business revenue by integrating compliance records management into their IT design lifecycle.
-
Compliance business processes and records management drive revenue
As regulators increasingly seek proof of data integrity, company leaders are realizing that strong records management and compliance business processes can be a revenue driver.
-
Webcast: The evolution of compliance functions, data governance
In part one of this four-part webcast, Jeffrey Ritter explains how compliance functions and their relation to information governance design have evolved in the digital age.
-
Merge big data governance with data validation to create new revenue
Information governance expert Jeffrey Ritter explains how big data governance and effective data validation can create new streams of revenue for businesses.
-
Data velocity: Why increased transparency saves time and money
Information governance expert Jeffrey Ritter explains how information transparency is proportional to data velocity, and why increased velocity can save businesses time and money.
-
Big data mining: Using information governance to create new wealth
Information governance expert Jeffrey Ritter explains how big data mining can be used by businesses to create new wealth by uncovering readily available, valuable intelligence.
-
Data provenance and the profitability of well-governed information
Information governance expert Jeffrey Ritter explains how businesses can gain profit and operate more efficiently by understanding their data provenance.
-
Managing unstructured data vital to digital age info governance
Managing unstructured data is crucial for businesses in the digital age, and integrating automated information governance processes can help.
-
Governance tactics to reduce cybersecurity vulnerabilities
Companies' huge data volumes create numerous cybersecurity challenges, but a strong governance program provides a big boost to data protection efforts.
-
Data governance for legal and regulatory compliance
Digitization is forcing companies to make big changes to information governance processes to ensure data maintains legal and regulatory compliance.
-
Information security monitoring, analytics for the digital age
In this webcast, learn automated information security monitoring and analytic techniques to protect data in the face of rapidly evolving cyberthreats.
-
Network growth complicating information security
In-Q-Tel CISO Dan Geer discusses how the expanded scope of the Internet and corporate network growth is complicating modern information security processes.
-
End-user security awareness first line of data protection defense
As data threats continue to proliferate in scope and number, end-user security awareness is essential to corporate information protection.
-
Making the business case for cybersecurity spending
Cybersecurity has become essential to protect data assets, but it is also helping businesses ensure corporate information is accurate and reliable.
-
Reduce information security costs with smart strategy, personnel
Facing online threats can be expensive, but embedding data protection into corporate strategy and training can help reduce information security costs.
-
Creating a 'culture of security' requires new look at business priorities
Companies are striving to make data protection a priority, but doing so requires business leaders to reconsider security pros' roles in corporate success.
-
Mobile application vulnerabilities remain a forgotten security threat
Despite an increased focus on data security protection, mobile application vulnerabilities are still often overlooked by both businesses and consumers.
-
Information security processes and procedures vital to business success
As information security becomes essential to business success, companies are being forced to reexamine their approach to data protection strategy.
-
Which SaaS and app encryption option is best for your business?
Securosis founder Rich Mogull analyzes encryption options, such as SaaS encryption, application encryption and tokenization in part three of this webcast.
-
Key management and distribution vital to encryption system
In part four of this webcast, Securosis founder Rich Mogull examines the various key management and distribution options for effective cloud encryption.
-
Cloud compliance, data protection top reasons for encryption
Securosis founder Rich Mogull discusses various cloud computing models and the top reasons for encryption processes in part one of this webcast.
-
How to choose the right volume storage encryption system
In part two of this webcast series, Securosis founder Rich Mogull discusses the main components of an encryption system and options for encrypting volume storage.
-
Key enterprise mobile management software and technologies
In the final part of this webcast series, enterprise mobility consultant Bryan Barringer lays out the most important mobility management software and techniques.
-
BYOD best practices call for mobility governance team
In part two of this webcast series, enterprise mobility expert Bryan Barringer discusses BYOD best practices to confront the challenges that accompany mobility.
-
Don't let BYOD legal issues sink your BYOD initiative
Companies best be aware of the legal issues that accompany their BYOD initiatives, mobility consultant Bryan Barringer explains in part one of this webcast series.
-
Keep security controls scalable, sustainable to adapt to new threats
The constant evolution of data threats is forcing companies to continuously monitor and assess security controls to ensure they can adapt to new risks.
-
Why flexibility tops list of must-have information security skills
Information security professionals can continue to expect more responsibilities as online data protection evolves into a top business priority.
-
Fast-advancing tech makes information security threats tough to grasp
With technology advancing at faster pace than ever before, IT pros are having a hard time recognizing information security threats.
-
Knowing your exact data needs key to cloud service agreements
Before developing a cloud service agreement, companies must first determine their unique data management and e-discovery-specific requirements.
-
CSO: System logging a vital computer security tool
Tenable Network Security CSO Marcus Ranum reveals that data-driven intelligence is not as critical as system logging to security strategy.
-
Use security strategy to offset regulatory compliance challenges
Mako Group CISO Brian O'Hara discusses the top regulatory compliance challenges organizations face today and how a solid security strategy can help.
-
Intelligence-driven security has benefits, but beware its limits
In this video, Vantiv CSO Kim Jones discusses why a lack of hard data makes some iterations of intelligence-driven security not so intelligent.
-
As threats mount, CISOs must rethink information security programs
ISSA founder Sandra M. Lambert discusses how mounting threats drive information security changes, and why data protection is a competitive advantage.
-
Security-related information sharing boosts corporate data protection
Former eBay CISO David Cullinane discusses why new threats make security-related information sharing an integral part of corporate data protection.
-
Making the move to proactive risk assessment and crisis management
Brian Barnier, a keynote speaker at the GRC Summit in Boston this week, discusses the benefits of proactive risk assessment and crisis management.
-
Human- vs. machine-generated data: A cautionary tale
In this ISSA video interview, security architect Evan Davison warns about some snags when analyzing both human- and machine-generated compliance data.
-
The impact of cloud and social media on risk management strategies
More organizations are incorporating the cloud and social media into business processes, changing enterprises’ risk management strategies.
-
The role of metadata management in information governance strategy
In this video, learn the importance of metadata to your organization's records management plan and how it influences information governance strategy.
Photo Stories
-
Tackling top regulation compliance challenges
-
Solutions to help meet mobile device security, compliance objectives
Podcasts
-
Inside Ryder Truck Rental's PCI compliance project
-
Business model risk is a key part of your risk management strategy