ON DEMAND | The number one challenge, and often the number one oversight, is infrastructure requirements to support your IP Migration. Attendees will learn to design a IP platform that is easy to manage, switch technology advancements and avoid the gotcha.
ON DEMAND Experts will cover file authentication, authorization, and accounting, automated transfer processes and workflows, end-to-end encryption and key management, integration with enterprise security systems, eg SIEM, IdP, AV and DLP, centralized reporting for auditing and end-to-end monitoring
On Demand Transitioning from public to private sector retail security is often a concern of many military, federal agents, police officers as well as security or Criminal-Justice recent College graduates. Providing guidance, sharing ideas and discussing alternatives can help many public professionals to and ease and stress-free transition to private sector security related jobs.
On Demand Learn how to safeguard your applications from the costly, dangerous, and potentially life-threatening consequences that can result from a crashed server taking down your security systems. Specific topics include: degrees of availability, risks associated with of server downtime, less obvious costs you can incur and the different types of availability solutions.
On DemandThe NIST Cybersecurity Framework recently celebrated its First Birthday, and it’s here to stay. This webinar will describe NIST’s approach to cybersecurity risk management, discuss corporate reactions to the Framework, and give you the tools to assess whether the Framework is relevant for your enterprise.
On Demand When responding to a security incident, time is of the essence. As you review your security plan for 2015, a critical component to address is your physical access control system. Get actionable tips that will allow you to take your access control system to the next level this year. The time is now to take your system to the next level.
On Demand Dr. Bob Harkins will highlight the development of The University of Texas at Austin campus safety and security program by discussing the structure, the plans and programs, and the communications systems used at UT. This program oversees the day to day activities of 53,000 students, 17,000 staff and faculty and about 3,000 daily visitors. In addition to handling special events of more than 100,000 people, the campus safety and security team has reacted to a campus shooter, bomb threats, and a wide variety of other emergencies.
On Demand This presentation will provide a comprehensive look inside of the Santa Ana School Police Department, including how security officers work with the local community to mitigate crime on campus. The presentation will include a look at the department organization, function and mission statement followed by an outside Q&A session.
Not all employees are saboteurs or malicious actors, but without education, unwitting employees could cause just as much damage as a targeted data theft in the long run. Read how to prevent this in the August 2015 issue of Security. Also read how building stronger relationships with local and national law enforcement can aid in school security awareness and response, learn about the dangers of continuing to use old credit card terminals, and see the ASIS International 2015 product review.