Webcasts and Podcasts

Listen to on-demand webcasts and podcasts featuring leading security and compliance experts as they discuss the latest security trends, strategies, and best practices.

  • Energy and Cyber-Security – What You Need to Know

    Presenter: Paul Reymann, CEO of the Reymann Group

    Cyber-security throughout energy and utility infrastructure and facilities is paramount. The expansion of these computer and communication network interconnections increase the potential for cyber attacks on these systems challenging every company in the bulk power system. While FERC is taking action to close this cyber-security gap, audit findings continue to report that many energy companies are not adequately prepared. Listen to industry experts discuss the events that are driving increased attention and compliance to secure these systems. You will learn: What sleeper provisions are in CIP Reliability Standards; Results of CIP audits and proposed updates for CIP standards; How security and compliance in the bulk power system is evolving; and How to implement appropriate security procedures as defined by FERC and NERC.

    Click here for Webcast

  • Simplifying Security and Compliance in Healthcare Organizations

    Presenter: Paul Reymann, CEO of Reymann Group

    While most organizations agree that the security of sensitive information is a paramount concern, the challenges of complying HITECH Act, HIPAA, and other regulatory mandates are a costly and time-intensive burden for most healthcare organizations and professionals. Listen to industry experts discuss these forward-looking events that are driving increased attention and activities for better information security in the healthcare industry. You will learn: new information on sleeper provisions from new use privacy and security standards; CMS findings that demonstrate struggles with HIPAA; and how security and compliance in healthcare is evolving and ways to implement appropriate security procedures within regulatory mandates.

    Click here for Webcast

  • Top 10 Ways to Get the Most Out of Your Log Data

    Presenter: Dave Shackleford, SANS Institute

    With the complexity of modern IT environments, security professionals are constantly looking for new and better ways to make sense out of the deluge of information they are faced with daily. In addition, some technologies are better than others for helping to meet compliance mandates. Log management tools have steadily gained in popularity over the last few years, allowing security teams to monitor, manage, and report on many types of logs. Security Information Management (SIM) solutions can enrich log information by correlating details and uncovering patterns within numerous disparate data types. Which is the right tool to get the most out of your log data? Each solution has definitive strengths and capabilities that benefit security and compliance teams, and the two genuinely complement each other. In this webcast, find out ten ways that log management and SIM capabilities can be used to manage security and meet compliance goals.

    Click here for Webcast

  • Podcast: Separation or Convergence? The Conflicts Between Log Management and SIM

    Presenter: Mark Nicolett, Gartner Research

    Listen to these industry experts discuss the controversial ins and outs of the Log Management vs. SIM dilemma. Learn why Log Management is a necessary first step but only a baseline technology, recommendations for incorporating SIM into your strategy, and how to make your existing log data meaningful and actionable.

    Click here for Podcast

  • Lessons Learned: Understanding the Recent Rash of Security Incidents

    Presenter: Dave Shackleford, SANS Institute

    This year we have seen a number of high-profile network intrusions that resulted in the loss of critical data. This webcast looks at these cases, discusses lessons learned, and examines several proven best practices. You will learn: How are organizations failing to protect their data? Why is traditional log management insufficient? What tools and techniques can help us better respond to these incidents?

    Click here for Webcast

  • Trends and Tactics in Malware

    Presenter: Gerhard Eschelbeck: Chief Technology Officer and Senior Vice President of engineering at Webroot

    Identify malware trends and evolution, the attack vectors used, and provide insight into changes of behavior, such as the increase in complexity as well as use of advanced techniques to avoid detection. Additional focus will be given to some of the challenges due to rapid creation of large numbers of new malware variants, and malware that caused disruption for user and business in 2009.

    Click here for Webcast

  • What's Next? 5 Key Strategies for Successful Data Protection

    Presenter: Mark Bouchard, Missing Link Security

    As the threat landscape shifts from motivations of fame to motivations of fortune, the volume, speed and sophistication of threats are accelerating. View this webcast for unique insights into next generation threats, the vulnerability and compliance landscape, and practical strategies that can help protect your critical data.

    Click here for Webcast

  • Is Logging Enough? Why Correlation is Critical for Optimal Security and Compliance

    Presenter: Dave Shackleford, SANS Institute

    With larger, faster networks carrying more application traffic, the number of systems creating alerts has risen dramatically. Additionally, most organizations are facing compliance mandates requiring the monitoring and maintenance of logs and audit trails for a specified period of time. While log management may help "check the box" for compliance, it's not the same as true real-time network event management and correlation. With the complexity of attacks constantly increasing, the need for better monitoring and analysis of what's going on across the networked environment has grown.

    Click here for Webcast

  • Top Trends and Best Practices in Security Compliance Management

    Presenter: Tracy Hulver, VP of Products and Marketing, netForensics

    The pressure is mounting to protect valuable data and systems from an expanding array of complex internal and external threats. Learn about the latest trends in the security industry today, the ever-changing myriad of compliance mandates, and how they can potentially impact your organization. Hear insights on how to implement security compliance management to dramatically minimize threats and reduce risk, making compliance itself much easier to achieve.

    Click here for Webcast

  • You've Collected the Logs, Now What? Reducing Risk through Integrated Log Management, Database Monitoring and Real-time Event Management

    Presenter: SANS Institute

    You've collected event logs from security devices, stored them away, and now you can check the compliance box. Logs are important... but only if they are analyzed regularly and in real-time. Otherwise how can you tell if data isn't seeping out of your databases? Without the ability to correlate these events, your monitoring and response capabilities are severely limited. This webcast walks you through a mock incident that tests the monitoring, correlation, and analysis skills of a security team.

    Click here for Webcast

  • Who's Touching Your Data, and What Are They Doing With It? Staying Ahead of Hackers to Increase Customer Confidence

    Presenter: CMP

    In a world of IT security pitfalls and compliance loop holes, is there a better way to help your customers navigate the hazards of doing business everyday? In this webcast, learn opportunities and challenges for Solution Providers as they engage customers on growing IT security and compliance concerns, and continuing and future impact of IT security rules and compliance requirements on security and best practices.

    Click here for Webcast

  • Preventing Data Breaches: Protecting Critical Data through Database Compliance Monitoring

    Presenter: Dave Shackleford, SANS Institute

    Traditional defenses have proven less than effective at protecting your data where it lives - your valuable databases and applications. Although network and host-based security technologies can detect and prevent many common attacks, they often miss more sophisticated penetration attempts such as electronic fraud, insider theft and sabotage, and unauthorized access.

    Click here for Webcast

  • Security Information Management - Insiders Reveal What You Need To Know

    Presenter: Mark Nicolett, Gartner Research

    How can you make sure the right people have access to the information they need quickly while preventing the wrong people from having access to the information at all? Hear trusted advisors discuss how Security Information Management is helping organizations address today's risk management and compliance challenges.

    Click here for Webcast