Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.
Don't be caught off guard when your auditors show up and start asking internal control questions that you can't answer. In this roundtable session, listen, learn, and share your experiences around managing your internal control system with your ERP system and what to be prepared for BEFORE the auditors show up. There are always tips to learn from others in the compliance area and this session traditionally has lively dialogue, so don't miss this opportunity to prepare for your next audit.
Mobile devices and applications are redefining business, revolutionizing productivity and driving competitive advantage. But as the volume of mobile applications increases, so too are mobile exploits. In the rush to enter the mobile software market, are we taking shortcuts that force us to repeat sins of the past? Like caching sensitive data, incomplete encryption and simple mistakes in coding? Don't let old-school vulnerabilities allow hackers to resurrect previously obsolete malware and exploits. With the experience of more than 1,400 incident response investigations, thousands of penetration tests and hundreds of application security tests, Trustwave SpiderLabs' Charles Henderson will show IT, security and development teams how to make sure they're not leaving sound security practices and due diligence behind as they develop new mobile applications.
The HITECH Act created new categories of business associates that included health information organizations (HIO), these days referred to as HIEs, and health insurance exchanges (HIX). OCR is preparing to make sure these business associates follow the HIPAA rules.
The omnibus rule compliance date is rapidly approaching. If you’re an HIE or an HIX, it’s time to make sure all of those policies are in place, the workforce is trained and all of those other tasks that pave the road to HIPAA compliance. This also includes, among other things, reaching out to all of your covered entity customers and negotiating that business associate agreement, testing security incident response plans and that business continuity plan. You will walk away with a solid understanding of the not-so-new privacy and security requirements and practical information you can use to ramp up your compliance efforts in preparation for the September 23, 2013 omnibus rule compliance deadline.
While a key driver for adapting security technologies, compliance is still a huge burden for most organizations. In the presentation we will discuss novel approaches to both lower the cost of compliance and derive relevant business value from the process. Changing the compliance process from a periodical manual process into a continuous automated process ensures real time visibility into your compliance posture as well as the ability to react in real time to compliance issues rather than just after the fact. By overlaying the information collected with your enterprise IT asset model, the real time compliance information can also contribute to business driven risk management and help in making the right investment decisions in information security.
Establishing PCI DSS compliance can be extremely resource intensive. For medium to large organizations, the many tasks involved in documenting, tracking and auditing network security procedures manually can take days. With an automated firewall operations, auditing and compliance solution, companies can substantially reduce the time and cost of PCI DSS compliance as it applies to the management of firewalls, routers and related network security infrastructure. Learn how to reduce the amount of time required for audit preparation by more than 50%, while enabling continuous compliance with the PCI standard.
Compliance with security regulations, standards and requirements is an ever-increasing presence impacting how business is conducted. These regulations are designed to compel organizations to effectively manage information risk and require a concrete method for protecting assets. Conducting a risk analysis is the first step in this process.
The primary focus of the webinar will review a proven risk analysis methodology and approach for effectively managing information risk.
Automation is key when it comes to production. The same is true for malware. Malware production has moved on from the traditional manual method to a more efficient automated assembly line. In this talk, I will take the audience on an over-the-shoulder look at how attackers automate malware production. Discussion will focus on the tools and methodologies the attackers use to produce thousands of malware on a daily basis. The talk will then conclude with a live demonstration of how malware is produced in an automated fashion.
The HP Security Research team (HPSR) is hard at work monitoring the threat landscape for new campaigns, profiling actors to understand their motivations, identifying the tools they use and determining how credible certain threats might be. It’s part of a long-term strategy for developing a new threat intelligence-sharing model. Why is that important? It will provide real-time info from the larger security community-- enterprises like yours, industry security organizations and security vendors-- that can be used to automate and catch these breaches immediately.
Learn about HP’s findings, including these culprits: injection flaws, DDoS, various phishing techniques and zero day vulnerabilities. How can you address the inevitable breaches that will occur?
Antivirus only stopped 49% of malware in 2012. Is your data safe against the malware tools being deployed by cyber-criminals? Today’s hackers are using targeted attacks, drive-by downloads and exploiting human error to access your organization’s intellectual property. IT Security’s ability to move from reactive to proactive security involves deploying both intelligence and policy based protection. Full protection for both physical and virtual environments requires an integrated, layered defense on the endpoint. Join us to learn best practices and strategies for unrivaled security and blazing performance to defend your organization against today’s complex threats.