More from SearchSecurity -- May 2005

This Content Component encountered an error


Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.



Keeping the Oil & Data Flowing
by Mike Mimoso
Oil giant ChevronTexaco has baked risk management into each of its business processes and made data protection an integral part of its practices. It's easy to understand why since the company stores more than 500 terabytes of technical data around oil field exploration activities and generates 350 terabytes each year for seismic projects. Part of ChevronTexaco's strategy involves consolidating its data management policies. In this on-demand webcast, hear how you can find trigger points that indicate your corporate security policies should be updated and why risk assessment results are essential for developing sound policies.
>>  CLICK TO LISTEN TO THIS WEBCAST

RELATED INFORMATION:
>> An SQL injection attack is a major threat to backend data. Get tactics for protecting your sites and information.

>> SearchSecurity's monthly Risk Management Strategies newsletter arms you with real-world techniques for enterprise risk management, metrics and measurement, business continuity, top-line security policies, procedures and guidelines, and standards adoption. Sign up today.

Command, Control, Comply: The Evolution of Security Managment Systems

Learn about the essential characteristics of the latest Security Information Management solutions (SIMs) and how the technology has developed in this expert webcast.

Perspectives: Linux v. Windows
Is Windows really easier to lock down than Linux? A controversial report from Security Innovation has a lot of IT professionals talking. Read what your peers have to say and then share your thoughts on whether the Penguin plays second fiddle when it comes to security.
>> CLICK TO SEE OUR USERS' SOUNDOFF POSTS

RELATED INFORMATION:
>> Click to read security consultant Ira Winkler's analysis



Ping: MassMutual's Bruce Bonsall
MassMutual Financial Group CISO Bruce Bonsall relays the process his organization uses to ensure that security is factored into every IT project. Read how Bonsall learned to speak in a language business folks could understand.
>> CLICK TO READ THE ARTICLE


Identity Management: Managing Federated Relationships
Federated identity management simplifies and protects the online registration and access control process for consumers and extranet partners. SAML is the protocol for leveraging federated relationships. Information Security contributor Dick Mackey goes online with a webcast that demystifies SAML. He also shares technical advice on the dangers of using XML and the extent to which new devices can help you filter out XML-based attacks. >>  CLICK TO PREREGISTER FOR THE WEBCAST

RELATED INFORMATION:
>> Learn more about keeping XML secure with our XML Security Learning Guide.
>> Read about the progress in ratifying security standards like SAML 2.0.


E-mail Security School

Learn tactics for securing your e-mail systems in this three lesson course led by our guest instructor, Joel Snyder. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from SearchSecurity.com. In addition, through our agreement with (ISC)², all CISSPs and SSCPs can earn 1 CPE credit per lesson webcast.
HIGHLIGHTS ARCHIVES
April 2005
This was first published in April 2005

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close