LEADER 00000ngm a22003731i 4500 003 CaSfKAN 005 20140204133419.0 006 m o c 007 vz uzazuu 007 cr una---unuuu 008 140807p20142012cau036 o vleng d 028 52 1089901|bKanopy 035 (OCoLC)897769728 040 UtOrBLW|beng|erda|cUtOrBLW 245 00 Enterprise security landscape.|h[Kanopy electronic resource] 264 1 [San Francisco, California, USA] :|bKanopy Streaming, |c2014. 300 1 online resource (1 video file, approximately 36 min.) : |bdigital, .flv file, sound 336 two-dimensional moving image|2rdacontent 337 computer|2rdamedia 338 online resource|2rdacarrier 344 digital 347 video file|bMPEG-4|bFlash 500 Title from title frames. 518 Originally produced by SmartPros in 2012. 520 Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices that will help IT and business professionals protect sensitive data and assets from a damaging cyber-attack. Track: Straight talk straightforward explanations of key technologies and their business value. Learning objectives: Explain the changing nature of security threats and cyber-attacks. Recognize if enterprises are "up to the challenge" in terms of protecting their infrastructure and data from security breaches and cyber-attack. Understand the emerging IT trends of cloud computing and big data and how they impact enterprise security. 538 Mode of access: World Wide Web. 650 0 Computer hackers. 650 0 Cyberterrorism. 650 0 Cloud computing. 650 0 Big data. 710 2 Kanopy (Firm) 856 40 |uhttps://naperville.kanopy.com/node/89902|zAvailable on Kanopy 856 42 |zCover Image|uhttps://www.kanopy.com/node/89902/external- image