Data Security monthly marketing update. Please use this update to keep track of upcoming HPE Security – Data Security marketing initiatives including tradeshows and events, webinars, new content and collateral, speaking engagements and more. Please use the embedded program registration links to forward to prospects, partners, customers and others who may want to participate
1. Welcome to the November HPE Security – Data Security monthly marketing
update. Please use this update to keep track of upcoming HPE Security –
Data Security marketing initiatives including tradeshows and events,
webinars, new content and collateral, speaking engagements and
more. Please use the embedded program registration links to forward to
prospects, partners, customers and others who may want to participate.
Follow the quick jumps here or scroll below:
Events | Webinars | Content Syndication | Archived Webinars |
Other Links
Cartes – Nov 17-19 | Paris, France
CARTES SECURE CONNEXIONS is the largest global event
bringing together the key decision makers from around the world
from the payments, finance, mobile, retail, government, identity and
access, telecommunications and data security sectors. Terence
Spies of Data Security will be presenting.
Register Here:
Webinars:
Five Ways of Keeping your Data and Applications Safe in the
Cloud from Top Threats
DATE: November 10, 2015
TIME: 1PM Eastern / 10AM Pacific
About the Webinar:
Cloud computing imposes significant security risks on the
corporation, network, IT and the day to day activities of the business.
Fortunately, this model of enterprise computing doesn't have to be
the high-risk proposition. By thinking of security as an enabler,
instead of an obstacle for cloud adoption, businesses can easily
protect and maintain control of data across multi-cloud environments
while maximizing the business potential of the cloud. During this
webcast we will discuss ways to address the key security challenges
businesses facing as they move to the cloud.
Presenters:Farshad Ghazi and Chris Griffith, HP Security - Data
Security
Register Here:
2. Enterprise Risk – Taming the Devil in the Data
DATE: November 12, 2015
TIME: 1PM Eastern / 10AM Pacific
About the Webinar:
The growth of data is increasing exponentially and organizations are
suffering from volatility across all risk types, and need to re-think
their enterprise risk strategy. At the heart of this strategy is the need
for a single consistent view of the data. Join the ITGRC Forum panel
as they discuss a new generation of risk technologies which use a
holistic approach to data management and achieve functional
competence.
Presenter:Terence Spies, Data Security
Register Here:
Five Risk-free Ways to Move Data & Applications to the Cloud
DATE: November 19, 2015
TIME: See Website
About the Webinar:
While organizations are keen to reap the benefits the cloud offers,
many fall shy of adoption for two reasons: security and control.
Sensitive data must be protected at all stages of its lifecycle, no
matter how much it moves around. At the same time, those charged
with managing that data must have the ability to retain ownership
and authority over provisioning access – a challenge that some
methods have been unable to solve.
Presenter:Mark Bower, Data Security
Register Here:
ContentSyndication
Security First Strategies
Download this custom research report to learn why massive data
breaches drive home the point that a security plan is actually a work
in progress and it is only finished until the next project begins.
The Evolving Era of Big Data
This e-Book, titled “The Evolving Era of Big Data” is produced by
Compliance Week in cooperation with ACL and HPE Security – Data
Security, and provides the reader with useful strategies in the world
of Big Data that compliance and audit executives can use to govern
information effectively.
3. Emerging Technologies For Business Intelligence, Analytics,
and Data Warehousing
This report informs the reader about the emerging technologies that
apply to BI, analytics, and Data Warehousing, plus how emerging
technologies can support innovation in business processes,
customer management, competitiveness, IT best practices, and the
business leverage of data. Sponsored by HPE Security – Data
Security.
Data Lake Adoption and Maturity SurveyFindings Report
This comprehensive study on data lake adoption and maturity
surveys both current and potential users in the marketplace. The
new study from Unisphere Research and Radiant Advisors
documents the key perceptions, practices, challenges and success
factors in data lake deployment and usage. HPE Security – Data
Security is a sponsor.
Osterman Research White Paper
Osterman Research has published a whitepaper titled “Content
Encryption: Key Issues to Consider.” Encryption of electronic content
is an essential best practice, yet is more than a defensive strategy to
protect against data breaches or to comply with regulations.
Organizations that encrypt content can create new business
opportunities that can contribute significantly to their bottom line.
The Disruption of Banking
“The Disruption of Banking” is a new report from The Economist
Intelligence Unit, sponsored by HP that centers on financial
technology, how banks feel about it, and data security.
Archived Webinars
Understanding Security Tokenization and PCI Compliance
In this session our experts will explain how the tokenization system is
secured within the network and how it maps tokens into PANs.
Viewers will learn the latest on PCI 3.0 and updates related to SSL
and TLS encryption protocols and vulnerabilities that can put
payment data at risk, security and PCI-related aspects of payment
vs. security tokenization in user networks, and gain a deeper
understanding of standards and options for protecting PAN data in
multi-platform enterprise environments. This webinar is part of the
Advanced Persistent Threats Summit on BrightTALK.
Presenter:Terence Spies, HPE Security – Data Security
Register Here:
Emerging Technologies:Innovations and Evolutions in BI,
Analytics, and Data Warehousing
This Webinar informs users about all emerging technologies and
methods, plus how the innovation of emerging technologies can
support innovation in business processes, operational excellence,
4. customer management, competitiveness, cost containment, IT
practices, and the business leverage of data via BI, analytics, and
data warehousing. HPE Security – Data Security is sponsor of this
webinar.
Register Here:
Blogs
HPE Security – Data Security Blog:
National Cyber Security Awareness Month
The Disruption of Banking
HPE Security Research Blog:
Security intelligence viewpoint: Encryption as an attack tool - The call to action is not to
ignore encryption, but to master it – ahead of advanced threat actors. Learn our security
viewpoint from Mark Bower and Ted Ross.
Articles
Feature interview with Sr. VP and GM of HPE Security Sue Barsamian - Connect
Converge Magazine
America's Thrift Stores Acknowledges Credit Card Breach - eSecurity Planet
Samsung Pay Provider Hacked for Months - infosecurity-magazine.com
Mobile Payments Gaining Ground, But Hold on to Your Wallet – Voice of America