Enterprise security landscape.
(Unknown)
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Format
Unknown
Physical Desc
1 online resource (1 video file, approximately 36 min.) : digital, .flv file, sound
Status
Unavailable/Withdrawn
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Language
English
Notes
General Note
Title from title frames.
Date/Time and Place of Event
Originally produced by SmartPros in 2012.
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices that will help IT and business professionals protect sensitive data and assets from a damaging cyber-attack. Track: Straight talk straightforward explanations of key technologies and their business value. Learning objectives: Explain the changing nature of security threats and cyber-attacks. Recognize if enterprises are "up to the challenge" in terms of protecting their infrastructure and data from security breaches and cyber-attack. Understand the emerging IT trends of cloud computing and big data and how they impact enterprise security.
System Details
Mode of access: World Wide Web.
Citations
APA Citation, 7th Edition (style guide)
(2014). Enterprise security landscape . Kanopy Streaming.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2014. Enterprise Security Landscape. Kanopy Streaming.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Enterprise Security Landscape Kanopy Streaming, 2014.
MLA Citation, 9th Edition (style guide)Enterprise Security Landscape Kanopy Streaming, 2014.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
2b56592e-94d7-6571-2d50-d8ca4f6c233d-eng
Grouping Information
Grouped Work ID | 2b56592e-94d7-6571-2d50-d8ca4f6c233d-eng |
---|---|
Full title | enterprise security landscape |
Author | kanopy |
Grouping Category | movie |
Last Update | 2022-07-05 21:15:06PM |
Last Indexed | 2024-03-28 02:39:59AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Aug 30, 2021 |
Last Used | Mar 11, 2024 |
Marc Record
First Detected | Feb 04, 2014 12:00:00 AM |
---|---|
Last File Modification Time | Aug 03, 2021 03:10:50 AM |
MARC Record
LEADER | 02250ngm a22003731i 4500 | ||
---|---|---|---|
001 | kan1089901 | ||
003 | CaSfKAN | ||
005 | 20140204133419.0 | ||
006 | m o c | ||
007 | vz uzazuu | ||
007 | cr una---unuuu | ||
008 | 140807p20142012cau036 o vleng d | ||
028 | 5 | 2 | |a 1089901|b Kanopy |
035 | |a (OCoLC)897769728 | ||
040 | |a UtOrBLW|b eng|e rda|c UtOrBLW | ||
245 | 0 | 0 | |a Enterprise security landscape. |
264 | 1 | |a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2014. | |
300 | |a 1 online resource (1 video file, approximately 36 min.) :|b digital, .flv file, sound | ||
336 | |a two-dimensional moving image|2 rdacontent | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
344 | |a digital | ||
347 | |a video file|b MPEG-4|b Flash | ||
500 | |a Title from title frames. | ||
518 | |a Originally produced by SmartPros in 2012. | ||
520 | |a Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices that will help IT and business professionals protect sensitive data and assets from a damaging cyber-attack. Track: Straight talk straightforward explanations of key technologies and their business value. Learning objectives: Explain the changing nature of security threats and cyber-attacks. Recognize if enterprises are "up to the challenge" in terms of protecting their infrastructure and data from security breaches and cyber-attack. Understand the emerging IT trends of cloud computing and big data and how they impact enterprise security. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Computer hackers. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Big data. | |
710 | 2 | |a Kanopy (Firm) | |
856 | 4 | 0 | |u https://uintahlibrary.kanopy.com/node/89902|z A Kanopy streaming video |
856 | 4 | 2 | |z Cover Image|u https://www.kanopy.com/node/89902/external-image |