Information Security Research Library

Powered by Bitpipe.com

Regulatory ComplianceMultimedia

  • Information Governance Symposium: Data governance on the move: Keeping mobile data safe

    Sponsored by: SearchCompliance.com

    Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • SIEM Optimization: Ensuring Compliance and Security

    Sponsored by: LogRhythm, Inc.

    Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

  • EDRM & IGRM: From E-Discovery to Information Governance

    Sponsored by: SearchCompliance.com

    In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.

  • Managing Access Security in a Multi-Perimeter World

    Sponsored by: IBM

    Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.

  • Overcoming the Modern Challenges to Corporate Records Management

    Sponsored by: Iron Mountain

    In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.

  • Best practices in managing requirements in Energy and Utilities industries

    Sponsored by: IBM

    This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.

  • Welcome to Iron Mountain’s National Data Center

    Sponsored by: Iron Mountain

    This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.

  • Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10

    Sponsored by: BlackBerry

    This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.

  • Million Dollar HIPAA Penalties for Healthcare

    Sponsored by: Absolute Software

    The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.

  • Flash: Maximo Asset Management for Healthcare Organizations

    Sponsored by: IBM

    This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold

    Sponsored by: IBM

    One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AlienVault

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Healthcare Networking Classroom

    Sponsored by: SearchHealthIT.com

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • McAfee ePO Deep Command and Intel vPro Technology

    Sponsored by: Intel

    In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.

  • Podcast: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.

  • Tivoli Endpoint Manager: Continuous Compliance In A Distributed World

    Sponsored by: Mainline Information Systems

    Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • Test and simulate rules using WebSphere ILOG Business Rules Management System

    Sponsored by: IBM

    Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.

  • Webcast: Active Directory Recovery with Windows Server 2008 R2

    Sponsored by: Dell Software

    In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.

  • Moving Email Management to the Cloud: Understanding IT Transitions

    Sponsored by: Mimecast

    During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!

  • Scaling Scrum: Lessons from the Trenches

    Sponsored by: IBM

    Check out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.

  • Configuring and Using IBM i's Auditing Functions

    Sponsored by: PowerTech

    Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.

  • Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary?

    Sponsored by: Proofpoint, Inc.

    With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.