Error loading player: No playable sources found

InfoSec in the Enterprise

Date
June 12, 2013

IT Security is a challenging and volatile landscape of constantly emerging threats that requires responsive counter-measures. And nothing is more important today than safe-guarding an organization’s critical data and systems – especially as more users move to the cloud, looking to connect “everywhere, all the time!” So what are the latest security threats, and how can current products and strategies help address and mitigate these risks? Topics covered will be driven by participant input. Bring your questions; we'll have answers in this lively "unconference" session.

Objectives:
  1. What are latest IT security trends and threats?
  2. Essential steps all users should take to ensure their systems and data are fully protected.
  3. How to best protect data and applications when moving to the cloud and mobile devices.

Speakers

Speaker Image for David Cieslak
EVP, Chief Cloud Officer, RKL eSolutions, LLC
Speaker Image for Dan Schroeder
Dan Schroeder, CPA.CITP, CIPP/IT, CISA, CISM, PCI QSA, ISO 27001 Auditor
Partner, Information Assurance Services, Habif, Arogeti & Wynne, LLP
Speaker Image for Steven Ursillo
Partner, Risk Accounting and Advisory, Information Assurance and Cybersecurity, Cherry Bekaert

Related Products

Thumbnail for Cybersecurity Risks for Governmental and Not-for-Profit Organizations
Cybersecurity Risks for Governmental and Not-for-Profit Organizations
In today's digitally connected world no organization is immune from a cyber attack. All organizations depend on information and technology to achieve their goals. Governmental and Non-profit organizations are no exception…
Thumbnail for Unlocking Potential: Strategies to Extract Maximum Value from SOC Reports
Unlocking Potential: Strategies to Extract Maximum Value from SOC Reports
Join us for an in-depth discussion on simple strategies that can be used by service auditors and service organizations to transform a check-the-box SOC engagement into a highly collaborative, value-driving compliance program…
Thumbnail for Digital Assets and Beyond
Digital Assets and Beyond
Digital assets and blockchain have created new opportunities to accomplish your mission, make investments, as well as fundraise. Join us as we explore recent industry developments, including updates from regulators and standard-setting bodies…
Thumbnail for Cybersecurity Risk Management Strategies for Emerging Cyber Threats (TCH, TPR)
Cybersecurity Risk Management Strategies for Emerging Cyber Threats (TCH, TPR)
Learn how to navigate the intricate and evolving landscapes of cloud and application programming interface (API) security, artificial intelligence (AI), zero trust, identify and access management (IdAM), internet of things (IoT), and more in this insightful session…

This site uses cookies to store information on your computer. Some are essential to make our site work, others help us improve, the user experience. By using the site, you consent to the placement of these cookies. Visit our Privacy Center to learn more.