Catalog Search Results
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 21 min.) : digital, .flv file, sound
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 36 min.) : digital, .flv file, sound
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 22 min.) : digital, .flv file, sound
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 33 min.) : digital, .flv file, sound
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Spelling Suggestions
Didn't find what you want? Here are some alternative spellings that you can try.
In Interlibrary Loan
Didn't find what you need? Items not owned by Salina Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request