Events

Page: 1 2 3

Security is for Suckers - Watch On-Demand Now

Click here to watch.

In this session Jim Stickley discusses how organizations are facing a new type of cyber threat. He takes a step back to discuss the evolution of cyber attacks and what led to the Target breach. Then, you will learn how these past attacks are driving criminals today in a new direction that will eventually lead to the complete and total failure of the social security identification system. During this session, attendees will see firsthand how vulnerable general businesses, including financial institutions, are to the future of cyber attacks. Of course Stickley will also discuss what your organization can and should be doing to prepare for future attacks and how your employees can avoid being the next cyber breach news story.

Click here to watch.

Mapping Information Security Risk to Compliance - Watch On-Demand Now

Click here to watch.

Examiners and regulatory auditors are checking to see whether cyber security threats are properly managed. Recent guidance from federal regulators makes it clear that even the smallest organizations are significant targets for fraudulent activity.

In this webinar, Gerald Beasley, TraceSecurity Security Services Manager and information security expert, will present a tactical outline that ensures your IT security risk management activities are properly aligned with federal guidelines and significant risk scenarios are not missed. You will:

  • Gain insight into the role that even small or medium-sized businesses play in the national infrastructure, and why the federal government is emphasizing this aspect of information security
  • Learn how to ensure that strategic risk management practices are properly connected to the ground-level implementation of IT systems
  • Become aware of specific threat vectors that are important to consider in the current environment

Click here to watch.

Attack and Defense: 5 Timeless Techniques for Protection - Watch On-Demand Now

Click here to watch.

During this educational webinar, you will see five timeless, simple attacks that work far more often than one might think. You will be prepared with details about these attacks, learn how they work and even be armed to test them yourself! But more, you will receive specific and detailed technical advice that arms your organization against these simple attacks and increases the security of your internal network.

Join Josh Stone, TraceSecurity Director of Product Management and information security expert, to learn how you can get the best value from your penetration tests.

Click here to watch.

Automate and Simplify Regulatory Change Management - Watch On-Demand Now

Click here to watch.

The rapid pace of regulatory change, coupled with intensified agency oversight across the globe is forcing organizations to reevaluate their regulatory change management programs. Organizations must be able to ensure they are up-to-date and understand how changes to regulations affect their policies and procedures that have been developed to ensure compliance.

Join Craig Isaacs, CEO of Unified Compliance and Josh Stone, Director of Product Management of TraceSecurity for an educational and informative webinar to learn how to implement a continuous, proactive and systematic program that will allow you to understand, manage and communicate compliance risk from an enterprise perspective in a cohesive and consistent manner.

Learn how Unified Compliance and TraceSecurity have teamed-up to:

  • Simplify, centralize and automate regulatory change and compliance efforts with the only industry-vetted compliance database
  • Identify and eliminate the overlap between compliance requirements from multiple regulations
  • Deliver a single point of control over hundreds of complex regulations, requirements and guidelines
  • Reduce risk and increase transparency
  • Maintain compliance over time through regular, automated updates

Click here to watch.

Four Steps to Create Intelligent Information Security Policies - Watch On-Demand Now

Click here to watch.

Keeping up with information security threats means turning security intelligence into policy rules. 

Organizations often implement policies based on compliance requirements that are written to address a broad spectrum of organizations, some of which may not apply to them specifically and leads to confusion. Over time, even good policies become out-of-date and do not address actual risk. 

Learn how your organization can establish security policies that ensure ongoing compliance and incorporate the appropriate level of security.

Hear Josh Stone, Director of Product Management, explore four steps organizations should take to infuse intelligence into their security policies and ultimately their network infrastructure.

  1. The importance of taking an inventory of assets and completing a risk assessment that establishes a baseline and prioritizes which areas policies must meet
  2. How an organization should set up its security goals with policies in mind
  3. Continuous policy monitoring that ensures alignment with current information security goals, despite the ever-changing network
  4. Benefits of effective intelligent security policies your organization can expect to realize

Click here to watch.

 

Page: 1 2 3