REGISTER

email 14 48

ponemon

13 Aug 2009 11:00 am Presenting Mike Spinney, Senior Privacy Analyst, Ponemon Institute

Social Media impact and implications for corporate privacy

13 Aug 2009 6:00 am

Presenting Cameron Craig, DLA Piper, Partner Technology and Media

Cameron Craig is a Solicitor at the Supreme Court in England and Wales 

13 Aug 2009 4:00 am Presenting Ajit Jaokar, Futuretext, Founder and Author

Smart Grids are in the news considering the Obama administration impetus for broadband stimulation. The starting point

trusted

8 Sep 2009 12:00 pm Presenting Al Zollar, IBM; Gerry Gebel, Burton Group, Ken Blossom, Tivoli

Burton Group Vice President and Identity and Security expert, Gerry Gebel,IBM Tivoli General Manager Al Zollar and IBM Trusted Identity Vice President Kent Blossom discuss . .

outof

28 Jul 2009 6:00 pm Presenting Peter Tapling, President & CEO, Authentify,Inc

In the context of smaller budgets and more sophisticated security exploits, many entities are turning to out-of-band authentification (OOBA)to strengthen their Identity and Access Management strategies . .

fivekeys

28 Jul 2009 3:00 pm Presenting Paul Engelbert, VP, Global Security Management Practice, CA Services.

Identity Lifecycle Management is a comprehensive approach to managing user identities throughout their lifecycles. An effective identity lifecycle management approach should greatly assist corporations in improving efficiency, achieving tighter security controls, and ensuring continuous compliance.

federated

28 Jul 2009 1:00 pm Presenting Dr. Michael J. Mestrovich, President of FiXs

Many visions, definitions, strategies and concepts on how "federation" should or would work currently abound when discussing Identity Management scenarios. .

courion

28 Jul 2009 12:00 pm Presenting Chris Sullivan, Courion, Vice President of Customer Solutions

Ensuring that the right people have the right access and are doing the right things across a complex enterprise can be a dauniting challange. 

identity

28 Jul 2009 10:00 am Presenting Matthew Gardiner; Director of Product Marketing at CA

What is it and why is it a key security foundation for SAAS and the future of the web?

Mathew Gardiner is a recognized industry leaded in the security management and IAM markets worldwide.

optimising

28 Jul 2009 9:00 am Presenting Phil D'Angio, VeriSign EMEA, Head of Business Development

Making PKI and Two Factor Authentication simple and cost effective: Hundreds of public and private organisations use PKI and One Time Password (OTP)credentials to secure transactions and interations with their employees, customers and business partners every day.

intellect

28 Jul 2009 7:00 am Presenting Geoff Llewellyn, Intellect UK & RPM Business Consulting Ltd, Board

Training in Economics and Social Science at London and Oxford Universities,Geoff's business experience spans both public and private sectors unified by a focus on change management . .

thefuture

28 Jul 2009 6:00 am Presenting Patrick Curry, Clarion Identity Ltd, Director

The future of IAM is Federated ID and Access Management, but the issues are much more than technological. The rate of change in society is disturbing . .

consistent

28 Jul 2009 5:00 am Presenting Gilles Trachsel, Product and Solutions Marketing Manager, Juniper Network

Juniper offers the industry's only high-performance adaptive threat management solutions that leverage a dynamic cooperative product portfolio and network-wide visibility and control to increase the security. 

thuman

28 Jul 2009 4:00 am Presenting Martin Smith MBE, The Security Company Limited, Founder

Martin Smith has led a fasciniation and varied 25 year carrer in the workl of security and is now one of Europe's most experienced corporate IT security practicioners. . 

practical

13 Aug 2009 9:00 am Presenting Toby Stevens, Director, Enterprise Privacy Group

Privacy and Data Protection have risen to the top of the Information Governance agenda, yet the processes to ensure compliance and proactive risk management are poorly understood by many organisations.

Much of the value of BRMS is achieved when it is combined with a larger SOA strategy and BPM. This video demonstrates clear requirements for reuse using the multichannel use case for retail banking.

Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions. Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits

In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success.

(Archived)This webinar and service catalog demo will show you how Numara FootPrints Service Catalog will help your organization quickly provide an attractive menu of services tailored to your customers while providing transparency of service costs - all integrated into your service management workflow.

learn

Presenting Martin Holzke, Director & Author, SoftQualm

Even more businesses get involved in on or other form of auditing, whether its finance(Sarbanes-Oxley, SAS70 etc.) or quality (ISO 9000, Six Sigma etc.)related to mention only those two areas . . .

problems

Presenting: Jason Keogh, CTO and Founder of iQuate

Traditional IT inventory and audit packages are invaluable for analyzing risk across the IT estate. In effect they widen the audit universe . . .

audit_and_control

Presenting: Barry Lewis, co-author: Wireless Networks for Dummies; Cerberus ISC

Secure Mobile Computing: Audit and control of memory sticks to Smartphones . . .

howcc

Presenting Paul Reymann; CEO of Reymann Group

Compliance used to be a periodic and mostly manual project driven by audit dates and deadlines. But those days are gone . . .

cc

Presenting: Brandon Dunlap, Managing Director of Research, Brightfly

Unlike Y2K, which came and went, the recent spate of regulatory actions have accumulated on American companies like barnacles. . .

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top