Emerging IT Trends
And Their Impact on Security Policies

WatchIT
Show More

Related videos

Insider Threats: Avoiding the Next Snowden
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations…
Introducing IoT: The Internet of Things - An Explanation of IoT
In this report we'll take a close-up look at the "Internet of Things," also known as IoT. We'll talk about the associated technologies, legal, security and privacy issues. In addition, we'll discuss what the future may hold for our growing interconnected world. By watching this program, professionals will gain valuable…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern day computing, plus guidelines for effective implementation of Cloud Computing.…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Enterprise Security Landscape
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director…
The Role of Technology in Counter-Terrorism
Through the tragedy of 9/11, the Boston Marathon bombings and the recent NSA surveillance controversy, we have become aware of the critical nature of technology in the detection and investigation of terrorist threats and actions today. From biometrics and communication intercepts to airport security and chemical weapons detection, technology is…
Enterprise Security Landscape: Risks and Controls
Part of the Series: WatchIT Auditing Collection
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise…
Rootkits: A Growing Security Threat
Rootkits are malicious programs, that when downloaded, can allow an intruder control over a system without ever being detected. Once installed, Rootkits can enable access to personal information, track a user's Internet activity or even hijack a computer for botnet attacks or spam distribution. In this program viewers will learn…
Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…
Big Data in the Enterprise: An Introduction
Part of the Series: Business Intelligence Collection
IT professionals around the globe are now being challenged to manage, organize and analyze these vast data sets strategically; to identify new business trends, conduct highly-advanced product research and even predict threats to enterprise security. This report will introduce and explore the world of "Big Data" and offer advice and…
Authentication, Authorization and Accounting: Best Practices
It seems that a day doesn't go by when we don't hear of yet another high-profile breach that has made its way to the front page and the nightly news. These events have CIOs and business leaders intensely focused on their security policies and constantly evaluating and reevaluating their defenses.…
Computing Securely in the Cloud
Has a new day dawned where Cloud Computing and security are in perfect alignment? Well, for now, let's just say we're closer to that lofty goal than we had been. With broad acceptance, and the adoption of Cloud platforms by more and more organizations, it seems we've reached a point…