skip to content
Enterprise Security Landscape: Risks and Controls Preview this item
ClosePreview this item
Checking...

Enterprise Security Landscape: Risks and Controls

Author: Kanopy (Firm)
Publisher: [San Francisco, California, USA] : Kanopy Streaming, 2015.
Edition/Format:   eVideo : Clipart/images/graphics
Summary:
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Kanopy (Firm)
OCLC Number: 921957373
Language Note: In English
Notes: Title from title frames.
In Process Record.
Event notes: Originally produced by SmartPros in 2013.
Description: 1 online resource (streaming video file)
More information:

Abstract:

Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/921957373> # Enterprise Security Landscape: Risks and Controls
    a schema:CreativeWork, schema:VideoObject, schema:Movie ;
   library:oclcnum "921957373" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   rdfs:comment "Unknown 'gen' value: cig" ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2643891019#Thing/leadership_training> ; # Leadership Training
   schema:about <http://experiment.worldcat.org/entity/work/data/2643891019#Thing/business_skills> ; # Business Skills
   schema:contributor <http://experiment.worldcat.org/entity/work/data/2643891019#Organization/kanopy_firm> ; # Kanopy (Firm)
   schema:description "Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2643891019> ;
   schema:name "Enterprise Security Landscape: Risks and Controls" ;
   schema:productID "921957373" ;
   schema:url <http://ucsb.kanopystreaming.com/node/114974> ;
   schema:url <http://www.kanopystreaming.com/node/114974> ;
   schema:url <http://institution.kanopystreaming.com/node/114974> ;
   schema:url <http://eiu.kanopystreaming.com/node/114974> ;
   schema:url <http://queenslibrary.kanopystreaming.com/node/114974> ;
   schema:url <http://umass.kanopystreaming.com/node/114974> ;
   schema:url <http://imperial.kanopystreaming.com/node/114974> ;
   schema:url <http://cornell.kanopystreaming.com/node/114974> ;
   schema:url <http://nhfpl.kanopystreaming.com/node/114974> ;
   schema:url <http://nolalibrary.kanopystreaming.com/node/114974> ;
   schema:url <https://grinnell.idm.oclc.org/login?url=http://grinnell.kanopystreaming.com/node/114974> ;
   schema:url <http://uvic.kanopystreaming.com/node/114974> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/921957373> ;
    .


Related Entities

<http://eiu.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video, access limited to EIU students, faculty and staff" ;
    .

<http://experiment.worldcat.org/entity/work/data/2643891019#Thing/leadership_training> # Leadership Training
    a schema:Thing ;
   schema:name "Leadership Training" ;
    .

<http://imperial.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .

<http://institution.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .

<http://nhfpl.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .

<http://nolalibrary.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .

<http://ucsb.kanopystreaming.com/node/114974>
   rdfs:comment "Access restricted to UCSB IP addresses" ;
    .

<http://umass.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .

<http://www.kanopystreaming.com/node/114974>
   rdfs:comment "A Kanopy streaming video" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.