Emerging IT Trends
And Their Impact on Security Policies

WatchIT
Show More

Related videos

Insider Threats: Avoiding the Next Snowden
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern day computing, plus guidelines for effective implementation of Cloud Computing.…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Enterprise Security Landscape
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director…
Enterprise Security Landscape: Risks and Controls
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise…
Rootkits: A Growing Security Threat
Rootkits are malicious programs, that when downloaded, can allow an intruder control over a system without ever being detected. Once installed, Rootkits can enable access to personal information, track a user's Internet activity or even hijack a computer for botnet attacks or spam distribution. In this program viewers will learn…
Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…
Big Data in the Enterprise: An Introduction
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and explore the world of "Big Data" and offer advice and…
Authentication, Authorization and Accounting: Best Practices
It seems that a day doesn't go by when we don't hear of yet another high-profile breach that has made its way to the front page and the nightly news. These events have CIOs and business leaders intensely focused on their security policies and constantly evaluating and reevaluating their defenses.…
Intoduction to France's "Right to Disconnect" Law - Advancing the Management Skills of IT Professionals
A new law dubbed the, "Right to Disconnect Law," says that French employers must specify certain hours when workers will not have to respond to, or even check, their work email. The French government says the law will "ensure the respect of rest time and vacation, as well as personal…
Computing Securely in the Cloud
Has a new day dawned where Cloud Computing and security are in perfect alignment? Well, for now, let's just say we're closer to that lofty goal than we had been. With broad acceptance, and the adoption of Cloud platforms by more and more organizations, it seems we've reached a point…
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of a road you cannot see when you are driving, behind…