• Sponsor Resources
  • Related Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls

Lesson 1:


Sherry provides a glimpse into some of the ways data is breached, how compromised data is used and some tips for InfoSec pros on what to focus on as we battle the evolving threat to the data they protect.

A Look At Information Security

Lesson 2:


This presentation breaks down a modern attack and explains what attackers target and how they execute attacks, all in the context of your need to reassess and reprioritize risk to your organization.

Realign Your Data
Protection Strategy Efforts

Lesson 3:


Sherry describes how a combination of technical controls and user awareness training can help put a dent in phishers’ attempts at spear phishing.

Bring Spear Phishing
Protection To The Masses

Lesson 4:


Better data protection demands foresight and concrete action. Learn why breach training, monitoring and early detection capabilities can minimize damage when hackers attack.

Improve Data Protection
With Foresight, Action

Lesson 5:


Nearly every attack against an organization has its roots in social engineering. Learn five quick pointers to help combat social engineering attacks.

5 Ways to Combat
Social Engineering Attacks

Lesson 6:


How much have you learned about prioritizing your data protection efforts around social engineering attacks? Test your knowledge in this short quiz.

Quiz

Realign Your Data Protection Efforts

David Sherry explains how your organization should react to the shift of organized online criminals from coveting credit card numbers to identity information and how to re-prioritize your efforts in protecting your organization.

TOP

David Sherry
Chief information security officer, Brown University

As chief information security officer of Brown University, David Sherry is charged with the development and maintenance of Brown's information technology security strategy, IT policies and best practices, security training and awareness programs, as well as ongoing risk assessment and compliance tasks. A CISSP and CISM, Sherry has 20 years of experience in information technology.

TOP


Sponsor Resources

IBM is a global technology and innovation company headquartered in Armonk, NY. It is the largest technology and consulting employer in the world, with more than 400,000 employees serving clients in 170 countries. IBM offers a wide range of technology and consulting services; a broad portfolio of middleware for collaboration, predictive analytics, software development and systems management; and the world's most advanced servers and supercomputers. Utilizing its business consulting, technology and R&D expertise, IBM helps clients become "smarter" as the planet becomes more digitally interconnected.

Learn More
  • Top Tips For Securing Big Data Environments

  • NoSQL Does Not Have To Mean No Security

  • Protecting Your Critical Data With Integrated Security Intelligence

  • Three guiding principles for data security and compliance

  • Secure the data that powers your business  with IBM Security Guardium helps analyze, protect and adapt for comprehensive data protection

  • Forrester Total Economic Impact (TEI) Study of IBM Security Guardium

  • Application Security Risk Mgmt: Manage Application Vulnerabilities Effectively with IBM Application Security Risk Management

  • IBM Security Guardium Vulnerability Assessment

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP)


TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Is A Data Breach Warranty Worth The Investment?

  • Breach Detection Systems: Deployment Models That Detect Malware Better

  • A CISO's Introduction To Enterprise Data Governance Strategy

  • Breaches Reignite Intellectual Property Protection



TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111