Security - Podcasts and Videos

Webinar: Secure Your High-Risk Data

What’s the key to a data security plan that keeps your data safe and your organization out of the headlines? To remain current and flexible in how you process and retain...

Webinar: Prepare to Privacy-Proof Your AI Technology

Data privacy regulations and AI technologies might not seem like a logical pairing at first glance. However, with the right checkpoints in place, you can make your privacy...

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Webinar: Improve Cybersecurity Through Effective Policy

Many organizations have cybersecurity policies in place but are unsure of their effectiveness. Learn how Info-Tech can help improve your policy suite to align with best...

Webinar: Reduce Risks With a Quantitative Approach to Privacy Compliance

The privacy compliance landscape is constantly shifting. Learn how to take a quantitative, operational approach to reducing your organization's privacy risk.

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening of...

Webinar: Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Adjust your security strategy with the current priorities and tackle initiatives that can reduce the suddenly larger...

Video: Security Architecture Recommendation Tool

This video acts as a virtual tour through the Security Architecture Recommendation Tool. Use it to gain a better understanding of the purpose and functionality of the tool.

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance hospital IT security compliance.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us