Upcoming Webinars
Webinar Archives
Outsmart Hackers with Deep Learning Artificial Intelligence (AI)
Date: Sep 27, 2016
View webinar
Join us on September 27th to learn how AI evolved from old rule-based systems to state-of-the art deep learning, understand key differences between machine learning and deep learning, discover the unprecedented results exhibited by applying deep learning in various domains, hear background on the first application of deep learning AI to cybersecurity, and learn how deep learning enables real-time prediction of unknown threats with unmatched accuracy.

Choosing The Right Data Encryption Strategy For Your Enterprise
Date: Sep 22, 2016
View webinar
As more enterprises fall victim to cyber breaches, many IT security experts say that data encryption is the best solution to protecting critical data. But what's the right encryption strategy for your organization? In this webcast, top security experts will discuss critical issues in choosing an encryption strategy. You'll get insight on questions such as whether to do full-disk encryption or file encryption; which encryption standards to use; how and when to do encryption for data in motion as well as data at rest; and how to manage encryption keys in your IT environment. Attendees will leave the session with a list of key questions to address when developing an encryption strategy, as well as a general understanding of the tools and technologies currently available.

How to Develop an Effective Ransomware Defense Strategy
Date: Sep 20, 2016
View webinar
In this comprehensive webcast, industry experts will discuss how your organization can build defenses that will help you prevent being infected by ransomware in the first place. The experts will also describe scenarios and give insight to help you decide what action you should take when facing an attack.

Decoding Ransomware: How to Reduce Your Risk of Attack
Date: Sep 14, 2016
View webinar
Everyone is dependent on the online world, and that access makes all of us potential targets for ransomware. Attackers will target anything (and anyone) with access to data that can be monetized - no one is immune. Attend this webinar and you will learn how ransomware works, what makes everyone a target, the anatomy of Locky and a shadow copy attack, what you can do today to minimize the ransomware risk to your organization.

In the Applications Economy - the Best Time for Downtime is...Never!
Date: Sep 13, 2016
View webinar
Remember "five 9's" and the effort to reduce the amount of downtime your customers had to endure? Well, today, people accessing your applications won't tolerate any downtime. In this webinar, you'll hear from thought leaders about insight and research on the expectations, challenges, and opportunities for IT when it comes to data protection and, ultimately, business performance. These days, it's not about how much downtime you can get away with - any amount of downtime can lead to a loss of productivity, revenue, and customer confidence. How can IT leaders be rock stars and not one-hit wonders? You'll learn about the most important considerations when improving or revamping an always-on strategy.

Cybersecurity: Tips, Myths & Pitfalls
Date: Sep 08, 2016
View webinar
Join us on September 8th for a webinar where Lockheed Martin cybersecurity experts will share practical, real-world tips on tackling the top three myths encountered while working with fortune 500 cyber teams. You will leave with clear direction on how to apply lessons learned from the anecdotes shared, to build your world-class network defense organization.

How Colleges and Tech Are Grooming Analytics Talent
Date: Sep 07, 2016
View webinar
In this interview you will learn about the types of programs available online and on campus for professional development and certifications, how technical training and the application of data in business are being integrated into curricula, where there are opportunities for internships as part of business/university collaboration, and how businesses and universities can work together to build a talented workforce.

How to Build a Successful Insider Threat Team
Date: Sep 07, 2016
View webinar
Join us for this enlightening webinar where you'll get insight into what to consider when building your insider threat team, how to run an insider threat program, why insider threat teams need to analyze both structured and unstructured data, and how to ensure employee privacy while also protecting your organization.

API vs. Proxy: Understanding How To Get the Best Protection From Your CASB
Date: Aug 31, 2016
View webinar
The use of a Cloud Access Security Broker (CASB) can help to secure your full cloud security footprint, but not all CASBs are created equally. Some use API-mode, and others use proxy-mode. Does it really make a difference? Which implementation method should you choose? When you attend this webinar on August 31st you will learn the pros and cons of API and Proxy-based CASBs and how to protect SaaS, IaaS, and PaaS against threats in the cloud.

Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.
Exclusive: Inside the GETCO Execution Services Trading Floor
Exclusive: Inside the GETCO Execution Services Trading Floor
Advanced Trading takes you on an exclusive tour of the New York trading floor of GETCO Execution Services, the solutions arm of GETCO.