Enterprise Risk And Security ConferencesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Enterprise Risk And Security Conferences returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Wireless Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy
 •   Collaborative Tools
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Build Enterprise Risk
 •   Code Enterprise Risk
 •   Disk Enterprise Risk
 •   Enterprise Linux
 •   Enterprise Risk And Email
 •   Enterprise Risk And Info
 •   Enterprise Risk Digital
 •   Enterprise Risk Simple
 •   Method Enterprise Risk And
 •   Pos Enterprise Risk And
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 04, 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

The Best of RSA: Mobile Security by SearchSecurity.com

May 03, 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Compliance, complexity and the need for XBRL: An interview with former SEC Chairman Christopher Cox by IBM

June 01, 2011 - (Free Research)
In this interview with Christopher Cox, a former SEC Chairman, he discusses the key drivers in the US that will be shaping regulatory and compliance reform, how Finance organizations should prepare for this future regulatory environment, and best practices for boards of directors with regard to risk oversight and risk governance. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 04, 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

ERP, business intelligence heads to the cloud by TechTarget

March 18, 2014 - (Free Research)
With all the talk of cloud ERP services, manufacturers hesitant to move to the cloud risks missing cost saving opportunities and streamlined enhancements. How can you reap the benefits of cloud ERP? Complete this brief ERP survey to gain access to our e-guide that delves into the adoption of cloud for business applications, the benefits and risks. 
(RESOURCE)

SharePoint Conference 2009: Steve Ballmer Keynote Address by Microsoft Corporation India Pvt Ltd

December 10, 2009 - (Free Research)
This video covers highlights from the Microsoft SharePoint Conference in 2009, including Microsoft CEO Steve Ballmer's keynote address. 
(VIDEO) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 25, 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

How Big Data Benefits Enterprise Information Security Posture by EMC Corporation

June 25, 2013 - (Free Research)
In this expert guide from SearchSecurity.com, industry experts at the RSA Conference 2013 explain how big data benefits enterprise information security posture and how your organization can take security big data to the next level. 
(EGUIDE) READ ABSTRACT |

IBM Information On Demand Virtual 2010 by IBM

December 15, 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

Managing Security on Mobile Phones by Nokia

January 11, 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

IBM Lotus Sametime Demo: Unified Communications and Collaboration Solution by IBM

March 13, 2009 - (Free Research)
IBM Lotus Sametime software provides an easy-to-use unified communications and collaboration solution with the policy controls and security features your business requires. Check out this demo to see how IBM Lotus Sametime can be used in everyday business situations to quickly and efficiently communicate and drive business success. 
(DEMO) READ ABSTRACT |

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 28, 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

Symantec Vision 2012: 4 Highlights by Symantec Corporation

June 11, 2012 - (Free Research)
This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Extending and Securing Enterprise Communications with OCS R2 and Exchange Server 2007 SP1 by Microsoft

March 06, 2009 - (Free Research)
This presentation transcript features independent expert and Exchange MVP Richard Luckett giving an overview of OCS R2, its most compelling features, advanced configurations, and integration with Exchange 2007 Service Pack 1. Real life examples of how other companies have benefited from OCS R2 are also featured. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Extraprise CRM Support Survey Report by Extraprise Group, Inc.

August 2008 - (Free Research)
This white paper summarizes the results of the survey that was conducted at the Oracle Applications User Group's COLLABORATE 08 conference in April 2008. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

Nip and Tuck: ECM Gets a Facelift by SearchContentManagement

March 2014 - (Free Research)
With mobile, cloud and remote workforce trends changing the scope of content management, 2014 will be a year of growth for ECM systems. 
(EBOOK) READ ABSTRACT |

SCOPIA Conferencing Platform for IBM® Lotus® Sametime® by RADVISION

June 2008 - (Free Research)
The SCOPIA Conferencing Platform with SCOPIA Desktop enables users to create and initiate multiparty audio and video conferences directly from within Lotus Sametime. 
(WHITE PAPER) READ ABSTRACT |

SCOPIA Connector for IBM Lotus Sametime by RADVISION

March 2008 - (Free Research)
RADVISION's SCOPIA Conferencing Platform with SCOPIA Desktop brings advanced conferencing capability to IBM's next generation unified communications enhancing the instant messaging and conferencing capabilities of Lotus Sametime. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts