Cyber Attacks and Security Breaches: Coping with External Threats

Cyber Attacks and Security Breaches: Coping with External Threats
Show More

Related videos

Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…
Cyber Terror and Cyber Risk: What You Need To Know
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and…
Designing and Implementing Enterprise Mobile Strategies
There is no question that businesses are going toward more mobile computing. Mobile solutions enable the enterprise to respond quickly to customer and market demands, increase productivity and improve internal collaboration. In order to maximize the benefits and minimize the risks with mobile solutions, organizations need to plan and implement…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern day computing, plus guidelines for effective implementation of Cloud Computing.…
Effective Global Program Management for IT
Today's technology and business initiatives have broken free of the local enterprise by expanding to involve organizations and workers across the far reaches of the globe. In this report, Paula Wagner, project management expert and co-author of the popular new book, Global Program Management, discusses the rise of global program…
Global Connectivity: Revolutionizing the Way We Do Business
Imagine a world where ubiquitous connectivity joins all global citizens to the people, products and services they need - anytime, anyplace and anywhere. This vision of the not-too-distant future is presented in a groundbreaking book titled, Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business, by author Emily…
Managing Supply Chain Risk
Today's modern supply chains are extremely complex and in large organizations, often involve a web of third-party service providers managing mission-critical business functions and operations. A breakdown at any point in this service delivery chain can be catastrophic. Therefore, enterprises must be "on game" when it comes to building out…
Managing Virtual Teams: Techniques and Best Practices
A key tool enabling global businesses to keep pace, remain competitive and be profitable is the Virtual Team. Managing Virtual Teams is a skill that many leaders struggle with. This course will offer insights and best practices to help managers deal with challenges and maximize their team's true potential. The…
Mobile Application Management: An Introduction
The widespread adoption of mobile devices coupled with an insatiable appetite for new applications by workers, has forced organizations to broaden the scope of their mobile policies and strategies. Today, IT and business leaders must look beyond simply managing mobile devices and include the management of mobile applications. In this…
Mobile Payments: Trends and Insights
Mobile Payment is a rising trend that is impacting the global marketplace and may someday become the "de facto standard" for monetary transactions; replacing your timeworn credit card, checkbook and possibly even cash itself. In this report expert Barry Sloane, CEO and President of Newtek Business Services, explores the world…
Modern Information Systems - IT Infrastructure
Today's modern information systems are difficult for the general business person to understand because the business work is largely managed inside a 'black box.' In this two-part program, technology writer and consultant Roger Grannis clearly explains and simplifies the inner working of modern information systems, enabling the business person to…
Optimizing IT to Meet Business Objectives
How can companies ensure that IT services are directed and optimized to implement critical business objectives? Wendell Jones of Cutter Consortium helps IT managers cope with what has become one of the most difficult -- yet exciting -- jobs in any organization. The program describes techniques that will help IT…