This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
What can be done to address the shortage of personnel to fill the ever-expanding roster of cybersecurity jobs - from entry-level positions through the CISO role? (ISC)2's John McCumber describes organizational and governmental efforts to lower barriers to entry and build tomorrow's workforce.
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
Employees are the first line of defense for any organization, and Paul Bowen of Arbor Networks believes we don't do nearly enough to deputize them to support our security efforts. He offers tips for using technology to train end users.
Two out of three organizations say that finding qualified cybersecurity professionals is a struggle, a new study shows. And 80 percent of respondents do not feel adequately prepared to defend their organizations. Kathie Miley of Cybrary and Wade Baker of Cyentia Institute discuss how to bridge the cyber skills gap.
"Know your customer" is a familiar refrain in banking circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone actors. In...
By exploring the answers to a series of novel questions (e.g. what do mobile payments and driverless cars have in common?), this talk will illustrate new approaches to preventing and stopping fraud by first illustrating the paradoxes of applying traditional approaches to a variety of new and emerging use cases (cloud,...
IBM explore how to understand and unify endpoint management in education environments with an intelligent, cloud-based solution.
This education focused whitepaper outlines and explores:
A new curriculum for computing in schools;
Common IT challenges for educational institutions;
Ongoing management...
Fraud is a pervasive and insidious attack on all. Financial service organizations, retailers, insurers, healthcare providers, governments - they all bear the burden. What can be done to more effectively reduce this scourge?
In this session, Art Coviello, former CEO of RSA Security, draws on his decades of security...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
While alternative solutions provide incomplete coverage across computing platforms, MaaS360 delivers cognitive UEM across all endpoint types including smartphones, tablets, laptops, desktops, devices designed for the IoT, ruggedized devices and wearables.
Download this security data sheet to learn about:
A smarter...
Simple MDM features are no longer sufficient in meeting today's complex enterprise data security requirements. And as the lines between smartphones, tablets and other endpoints continue to blur, UEM allows IT administrators to consolidate management of all device types, regardless of form factor, platform or OS...
Every day, financial institutions face an onslaught of automated attacks on their web and mobile applications by all types of fraudsters. Some test millions of stolen credentials on login applications to commit account takeover; others create thousands of accounts on account registration applications to validate...
Fraud resulting from cyber theft continues to plague organizations as attackers use more aggressive means of gaining access to critical data more frequently. From the CEO's cellphone to it partners and vendors (and their children), everyone is a target. Business leaders need to understand the implications of choosing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.