Information Security March Madness Week
Free Webinar Series!
March 4th – March 8th 2013
iSECURE is hosting an exciting and educational webinar series to keep you current on the new concerns arising in information security! Webinars will all discuss various types of threats, as well as available solutions and best practices for how you can proactively combat them. Stay in the know!
You have the option to sign up for as many, or as few, of the webinars offered during this Information Security March Madness Week. If you register for any of the webinars listed below, we will also send you an Info Security “Fan Kit” filled with gifts and goodies in appreciation for your participation!
Monday, March 4th:
2PM: “Finally, a Sound and Simple BYOD Solution”: NAC for the BYOD Era. Find out how visibility and control of all devices on your network, IT Automation, doesn’t have to be as hard as it sounds.
Tuesday, March 5th:
11AM: “From Zero to Data Governance Hero": Sustainable data governance is about embracing a methodology and a culture that treats data as a business asset rather than a technology asset, and provides a clear and well defined path to remediate access and ensure that only the right people has access to the right data at all times. Attend our webinar to see a step-by-step plan that can help you improve your current data protection efforts and become a Data Governance hero!
2PM: “How to Secure your Website in 15 Minutes”: Learn how to enhance your Web security by keeping bad traffic out and monitoring against current and emerging threats, meet compliance requirements for PCI 6.6, which is mandatory for any business that processes payment cards online, and improve Web site performance by streamlining online traffic, and monitoring Web transactions for optimal operation.
Wednesday, March 6th:
11AM: “Winning the Network Traffic Battle”: Streaming video is devouring bandwidth, social media is dominating student on-line activities, encrypted traffic is traversing networks, and applications are becoming more complex and sneaky (using multiple protocols, information sources, and content delivery networks) in their effort to deliver content. Join us for an informative webinar as we explore the latest technique being used to solve this problem, application categorization.
2PM: “Simple, Secure Tablet Access to Office Desktop Applications”: With the introduction of smartphones and tablets, laptops no longer seem that portable. Learn how to leave laptops on your desk and use tablets to securely access business applications and documents from anywhere on campus.
Friday, March 8th:
2PM: “Strategies for Preventing Data Breaches and Staying Out of Headlines”: To date, many corporations have been unable to create a security defense system because they have cobbled together technologies that don't integrate in an intelligent and automated fashion. See how this patchwork approach creates loopholes that hackers can exploit, and what you can do to effectively tackle this problem head-on.
© 2012 iSECURE. All Rights Reserved. iSECURE LLC, 115 Sully's Trail, Suite 10, Pittsford, NY 14534 (800) 905-8622 Sitemap