Security Video Library | Page 15


Video Library

  • Performing a third-party risk assessment for compliance

    Afraid of non-compliant business partners? Learn how to perform a third-party risk assessment to prevent non-compliance.

  • Forrester's advice for data governance maturity model

    Forrester Research Senior Analyst Andrew Jaquith gives advice for data governance maturity model success and why enterprises should do more than just follow a standardized set of guidelines to prot...

  • Cluley on Operation Aurora, infosec attacks

    In this video, Graham Cluley, a Security Consultant with Sophos Plc., discusses Operation Aurora and whether information security attacks are becoming more sopisticated.

  • Jaquith on Forrester's Zero Trust Model

    At Forrester Research Inc.'s Security Forum 2010 in Boston, Andrew Jaquith, senior analyst with Forrester, spoke with about the research firm's Zero Trust Model for endpoint secu...

  • How to evolve your compliance program

    This video describes how organizations can effectively interpret particular requirements from regulations such as HIPAA and PCI and implications these interpretations have on compliance activities,...

  • Log management strategies that work

    In this video presentation, Diana Kelley of consultancy SecurityCurve gives expert advice on how to tune log management tools and policies so they pick up on only the necessary events.

  • Adobe: Flash security and the Mapp

    Brad Arkin discusses Adobe's strategy to secure Flash Player and its decision to join the Microsoft Active Protections Program.

  • Adobe: Automatic updates and 'perfect' software

    Brad Arkin discusses Adobe's addition of automatic update downloads for Reader and Acrobat, and why it took Adobe so long to offer automatic updates. Plus he tackles the feasibility of making "perf...

  • Adobe: Bug reporting and the sandbox

    Brad Arkin talks about Adobe's policy on "bug bounties" and why it's decided to play in a "sandbox."

  • Adobe: Transparency and the secure product lifecycle

    Brad Arkin discusses why Adobe created his role, how it engages the security research community and how Adobe has learned that talking about security isn't a bad thing.

  • Face-off: Information security awareness

    Can the security industry learn from the Transportation Security Administration? It may seem like an odd pairing, but both struggle with the challenges of protecting those in their care while maint...

  • Attackers are turning to mobile platforms

    In this interview, Mikko Hypponen, chief research officer, F-Secure Corp. talks about what he sees as the coming mobile security threats.

  • Compliance success video

    By now, most enterprises have established baselines for reporting on foundational IT controls. They've also leveraged control frameworks and resident technologies to assist in logging, auditing and...

  • PCI DSS 1.1: Strategies for compliance

    In this video, Diana Kelley and Ed Moyle of consultancy SecurityCurve discuss the changes that have taken place during the first two years PCI DSS has been in effect, and look forward to potential ...

  • App security for infrastructure security managers

    Video: Get a primer on common application attack methods and an application security framework to help infrastructure security teams.

  • SIEM market overview: Gartner's Mark Nicolett

    Gartner VP and distinguished analyst Mark Nicolett discusses SIEM vendor consolidation, the myth that SIEM is a cost-saving effort and more.

  • The future of hacking and the underground economy

    How is the underground economy evolving, and what can security practitioners do to anticipate and respond to future threats? In this Face-off video, Hugh Thompson and Adam Shostack discuss the best...

  • Face-off: Information security management metrics

    Are metrics useful, or do they just distract security pros from the real issues at hand? In this video, Hugh Thompson and Adam Shostack discuss the necessity of metrics.

  • 419 baiters: Not all scam emails from Nigeria

    Almost everyone has received an email promising riches from African royalty, but not all 419 scam emails come from Africa. Learn how to prevent employees from getting suckered in by these scams.

  • Cyberespionage and cybercrime response

    In this video, Rober Rodriguez, chairman and founder of the Security Innovation Network (SINET), discusses the state of cybercrime and cyberespionage, and what enterprises need to do to secure them...