ON DEMAND | The number one challenge, and often the number one oversight, is infrastructure requirements to support your IP Migration. Attendees will learn to design a IP platform that is easy to manage, switch technology advancements and avoid the gotcha.
ON DEMAND Experts will cover file authentication, authorization, and accounting, automated transfer processes and workflows, end-to-end encryption and key management, integration with enterprise security systems, eg SIEM, IdP, AV and DLP, centralized reporting for auditing and end-to-end monitoring
On Demand Transitioning from public to private sector retail security is often a concern of many military, federal agents, police officers as well as security or Criminal-Justice recent College graduates. Providing guidance, sharing ideas and discussing alternatives can help many public professionals to and ease and stress-free transition to private sector security related jobs.
On Demand Learn how to safeguard your applications from the costly, dangerous, and potentially life-threatening consequences that can result from a crashed server taking down your security systems. Specific topics include: degrees of availability, risks associated with of server downtime, less obvious costs you can incur and the different types of availability solutions.
On DemandThe NIST Cybersecurity Framework recently celebrated its First Birthday, and it’s here to stay. This webinar will describe NIST’s approach to cybersecurity risk management, discuss corporate reactions to the Framework, and give you the tools to assess whether the Framework is relevant for your enterprise.
On Demand When responding to a security incident, time is of the essence. As you review your security plan for 2015, a critical component to address is your physical access control system. Get actionable tips that will allow you to take your access control system to the next level this year. The time is now to take your system to the next level.
On Demand Dr. Bob Harkins will highlight the development of The University of Texas at Austin campus safety and security program by discussing the structure, the plans and programs, and the communications systems used at UT. This program oversees the day to day activities of 53,000 students, 17,000 staff and faculty and about 3,000 daily visitors. In addition to handling special events of more than 100,000 people, the campus safety and security team has reacted to a campus shooter, bomb threats, and a wide variety of other emergencies.
On Demand This presentation will provide a comprehensive look inside of the Santa Ana School Police Department, including how security officers work with the local community to mitigate crime on campus. The presentation will include a look at the department organization, function and mission statement followed by an outside Q&A session.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
In the hunt for the next great cybersecurity leaders, are enterprises neglecting an under-tapped source? More women are joining the cybersecurity industry, but there are still myriad opportunities for enterprise security leaders to be advocates and mentors to up-andcoming talent.