Security Technology & Operations - Videos

7f31ac2817363ee9f8c75c251d23e951 large

Threat Landscape Briefing – September 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data...
C7bce923f08441f614597c1e2f273b67 large

Threat Landscape Briefing – August 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data...
0ad1743c50c4961b92f10c0ec1f5afc5 large

Webinar: Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Adjust your security strategy with the current priorities and tackle initiatives that can...
10ff6a0a287abbe5e0f86947419348eb large

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance...
91a270bd6f8e2fb88e5167c789e7da15 large

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of...
F38115501db8ca3b2c49d77b57e8b5f9 large

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology