Webcasts Look at Security
|  Don’t miss the FRx Express -the traveling FRx Software product and training road show, coming soon to a city near you! Discover helpful FRx Software tips and tricks, see product demonstrations of Microsoft® FRx® and Microsoft Forecaster, and attend a product Q & A forum. Register now! |
|FRx Software Home ||Product Information |
|Training & Consulting ||Product Demo |
|Webcast ||Customer Testimonial Video |
7 Proven Ways to Measure Security
Measuring information technology (IT) security is the topic of a webcast that will be presented by Preventsys Inc. together with Forrester Research on October 25 beginning at 11:00 a.m. PDT.
Preventsys, a leader in proactive risk management, will explain how organizations must align, manage and measure security around business operations. Among the topics to be covered are how to:
- Reduce downtime through proactive security
- Quantify security improvements
- Prove risk reduction
- Calculate security exposure and risk
- Measure regulatory compliance
- translate security information into business terms.
Speakers will be Michael Rasmussen, Vice President of Enterprise Risk and Compliance Management at Forrester Research; Kevin Reardon, CISSP, Vice President, Operations with Preventsys and security expert Gordon Eubanks.
More information and registration are available at http://www.preventsys.com/home/events.html#48. 
Next Generation E-mail Security – Effective Protection for Data Security, IP Protection and Compliance
Featured speakers Raj Dhingra, Vice President of Marketing & Business Development at Port Authority Technologies and Frank Derfler, Vice President, Market Experts Group with Ziff Davis Media will explore the need for more precise detection and information leak prevention from tomorrow’s e-mail security solutions at 4:00 p.m ET on November 1.
The 30-mintue event will examine the types of information leaks e-mail security solutions will need to identify including:
- Policy violation for regulatory and corporate compliance.
- Groups or individuals responsible for information breaches
- Private and confidential information being leaked
- Unauthorized recipients of sensitive information
- How information is being leaked
Register at http://www.eseminarslive.com/article2/0,2144,1870714,00.asp.