Security - Videos

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance...

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform...

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of...

Video: Security Architecture Recommendation Tool

This video acts as a virtual tour through the Security Architecture Recommendation Tool. Use it to gain a better understanding of the purpose and...

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful...

Webinar: Prepare to Privacy-Proof Your AI Technology

Data privacy regulations and AI technologies might not seem like a logical pairing at first glance. However, with the right checkpoints in place,...

Webinar: Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Adjust your security strategy with the current priorities and tackle initiatives that can...

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized...

Webinar: 2025 Security Trend Report

To future-proof your security program, you need to understand and plan for emerging threats and trends. In this webinar we will introduce you to...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us