Click here to register
Date: Monday, September 29, 2014
Time: 2:00 PM ET / 11:00 AM PT
Legislation and other industry mandates calling on both private and public entities to strengthen IT security tactics and plans are nothing new, but the focus that cyber security attacks and the results they are getting seems to be getting stronger day by day. Indeed, more and more consumers have shown through their actions following attacks that see the exposure or theft of their personal information that they expect the companies with which they deal to be trustworthy shepherds of their data. Given the various ways corporate staff and Average Joes and Janes access data -- from mobile devices to cloud services -- having strong risk management/information security governance plans and supportive technologies in place never has been so critical to an organization's reputation and success.We find out some of the key areas that must be accounted for when bearing in mind today's more risky applications and technologies we all use and learn the right steps to take in order to successfully marry security and compliance requirements.
Jamie Rees, career security practitioner and advocate
Andy Land, Program Director, Product Marketing - Trusteer IBM Security Systems