lunes, 16 de noviembre de 2015

Agenda Webinars Ciberseguridad: IT-LATINO.net

.
16 de Noviembre, 2015
Agenda Webinars CiberseguridadEn español y en inglés

Webinar Externo

17-Nov-2015
Sichere Anmeldung ist elementarer Bestandteil der IT-Sicherheit, gleichzeitig sind Passwörter unsicher und aufwändig zu managen. Security-Verantwortliche sind daher auf der Suche nach moderner starker Authentifizierung, welche sich kostengünstig, unkompliziert und ohne großen Aufwand in die bestehende IT-Landschaft ... Leer más »


Webinar Externo

17-Nov-2015
Attackers develop custom malware and use advanced tactics that are difficult or even impossible to detect using conventional detection mechanisms. This becomes evident when on average we are finding that attackers are able to stay on the ... Leer más »


Webinar Externo

17-Nov-2015
The enterprise computing environment is rapidly transitioning to support an increasing demand for unmanaged mobile devices, remote workers, partners, and vendors to easily access corporate resources. The resources themselves are becoming increasingly distributed in "the cloud". ... Leer más »


Webinar Externo

17-Nov-2015
2015 has been a huge year for malware. There was some interesting information revealed at Black Hat 2015 that we're going to delve into during this webinar. We will specifically look at how the windows software update ... Leer más »


Webinar Externo

17-Nov-2015
If you still think Mobile Security is a thing of the future--think again. Millions of mobile devices worldwide were exposed in 2015 to vulnerabilities and advanced cyber-attacks including: No iOS Zone, XcodeGhost, Stagefright and SwiftKey to name ... Leer más »


Webinar Externo

17-Nov-2015
With Varonis DatAnywhere, you can give your employees secure remote access while leveraging your existing storage infrastructure, permissions, and Active Directory. Join this FREE webinar where we’ll discuss: The risks of trusting corporate data on a 3rd party cloud ... Leer más »


Webinar Externo

17-Nov-2015
Enterprise IT and security experts are under increasing pressure to respond to complex network changes to keep up with growing business demands. Lack of network visibility hinders the ability to deliver services and applications with the security, ... Leer más »


Webinar Externo

18-Nov-2015
Flexera Software just released Vulnerability Intelligence Manager 2016 - the first of the former Secunia products to be released under the Flexera Software brand. Join us for an introduction and demo of Vulnerability Intelligence Manager 2016 and ... Leer más »


Webinar Externo

18-Nov-2015
The stakes have never been higher as businesses attempt to protect their assets from a barrage of threats that continue to grow in frequency and sophistication. These efforts have traditionally centered on perimeter-based cyber defenses. Intrusion detection ... Leer más »


Webinar Externo

18-Nov-2015
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications. This webinar ... Leer más »


Webinar Externo

18-Nov-2015
It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s ... Leer más »


Webinar Externo

18-Nov-2015
It’s often a challenge to address the ICS cyber security conversation in an organization that has yet to suffer a cyber incident. While the issue of defending against traditional IT cyber breaches goes uncontested ICS owner/operators still ... Leer más »


Webinar Externo

19-Nov-2015
Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new ... Leer más »


Webinar Externo

19-Nov-2015
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt. ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie ... Leer más »


Webinar Externo

19-Nov-2015
Addressing information security threats isn’t always easy, especially with different technologies providing different solutions. How can you prove a solutions value to your business even before taking it on? Join experts from Boldon James and Forrester ... Leer más »


Webinar Externo

19-Nov-2015
You're invited to join us on Thursday, Nov. 19, to be among the first to see how ThreatSecure Network, which detects advanced threats and network anomalous behavior, is integrating with Splunk to make powerful big data capabilities ... Leer más »


Webinar Externo

19-Nov-2015
It’s time to plan for 2016’s E-rate applications! With the significant changes to the program as a result of the E-rate Modernization Orders, funding for 2016 is at an all-time high. However, what are the best ... Leer más »


Webinar Externo

19-Nov-2015
We know that “What happens in Vegas, stays in Vegas” is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network? If you’re ...Leer más »


Webinar Externo

19-Nov-2015
A recent Forrester Consulting survey revealed that while organizations initially rated all Next Generation Firewall features as high priority during evaluation, only two features were actually used in more than 50% of deployments. Respondents cited configuration ... Leer más »


Webinar Externo

20-Nov-2015
How can companies effectively measure their company’s risk of a data breach? What security metrics are most important when it comes to determining breach risk? How do different types of security compromises, whether botnet infections or brand ... Leer más »

No hay comentarios:

Publicar un comentario en la entrada

Te agradezco tus comentarios. Te esperamos de vuelta.