ITO America - Data Security http://www.itoamerica.com Scott Crawford Renee Guttmann Trent Henry Mark Clancy Derek Brink Jon Oltsik Get the Balance Right: A Guide to E-mail Governance http://www.itoamerica.com/index.php?section=webinar&id=729&name=Get+the+Balance+Right%3A+A+Guide+to+E-mail+Governance According to Enterprise Strategy Group research: e-mail, when compared to other business applications, will have the greatest impact on server and storage spending over the next two years and eighty percent of electronic discovery events involves e-mail and associated attachments. Gregory P. Kosinski, Director, EMC and Brian Babineau, Senior Analyst, ESG discuss common e-mail management practices and their drawbacks as well offer opportunities and suggestions for improvement. Raimund Genes http://www.itoamerica.com/index.php?section=webinar&id=729&name=Get+the+Balance+Right%3A+A+Guide+to+E-mail+Governance According to Enterprise Strategy Group research: e-mail, when compared to other business applications, will have the greatest impact on server and storage spending over the next two years and eighty percent of electronic discovery events involves e-mail and associated attachments. Gregory P. Kosinski, Director, EMC and Brian Babineau, Senior Analyst, ESG discuss common e-mail management practices and their drawbacks as well offer opportunities and suggestions for improvement. Jon Ramsey http://www.itoamerica.com/index.php?section=webinar&id=729&name=Get+the+Balance+Right%3A+A+Guide+to+E-mail+Governance According to Enterprise Strategy Group research: e-mail, when compared to other business applications, will have the greatest impact on server and storage spending over the next two years and eighty percent of electronic discovery events involves e-mail and associated attachments. Gregory P. Kosinski, Director, EMC and Brian Babineau, Senior Analyst, ESG discuss common e-mail management practices and their drawbacks as well offer opportunities and suggestions for improvement. Security in a New Era of Threats http://www.itoamerica.com/index.php?section=podcast&id=761&name=Security+in+a+New+Era+of+Threats+ In this podcast, Jon Ramsey, CTO at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware. The story of a CEO whose gmail account was hacked eventually leading to the loss of $1 million will shock you. Forrester - Total Economic Impact Of Trend Micro Enterprise Security http://www.itoamerica.com/index.php?section=podcast&id=761&name=Security+in+a+New+Era+of+Threats+ In this podcast, Jon Ramsey, CTO at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware. The story of a CEO whose gmail account was hacked eventually leading to the loss of $1 million will shock you. Trend Micro's End-to-End Vulnerability Management: A New Approach to Layered Security http://www.itoamerica.com/index.php?section=pdf&id=1193&name=Trend+Micro%27s+End-to-End+Vulnerability+Management%3A+A+New+Approach+to+Layered+Security The growing capabilities of applications and content delivery technologies have created entirely new architectures that have had nothing short of a transformative impact on IT. Addressing Cloud Computing Security Challenges http://www.itoamerica.com/index.php?section=podcast&id=1197&name=Addressing+Cloud+Computing+Security+Challenges Dave Asprey, VP of Cloud Computing at Trend Micro, discusses the unique security challenges that accompany private and public cloud computing. He also offers advice on how companies can begin to evaluate their current cloud computing security efforts and discusses which technology solutions he believes will make an impact on cloud security in 2011. New PCI DSS 2.0 Focus on Virtualization (Thought-Leadership Editorial) http://www.itoamerica.com/index.php?section=pdf&id=1199&name=New+PCI+DSS+2.0+Focus+on+Virtualization+%28Thought-Leadership+Editorial%29 This interview provides insight on PCI 2.0 and an overview of virtualization security best practices from Trend Micro - a member of the PCI Virtualization Special Interest Group, and the leading vendor of virtualization security solutions. Blake Sutherland, compliance expert and VP of Strategic Markets provides insight that will allow technology executives to confidently virtualize the PCI cardholder data environment and beyond. Securing Your Applications: Three Ways to Play http://www.itoamerica.com/index.php?section=pdf&id=1200&name=Securing+Your+Applications%3A+Three+Ways+to+Play Aberdeen's research confirms that the total annual cost of application security initiatives is far outweighed by the benefits of fewer actual security-related incidents, fewer audit deficiencies, and faster time to remediate. But all respondents, from Best-in-Class to Laggards, experienced a positive return on their annual application security investments. Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing http://www.itoamerica.com/index.php?section=pdf&id=1202&name=Capturing+the+New+Frontier%3A+How+Software+Security+Unlocks+the+Power+of+Cloud+Computing This paper describes the concepts of cloud computing and software security within the cloud and what they mean to organizations interested in moving to the cloud (consumers), and to the providers of cloud services. Software Security Assurance Strategies in the Age of Cloud Computing and Increased IT Threats http://www.itoamerica.com/index.php?section=video&id=1268&name=Software+Security+Assurance+Strategies+in+the+Age+of+Cloud+Computing+and+Increased+IT+Threats In this Thought Leadership Interview, conducted at the 2011 CIO Cloud Summit, Roger Thorton, Founder & CTO of Fortify, An HP Company, discusses why companies' data security strategies are falling short and the advantages of proactive (as opposed to reactive) security. Thorton also provides an overview of cloud computing security issues, and defines and explains the advantages of software security assurance. Interview with Founder of CloudChronicle.com http://www.itoamerica.com/index.php?section=podcast&id=1282&name=Interview+with+Founder+of+CloudChronicle.com+ In this interview with Patrick Pushor, CTO and Founder of CloudChronicle.com, Patrick discusses the models of consumption that lend themselves well to cloud computing, covers the challenges regulated industries face when launching cloud projects, touches on the public versus private cloud debate, and names some of the non-technical barriers to cloud adoption. Developing an Information Strategy http://www.itoamerica.com/index.php?section=pdf&id=1293&name=Developing+an+Information+Strategy+ Five vital actions are essential steps in a well-executed information strategy: strategize, align, govern, execute, and optimize. When working in harmony, these actions improve processes, increase productivity, and enhance decision-making. This white paper explores how to use them to develop an effective and broad-reaching information strategy. Balancing Security, Compliance and Cost: the Prescription for Healthcare Email Management: Move to the Cloud http://www.itoamerica.com/index.php?section=pdf&id=1684&name=Balancing+Security%2C+Compliance+and+Cost%3A+the+Prescription+for+Healthcare+Email+Management%3A+Move+to+the+Cloud Learn how cloud-based technologies for core productivity tools such as email and collaboration can help healthcare organizations be more efficient with IT dollars and focus on strategic initiatives such as the EMR. Email Archives: No Longer Fit for Purpose? http://www.itoamerica.com/index.php?section=pdf&id=1685&name=Email+Archives%3A+No+Longer+Fit+for+Purpose%3F This paper examines the difficulties and pain points that organizations encounter as they seek to straddle the conflicting pressures of ever increasing email volumes on one hand, and the need for faster, more flexible accessibility on the other. It also explores what practices and policies are currently in use when it comes to archiving emails, and the ways in which businesses can improve practices in this crucial area. Recognizing Five Sources of High-Profile Data Security Breaches http://www.itoamerica.com/index.php?section=pdf&id=1686&name=Recognizing+Five+Sources+of+High-Profile+Data+Security+Breaches This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning. Storage Anywhere and Everywhere: Dealing with the Challenges of Data Fragmentation http://www.itoamerica.com/index.php?section=pdf&id=1687&name=Storage+Anywhere+and+Everywhere%3A+Dealing+with+the+Challenges+of+Data+Fragmentation The shape of the IT landscape has been evolving over the years and continues to do so. Gone are the days when one or two central systems could meet all of the organization's IT needs. We now have more departmental applications, collaboration and sharing environments, and even cloud-based services in the mix, with access via desktops, laptops, tablets and smartphones that can each store data in their own right. Against this background, are we in danger of losing control of our business information? The Client Mandate on Security http://www.itoamerica.com/index.php?section=pdf&id=1688&name=The+Client+Mandate+on+Security+ Like most other organizations, law firms face new challenges every day when protecting their confidential information. Unlike many other organizations, however, law firms must also protect their client's confidential information. They have long been required to secure private information due to legal and regulatory requirements. Email is a key area of a firm's IT infrastructure when it comes to vigilance for security and governance. The Timeline of a Spear-Phishing Attack on Your Organization http://www.itoamerica.com/index.php?section=pdf&id=1698&name=The+Timeline+of+a+Spear-Phishing+Attack+on+Your+Organization In The Spear-Phishing Attack Timeline, you'll get an inside look at the anatomy of a spear-phishing attack. Step by step and day by day, you'll see where the mistakes get made and how vulnerabilities get exploited - all leading up to that day when the CEO must make the rounds of national news media to admit that customer data has been compromised. Security and Trust white paper http://www.itoamerica.com/index.php?section=pdf&id=1698&name=The+Timeline+of+a+Spear-Phishing+Attack+on+Your+Organization In The Spear-Phishing Attack Timeline, you'll get an inside look at the anatomy of a spear-phishing attack. Step by step and day by day, you'll see where the mistakes get made and how vulnerabilities get exploited - all leading up to that day when the CEO must make the rounds of national news media to admit that customer data has been compromised. eIDAS and E-Signature: A Legal Perspective http://www.itoamerica.com/index.php?section=pdf&id=1698&name=The+Timeline+of+a+Spear-Phishing+Attack+on+Your+Organization In The Spear-Phishing Attack Timeline, you'll get an inside look at the anatomy of a spear-phishing attack. Step by step and day by day, you'll see where the mistakes get made and how vulnerabilities get exploited - all leading up to that day when the CEO must make the rounds of national news media to admit that customer data has been compromised. User Authentication for E-Signature Transactions http://www.itoamerica.com/index.php?section=pdf&id=1698&name=The+Timeline+of+a+Spear-Phishing+Attack+on+Your+Organization In The Spear-Phishing Attack Timeline, you'll get an inside look at the anatomy of a spear-phishing attack. Step by step and day by day, you'll see where the mistakes get made and how vulnerabilities get exploited - all leading up to that day when the CEO must make the rounds of national news media to admit that customer data has been compromised.