January 31, 2018
December 7, 2017
This webinar covers how to build a proactive program by mapping out the risk landscape and requirements early; how to lead and drive the process, who to involve and what to include; knowing what to prioritize; conducting a vulnerability assessment and identifying your organization’s critical assets; and offers practical tips for making malicious actors’ jobs harder.
October 2, 2017
Security information and event management (SIEM) systems actively and continuously collect and document security-related events across an organization, providing a security team with alerts about potential threats or vulnerabilities. Such systems are designed to provide a single view across the massive datasets generated daily regarding an organization’s enterprise security, based on parameters defined by an administrator to distinguish between normal and anomalous events.
September 9, 2017
Anthony J. Ferrante, FTI Consulting’s new Head of Cybersecurity addresses the growing cybersecurity threats affecting U.S. businesses today. As the former Director for Cyber Incident Response at the U.S. National Security Council and the former Chief of Staff of the FBI’s Cyber Division, Ferrante has seen cyber risk evolve from a niche focus of intelligence agencies and IT professionals to a true national-level challenge.
October 30, 2016
Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.