Information Systems 2015: PMP and Security - A Necessary Union?

Who hasn’t heard of all the data breaches recently? Do you think Project Management played a role in them or was it just IT? We’re Project Managers — how much do we need to know about security? That’s what the Security staff is for, right? As Project Managers, it’s our role to understand and manage all project risks, including information security. As such, it’s everyone’s responsibility to think about security and know who to engage and when. This session discusses the key components of how to incorporate security into the PM Lifecycle. You will learn why security is important, basic security for project managers, and how to embed security best practices into the PM Lifecycle.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Harnessing Artificial Intelligence & Emerging Technologies for Data Security

TierPoint

TierPoint's Paul Mazzucco will discuss the double-edged sword of artificial intelligence, which is aiding the efforts of hackers and protectors alike. Join us as we explore the world of the Darknet, how bad actors are using machine learning and AI to create better attack vectors, and how IT professionals are also using these tools to defend their vital infrastructure. Powered by behavioral modeling, these technologies are the next frontiers in attack mitigation.
Watch Now

How AI Is Changing Customer Experience

oracle

Watch this on-demand webinar to discover how technologies such as AI, Machine Learning, VR/AR, IoT, and blockchain are innovating Marketing and CX. Hear about Conversational User Interfaces making interaction unseen and effortless via voice assistants and chatbots. Learn why AI is needed for CX to be personalised intelligence at scale. Realise how IoT not only connects product to sales but offers completely new go-to market options.
Watch Now

Protect Your Web Applications from Component Vulnerabilities

Tenable

Web applications are becoming increasingly complex, with most applications now built using multiple layered components, such as web servers, web frameworks, language engines and JavaScript libraries. The growing number of cyber attacks stemming from component vulnerabilities highlights a limitation of conventional scanning for securing web applications.
Watch Now

Intro to Anypoint Exchange 2.0 and API Designer

It’s clear that reusing high-quality IT assets accelerates onramp and development, yet in most organizations, there is a lack of reuse because discovering, saving, updating, and reusing assets is often cumbersome. To solve this costly challenge, we are introducing the new Anypoint Exchange and API Designer.
Watch Now