46 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Keeping Remote Workers Safe and Your Wo...
Organizations are pivoting to remote work enablement models at an unprecedented scale. As global organizations navigate through this unchartered territory, executing smart security strategies to ensure workers and business data remain secure is a critical priority. Join security strategists Carl Leonard and Mike Smart as they share six security tips to keep employees safe and mitigate security compromise as the global workforce rapidly goes re...
March 25, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Beyond GDPR: America wakes up to privacy
GDPR may have stolen the limelight in 2018, but it could be America’s turn in 2019: With the California Consumer Privacy Act (CCPA) coming into effect in Jan 2020 and a recent Government Accountability Office (GAO) recommendation that Congress consider enacting a federal internet privacy law, big changes could be coming. In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European S...
July 10, 2019
Organizer: Forcepoint
Location: Webcast
Add Favorite
GDPR One Year On- 5 Lessons Learned
We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been? In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made,...
June 19, 2019
Organizer: Forcepoint
Location: Webcast
Add Favorite
Securing Government in an Interconnecte...
The push for innovation has made our world more interconnected than ever. IT advancements in cloud, IoT and mobility have forced interdependency among federal agencies and reliance on various outside vendors and contractors to enhance productivity and ensure efficiency. With innovation comes vulnerability, such as cyber breaches and compromised information - so how can federal agencies stay technologically progressive, but still remain secure?...
April 20, 2016
Organizer: Forcepoint
Location: Webcast
Add Favorite
Reduce Risk & the Administrative Nightm...
Reduce Risk & the Administrative Nightmare: Key Management for Storage Encryption Explosive data growth, sophisticated data breaches, government regulations, and data storage requirements have caused agencies to deploy a combination of storage security solutions. Often, agencies rely on vendor-specific key management, which leads to fragmented, unsecure key stores and policies that need to be managed and maintained individually. Disparate...
June 12, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
June 2, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search